Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-05-2022 14:37
Behavioral task
behavioral1
Sample
a5b3dd8d83d63498c52d938f63eb61bf.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a5b3dd8d83d63498c52d938f63eb61bf.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
a5b3dd8d83d63498c52d938f63eb61bf.exe
-
Size
37KB
-
MD5
a5b3dd8d83d63498c52d938f63eb61bf
-
SHA1
6a07038608774231386f436ba4ca7063abf28078
-
SHA256
45bb2795caac14d2915644b8c6aed568a8681dd12cab779e5bb535cc03a95a34
-
SHA512
0e75a66c7366a6e0d5b05d45c453fab73c37e9376c2865ccc0741d7323d6568410e5a20e2d0c16801995028b0173edcb8ee58653b9874a3a351df6167666d745
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
a5b3dd8d83d63498c52d938f63eb61bf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\88489d1083fd6ed1fecee39e01330c6c.exe a5b3dd8d83d63498c52d938f63eb61bf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\88489d1083fd6ed1fecee39e01330c6c.exe a5b3dd8d83d63498c52d938f63eb61bf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a5b3dd8d83d63498c52d938f63eb61bf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\88489d1083fd6ed1fecee39e01330c6c = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\a5b3dd8d83d63498c52d938f63eb61bf.exe\" .." a5b3dd8d83d63498c52d938f63eb61bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\88489d1083fd6ed1fecee39e01330c6c = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\a5b3dd8d83d63498c52d938f63eb61bf.exe\" .." a5b3dd8d83d63498c52d938f63eb61bf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a5b3dd8d83d63498c52d938f63eb61bf.exepid process 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe 740 a5b3dd8d83d63498c52d938f63eb61bf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
a5b3dd8d83d63498c52d938f63eb61bf.exepid process 740 a5b3dd8d83d63498c52d938f63eb61bf.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
a5b3dd8d83d63498c52d938f63eb61bf.exedescription pid process Token: SeDebugPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: 33 740 a5b3dd8d83d63498c52d938f63eb61bf.exe Token: SeIncBasePriorityPrivilege 740 a5b3dd8d83d63498c52d938f63eb61bf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a5b3dd8d83d63498c52d938f63eb61bf.exedescription pid process target process PID 740 wrote to memory of 4144 740 a5b3dd8d83d63498c52d938f63eb61bf.exe netsh.exe PID 740 wrote to memory of 4144 740 a5b3dd8d83d63498c52d938f63eb61bf.exe netsh.exe PID 740 wrote to memory of 4144 740 a5b3dd8d83d63498c52d938f63eb61bf.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5b3dd8d83d63498c52d938f63eb61bf.exe"C:\Users\Admin\AppData\Local\Temp\a5b3dd8d83d63498c52d938f63eb61bf.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\a5b3dd8d83d63498c52d938f63eb61bf.exe" "a5b3dd8d83d63498c52d938f63eb61bf.exe" ENABLE2⤵PID:4144
-