Analysis
-
max time kernel
147s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-06-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe
Resource
win10v2004-20220414-en
General
-
Target
531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe
-
Size
2.1MB
-
MD5
d59ee7e723f06f5a8b7c09f9a94ec374
-
SHA1
a25f9abd250c23113cf546f44528f2e7c30eb937
-
SHA256
531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098
-
SHA512
e45f3b1cf906e4a67e2332988adcaf63dbc6e86e4c8986d13591819207e4319bb86b91ac4dd6a4525e6b04284edcf48f2fcb48ee4277b7238406e53f7e8b0cf7
Malware Config
Extracted
njrat
im523
driver1.exe
192.168.42.254:5552
e36079b13f58a4249aa31dc3586b04c8
-
reg_key
e36079b13f58a4249aa31dc3586b04c8
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
FB8N..exepid process 1732 FB8N..exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 1 IoCs
Processes:
531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exepid process 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1368 1304 WerFault.exe 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1980 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
taskkill.exeFB8N..exedescription pid process Token: SeDebugPrivilege 1980 taskkill.exe Token: SeDebugPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe Token: 33 1732 FB8N..exe Token: SeIncBasePriorityPrivilege 1732 FB8N..exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exeFB8N..exedescription pid process target process PID 1304 wrote to memory of 1732 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe FB8N..exe PID 1304 wrote to memory of 1732 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe FB8N..exe PID 1304 wrote to memory of 1732 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe FB8N..exe PID 1304 wrote to memory of 1732 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe FB8N..exe PID 1304 wrote to memory of 1368 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe WerFault.exe PID 1304 wrote to memory of 1368 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe WerFault.exe PID 1304 wrote to memory of 1368 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe WerFault.exe PID 1304 wrote to memory of 1368 1304 531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe WerFault.exe PID 1732 wrote to memory of 2000 1732 FB8N..exe netsh.exe PID 1732 wrote to memory of 2000 1732 FB8N..exe netsh.exe PID 1732 wrote to memory of 2000 1732 FB8N..exe netsh.exe PID 1732 wrote to memory of 2000 1732 FB8N..exe netsh.exe PID 1732 wrote to memory of 1980 1732 FB8N..exe taskkill.exe PID 1732 wrote to memory of 1980 1732 FB8N..exe taskkill.exe PID 1732 wrote to memory of 1980 1732 FB8N..exe taskkill.exe PID 1732 wrote to memory of 1980 1732 FB8N..exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe"C:\Users\Admin\AppData\Local\Temp\531a83721a2d3ac3b6e5c46cc5d1157f1a16cee8f499ee4f713f1fdddea8a098.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\FB8N..exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\FB8N..exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\FB8N..exe" "FB8N..exe" ENABLE3⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM avast.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 9122⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\FB8N..exeFilesize
341KB
MD5147a9029be0649b4779312e059fba9d3
SHA15bea217a23f6dcb7adff11d78adb10d996c08531
SHA256ae784656f3641f93a97f26ad0bd9896fbabf8c7c701fd86e76c47544c6e88d77
SHA5128b1234dda6a9285321b2073f1e06262a6dc9888a06239bbd6ec461f19432fd47c3e7aab7f8f41965973faeb6a10187805397c46077a0e1efda377032bcaac131
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\FB8N..exeFilesize
341KB
MD5147a9029be0649b4779312e059fba9d3
SHA15bea217a23f6dcb7adff11d78adb10d996c08531
SHA256ae784656f3641f93a97f26ad0bd9896fbabf8c7c701fd86e76c47544c6e88d77
SHA5128b1234dda6a9285321b2073f1e06262a6dc9888a06239bbd6ec461f19432fd47c3e7aab7f8f41965973faeb6a10187805397c46077a0e1efda377032bcaac131
-
\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\FB8N..exeFilesize
341KB
MD5147a9029be0649b4779312e059fba9d3
SHA15bea217a23f6dcb7adff11d78adb10d996c08531
SHA256ae784656f3641f93a97f26ad0bd9896fbabf8c7c701fd86e76c47544c6e88d77
SHA5128b1234dda6a9285321b2073f1e06262a6dc9888a06239bbd6ec461f19432fd47c3e7aab7f8f41965973faeb6a10187805397c46077a0e1efda377032bcaac131
-
memory/1304-54-0x0000000000F60000-0x000000000117A000-memory.dmpFilesize
2.1MB
-
memory/1304-55-0x0000000076531000-0x0000000076533000-memory.dmpFilesize
8KB
-
memory/1368-60-0x0000000000000000-mapping.dmp
-
memory/1732-57-0x0000000000000000-mapping.dmp
-
memory/1732-62-0x00000000719D0000-0x0000000071F7B000-memory.dmpFilesize
5.7MB
-
memory/1732-65-0x00000000719D0000-0x0000000071F7B000-memory.dmpFilesize
5.7MB
-
memory/1980-64-0x0000000000000000-mapping.dmp
-
memory/2000-63-0x0000000000000000-mapping.dmp