Analysis

  • max time kernel
    187s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-06-2022 18:08

General

  • Target

    df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56.exe

  • Size

    212KB

  • MD5

    97cdc2694b476ab047a4d162d19ba8a6

  • SHA1

    56d6f2e31897873d1f38564f659e5b36992a27d2

  • SHA256

    df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56

  • SHA512

    f7956d6a6058ae1c496fae3b5985a60894718a66159b6f3f12ab1c6e3c67442defb6ba30233101db62e5b949a29719f19a5e029fdf0164e8886b4a9173d3987a

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

127.0.0.1:4004

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56.exe
    "C:\Users\Admin\AppData\Local\Temp\df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56.exe
      "C:\Users\Admin\AppData\Local\Temp\df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56.exe"
      2⤵
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
        "C:\Users\Admin\AppData\Local\Temp\Trojan.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
          "C:\Users\Admin\AppData\Local\Temp\Trojan.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            PID:812

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    589c442fc7a0c70dca927115a700d41e

    SHA1

    66a07dace3afbfd1aa07a47e6875beab62c4bb31

    SHA256

    2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a

    SHA512

    1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    3b8c38e5fee31fdb2c7f7d723371fa8c

    SHA1

    f3af8d44b66bc3ff1895b7de5797391470dba3ec

    SHA256

    c664b257014243fb36eee3f00523bdc71d112fcf4f67c1e7d6f89fdefed0f115

    SHA512

    3f168cbafc2d6218fa2d85fecd3c9a5eab77989f02f19d17cac0442862301a29a5c650f84f6b3ea5433249c3215e2d1d3582cfaf4574fc3c40b1509ffb3a01a8

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
    Filesize

    212KB

    MD5

    97cdc2694b476ab047a4d162d19ba8a6

    SHA1

    56d6f2e31897873d1f38564f659e5b36992a27d2

    SHA256

    df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56

    SHA512

    f7956d6a6058ae1c496fae3b5985a60894718a66159b6f3f12ab1c6e3c67442defb6ba30233101db62e5b949a29719f19a5e029fdf0164e8886b4a9173d3987a

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
    Filesize

    212KB

    MD5

    97cdc2694b476ab047a4d162d19ba8a6

    SHA1

    56d6f2e31897873d1f38564f659e5b36992a27d2

    SHA256

    df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56

    SHA512

    f7956d6a6058ae1c496fae3b5985a60894718a66159b6f3f12ab1c6e3c67442defb6ba30233101db62e5b949a29719f19a5e029fdf0164e8886b4a9173d3987a

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
    Filesize

    212KB

    MD5

    97cdc2694b476ab047a4d162d19ba8a6

    SHA1

    56d6f2e31897873d1f38564f659e5b36992a27d2

    SHA256

    df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56

    SHA512

    f7956d6a6058ae1c496fae3b5985a60894718a66159b6f3f12ab1c6e3c67442defb6ba30233101db62e5b949a29719f19a5e029fdf0164e8886b4a9173d3987a

  • \Users\Admin\AppData\Local\Temp\Trojan.exe
    Filesize

    212KB

    MD5

    97cdc2694b476ab047a4d162d19ba8a6

    SHA1

    56d6f2e31897873d1f38564f659e5b36992a27d2

    SHA256

    df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56

    SHA512

    f7956d6a6058ae1c496fae3b5985a60894718a66159b6f3f12ab1c6e3c67442defb6ba30233101db62e5b949a29719f19a5e029fdf0164e8886b4a9173d3987a

  • \Users\Admin\AppData\Local\Temp\Trojan.exe
    Filesize

    212KB

    MD5

    97cdc2694b476ab047a4d162d19ba8a6

    SHA1

    56d6f2e31897873d1f38564f659e5b36992a27d2

    SHA256

    df8b843854a0518dd942a451a8c3938c7e7b7e494a438b1af7eea6c3d3303a56

    SHA512

    f7956d6a6058ae1c496fae3b5985a60894718a66159b6f3f12ab1c6e3c67442defb6ba30233101db62e5b949a29719f19a5e029fdf0164e8886b4a9173d3987a

  • memory/812-94-0x0000000000000000-mapping.dmp
  • memory/1016-55-0x0000000075C51000-0x0000000075C53000-memory.dmp
    Filesize

    8KB

  • memory/1016-56-0x00000000005C0000-0x00000000005CA000-memory.dmp
    Filesize

    40KB

  • memory/1016-54-0x0000000000300000-0x000000000033A000-memory.dmp
    Filesize

    232KB

  • memory/1504-85-0x0000000000408E3A-mapping.dmp
  • memory/1744-63-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1744-71-0x00000000005E0000-0x00000000005EE000-memory.dmp
    Filesize

    56KB

  • memory/1744-69-0x00000000002F0000-0x00000000002F8000-memory.dmp
    Filesize

    32KB

  • memory/1744-66-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1744-68-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1744-60-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1744-62-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1744-64-0x0000000000408E3A-mapping.dmp
  • memory/1744-58-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1744-57-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1924-73-0x0000000000000000-mapping.dmp
  • memory/1924-76-0x0000000001360000-0x000000000139A000-memory.dmp
    Filesize

    232KB