Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-06-2022 00:39

General

  • Target

    7c4de9b785ee176c88795a3f927d00cd.exe

  • Size

    43KB

  • MD5

    7c4de9b785ee176c88795a3f927d00cd

  • SHA1

    6b02003126055c6f59a9fa743c09ef6bdfed319f

  • SHA256

    bca921880652f332d0cd1ad37c88af2dbb85b78e98b671ea8587f9cc678df01f

  • SHA512

    90e5aeffbf7e626098df92f8cc86d22d995c5c15ec1bf7ea4ad4c9021d357cec06dfaab3bbb5e6b110b6c6c5b6df8e5959e58a336da46e7fd6c9155fb7b8cefb

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c4de9b785ee176c88795a3f927d00cd.exe
    "C:\Users\Admin\AppData\Local\Temp\7c4de9b785ee176c88795a3f927d00cd.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1956-130-0x00000000752A0000-0x0000000075851000-memory.dmp
    Filesize

    5.7MB

  • memory/1956-131-0x00000000752A0000-0x0000000075851000-memory.dmp
    Filesize

    5.7MB