Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    28-06-2022 14:16

General

  • Target

    161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83.exe

  • Size

    2.1MB

  • MD5

    55f1a187f2dd21001affdae1ed5267ca

  • SHA1

    bbe87d68e6503f3fd7a908ce40206ba929ce06df

  • SHA256

    161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83

  • SHA512

    574a3aae17fd809db483a2586957df2b284ee691cfe45bd3b0c494e879d2b9280b70b0e61527d9f0031c645b18308b2c657759a7aa990198ae1ce6441f8885a0

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

httpss.ddns.net:1555

Mutex

5ff1382bbd98dd9fcc9977e69f6e285f

Attributes
  • reg_key

    5ff1382bbd98dd9fcc9977e69f6e285f

  • splitter

    |'|'|

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83.exe
    "C:\Users\Admin\AppData\Local\Temp\161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4936
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zhNInYSKJVxzT.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1708
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zhNInYSKJVxzT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5217.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3832
    • C:\Users\Admin\AppData\Local\Temp\161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83.exe
      "C:\Users\Admin\AppData\Local\Temp\161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\UDKB.exe
        "C:\Users\Admin\AppData\Local\Temp\UDKB.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\UDKB.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2788
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BIohnuNCuBIl.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1692
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BIohnuNCuBIl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBD93.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:3668
        • C:\Users\Admin\AppData\Local\Temp\UDKB.exe
          "C:\Users\Admin\AppData\Local\Temp\UDKB.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2020
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\UDKB.exe" "UDKB.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            PID:1636
      • C:\Users\Admin\AppData\Local\Temp\UDKL.exe
        "C:\Users\Admin\AppData\Local\Temp\UDKL.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1112
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\UDKL.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1816
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jqohdNUIWvTUE.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3760
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jqohdNUIWvTUE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBDE1.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:3620
        • C:\Users\Admin\AppData\Local\Temp\UDKL.exe
          "C:\Users\Admin\AppData\Local\Temp\UDKL.exe"
          4⤵
          • Executes dropped EXE
          PID:4060

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    34cdbd50af6150f5f3200356d15a92cb

    SHA1

    6d8d9f94f974eb9e20087d06ce2b4eacdda89a0f

    SHA256

    510e61e7b2d9c7071cdff71c086b6ea2e6c91fe66587207915715202db2ae18f

    SHA512

    86f123cc9fff7de4b03dc56f2b09e62d742e1d399c897b600ac8240645d5e4ec2e219d0b120cb5f00b627c3fc65bad24f58062c116451315b2a1b0d90fe2d57c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    b7767814c661004d0d05822ce0b08ff4

    SHA1

    64d3ff037178e01a0b30d0b30e160e906c9c0a8f

    SHA256

    1efc19fcc204e2d647b302a1d7b34893ff4c52f0df9f7853d030307755710ef9

    SHA512

    562ea714eb2c9e38f0f510f07318551c260ecff16ae3d60e4d6dc8347aaf8fefcfd588c4c277f5357dfc258f60c3e70620a97a41afe726958e4cf551c6cf7835

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    f7298d279e867c168862d9c6de9b4a69

    SHA1

    6472064299b4ca053cf38e0a8843849b3546b7fa

    SHA256

    641a36bf1a9d8dae0a047fd45054264ea6925d4655fa5bb3b33416d4f424f3de

    SHA512

    fcfa605898b9257cacdb6d9449b2704041f750b451e2df868b758fa16e7351ef1c294b4cbc0b21732c6ad6765a7d4d43fff8735c98d9a793e8f8a5a8a0734c07

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    c49fafc544a9ec2e36b3bf7af032905e

    SHA1

    35c53df8aeb675fbe31eba753bbc7a424b1f21bc

    SHA256

    562052d33c026371bc1a66b1aa6cd023b9160fc9661d6be9f007d859fc3f2139

    SHA512

    5885597673f167eb75a6fea0ec0115b7219e370fdb49a95b2f2444932213ce2dad8f98d8e8b2e19b8130326bf23b6ad1c428e53f8ff592044ad07cc9adeaec78

  • C:\Users\Admin\AppData\Local\Temp\UDKB.exe

    Filesize

    649KB

    MD5

    416c563b3ea79a1b62462026eb050b3a

    SHA1

    58a08b19d39ba2d2369ff1dfb0053831130b2135

    SHA256

    0cbc8068204776f3fa02eaf9fa7367f3f784b205e16fc6d5ade7972740b8d1d5

    SHA512

    63a71308dae5a2e3020d5073c288b142b578211eb501dc81c50218011c606d3357285af73a8790fcf417ae80f6614856455b5f3d2448189b8a2b9440f424f0af

  • C:\Users\Admin\AppData\Local\Temp\UDKB.exe

    Filesize

    649KB

    MD5

    416c563b3ea79a1b62462026eb050b3a

    SHA1

    58a08b19d39ba2d2369ff1dfb0053831130b2135

    SHA256

    0cbc8068204776f3fa02eaf9fa7367f3f784b205e16fc6d5ade7972740b8d1d5

    SHA512

    63a71308dae5a2e3020d5073c288b142b578211eb501dc81c50218011c606d3357285af73a8790fcf417ae80f6614856455b5f3d2448189b8a2b9440f424f0af

  • C:\Users\Admin\AppData\Local\Temp\UDKB.exe

    Filesize

    649KB

    MD5

    416c563b3ea79a1b62462026eb050b3a

    SHA1

    58a08b19d39ba2d2369ff1dfb0053831130b2135

    SHA256

    0cbc8068204776f3fa02eaf9fa7367f3f784b205e16fc6d5ade7972740b8d1d5

    SHA512

    63a71308dae5a2e3020d5073c288b142b578211eb501dc81c50218011c606d3357285af73a8790fcf417ae80f6614856455b5f3d2448189b8a2b9440f424f0af

  • C:\Users\Admin\AppData\Local\Temp\UDKL.exe

    Filesize

    718KB

    MD5

    8f452a1e67ab110f1172b7598f8e3d75

    SHA1

    8c15c9277c3f91c568b1d66b4905c1400044b084

    SHA256

    987f24992e9b8f7f5c08ad9e1862dfd5c56d4f6364782bb1da55efe25a19f659

    SHA512

    af5d92421cc02f9a81f2cdac618a1be29eba6c262f8eec63d37e2831713d1afb0e62e8c8d3fd42fc5fa8f4a30707b711dac5bc4c50c2517d031744a745b5e17f

  • C:\Users\Admin\AppData\Local\Temp\UDKL.exe

    Filesize

    718KB

    MD5

    8f452a1e67ab110f1172b7598f8e3d75

    SHA1

    8c15c9277c3f91c568b1d66b4905c1400044b084

    SHA256

    987f24992e9b8f7f5c08ad9e1862dfd5c56d4f6364782bb1da55efe25a19f659

    SHA512

    af5d92421cc02f9a81f2cdac618a1be29eba6c262f8eec63d37e2831713d1afb0e62e8c8d3fd42fc5fa8f4a30707b711dac5bc4c50c2517d031744a745b5e17f

  • C:\Users\Admin\AppData\Local\Temp\UDKL.exe

    Filesize

    718KB

    MD5

    8f452a1e67ab110f1172b7598f8e3d75

    SHA1

    8c15c9277c3f91c568b1d66b4905c1400044b084

    SHA256

    987f24992e9b8f7f5c08ad9e1862dfd5c56d4f6364782bb1da55efe25a19f659

    SHA512

    af5d92421cc02f9a81f2cdac618a1be29eba6c262f8eec63d37e2831713d1afb0e62e8c8d3fd42fc5fa8f4a30707b711dac5bc4c50c2517d031744a745b5e17f

  • C:\Users\Admin\AppData\Local\Temp\tmp5217.tmp

    Filesize

    1KB

    MD5

    22f2d19e95ecbfd9eaba34d3cb130267

    SHA1

    03d810a3dbceca44fa97bfe23b001498afdf53a5

    SHA256

    5bb30c83e40c865246a388b7b2437a616fd7e378f692abbd8bf8eaa114245a9c

    SHA512

    2acba35323f1ea6e867138476ebf33d4130ec8081521f134556aa73d8a481f9da0f9d1adeb2c73752bf62b60a623e87b62fc0e374656b35e39bef07e1c031cac

  • C:\Users\Admin\AppData\Local\Temp\tmpBD93.tmp

    Filesize

    1KB

    MD5

    75ac933fc3864f923de186c122ccac7a

    SHA1

    39e57abff342d598efd49c922f1c397e53369d88

    SHA256

    ae51ad38d7e9b5027bfbb146918152715bfbc42b81e65d0b1550b9440c1fc0b0

    SHA512

    a9da7bb8ac8b1c8ea2c4e117d492f13670bbc15d35e6ef23e9ae6630e0a2fa00caacc5b3f6e93158d860a09d6f207a868b1da0997894ee13adba62c868b3635b

  • C:\Users\Admin\AppData\Local\Temp\tmpBDE1.tmp

    Filesize

    1KB

    MD5

    13f7b05cc0d84e7b9c4337c8927b1453

    SHA1

    7090a6f8290dc27a0d9c5250435faaaba17c42c9

    SHA256

    bf3c6a33ef9730ae51686fc2bfd60871e64414f5edf92f5f09ffd8e52eccaaac

    SHA512

    b1b1df026443c8f4861f7870919cccdb1d92f7ee733e9be8815f97634d80382bf65ccad7e592230316e6ed898f90eab59966b6a01d8becbb1c646ecab60e8086

  • memory/1112-153-0x0000000000000000-mapping.dmp

  • memory/1112-158-0x0000000000070000-0x0000000000128000-memory.dmp

    Filesize

    736KB

  • memory/1636-191-0x0000000000000000-mapping.dmp

  • memory/1692-173-0x0000000000000000-mapping.dmp

  • memory/1692-190-0x0000000074F30000-0x0000000074F7C000-memory.dmp

    Filesize

    304KB

  • memory/1708-140-0x0000000005260000-0x0000000005282000-memory.dmp

    Filesize

    136KB

  • memory/1708-163-0x0000000007B80000-0x00000000081FA000-memory.dmp

    Filesize

    6.5MB

  • memory/1708-148-0x0000000006220000-0x000000000623E000-memory.dmp

    Filesize

    120KB

  • memory/1708-168-0x0000000007870000-0x000000000788A000-memory.dmp

    Filesize

    104KB

  • memory/1708-166-0x00000000077B0000-0x0000000007846000-memory.dmp

    Filesize

    600KB

  • memory/1708-143-0x0000000005BC0000-0x0000000005C26000-memory.dmp

    Filesize

    408KB

  • memory/1708-137-0x0000000000000000-mapping.dmp

  • memory/1708-165-0x00000000075A0000-0x00000000075AA000-memory.dmp

    Filesize

    40KB

  • memory/1708-160-0x0000000074F80000-0x0000000074FCC000-memory.dmp

    Filesize

    304KB

  • memory/1816-187-0x0000000074F30000-0x0000000074F7C000-memory.dmp

    Filesize

    304KB

  • memory/1816-172-0x0000000000000000-mapping.dmp

  • memory/2020-183-0x0000000000000000-mapping.dmp

  • memory/2020-184-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2788-188-0x0000000074F30000-0x0000000074F7C000-memory.dmp

    Filesize

    304KB

  • memory/2788-171-0x0000000000000000-mapping.dmp

  • memory/2884-132-0x00000000053D0000-0x0000000005462000-memory.dmp

    Filesize

    584KB

  • memory/2884-133-0x0000000005480000-0x000000000548A000-memory.dmp

    Filesize

    40KB

  • memory/2884-131-0x0000000005A30000-0x0000000005FD4000-memory.dmp

    Filesize

    5.6MB

  • memory/2884-134-0x0000000009570000-0x000000000960C000-memory.dmp

    Filesize

    624KB

  • memory/2884-130-0x0000000000820000-0x0000000000A3E000-memory.dmp

    Filesize

    2.1MB

  • memory/3244-146-0x0000000000400000-0x000000000059A000-memory.dmp

    Filesize

    1.6MB

  • memory/3244-157-0x0000000000400000-0x000000000059A000-memory.dmp

    Filesize

    1.6MB

  • memory/3244-144-0x0000000000000000-mapping.dmp

  • memory/3244-145-0x0000000000400000-0x000000000059A000-memory.dmp

    Filesize

    1.6MB

  • memory/3244-147-0x0000000000400000-0x000000000059A000-memory.dmp

    Filesize

    1.6MB

  • memory/3244-149-0x0000000000400000-0x000000000059A000-memory.dmp

    Filesize

    1.6MB

  • memory/3620-176-0x0000000000000000-mapping.dmp

  • memory/3668-175-0x0000000000000000-mapping.dmp

  • memory/3760-189-0x0000000074F30000-0x0000000074F7C000-memory.dmp

    Filesize

    304KB

  • memory/3760-174-0x0000000000000000-mapping.dmp

  • memory/3832-138-0x0000000000000000-mapping.dmp

  • memory/4060-181-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/4060-180-0x0000000000000000-mapping.dmp

  • memory/4380-156-0x0000000000C00000-0x0000000000CA8000-memory.dmp

    Filesize

    672KB

  • memory/4380-150-0x0000000000000000-mapping.dmp

  • memory/4936-167-0x0000000007880000-0x000000000788E000-memory.dmp

    Filesize

    56KB

  • memory/4936-169-0x0000000007970000-0x0000000007978000-memory.dmp

    Filesize

    32KB

  • memory/4936-164-0x0000000007650000-0x000000000766A000-memory.dmp

    Filesize

    104KB

  • memory/4936-162-0x0000000006900000-0x000000000691E000-memory.dmp

    Filesize

    120KB

  • memory/4936-142-0x0000000005C60000-0x0000000005CC6000-memory.dmp

    Filesize

    408KB

  • memory/4936-159-0x0000000007500000-0x0000000007532000-memory.dmp

    Filesize

    200KB

  • memory/4936-139-0x0000000005590000-0x0000000005BB8000-memory.dmp

    Filesize

    6.2MB

  • memory/4936-161-0x0000000074F80000-0x0000000074FCC000-memory.dmp

    Filesize

    304KB

  • memory/4936-136-0x0000000002A20000-0x0000000002A56000-memory.dmp

    Filesize

    216KB

  • memory/4936-135-0x0000000000000000-mapping.dmp