Analysis
-
max time kernel
1s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-06-2022 19:55
Static task
static1
Behavioral task
behavioral1
Sample
8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exe
Resource
win10v2004-20220414-en
General
-
Target
8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exe
-
Size
3.2MB
-
MD5
30fb03c95b0bab5bf680d8c08592ed46
-
SHA1
a3797aeb14ab3ac4f4215cca8f5dac6d9f61294b
-
SHA256
8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed
-
SHA512
1567cc9902b40b9c9aa4607029e1022910129332c5a4869b005465b9fc0b444b457f918b1546393032f78e14ba5de867775bb361d629b2dcc01ba5e65f7a5387
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:1177
212683d986fb740ad6a40184df48e604
-
reg_key
212683d986fb740ad6a40184df48e604
-
splitter
|'|'|
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exepid process 1680 8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exe"C:\Users\Admin\AppData\Local\Temp\8f44910456cb859adea91b79b1c53008665ec6fae5bc4ba88bbf81edab0e7fed.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"3⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b41⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\630_10.pngFilesize
2KB
MD5340b294efc691d1b20c64175d565ebc7
SHA181cb9649bd1c9a62ae79e781818fc24d15c29ce7
SHA25672566894059452101ea836bbff9ede5069141eeb52022ab55baa24e1666825c9
SHA5121395a8e175c63a1a1ff459a9dac437156c74299272e020e7e078a087969251a8534f17244a529acbc1b6800a97d4c0abfa3c88f6fcb88423f56dfaae9b49fc3d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.cddFilesize
13KB
MD53e7ecaeb51c2812d13b07ec852d74aaf
SHA1e9bdab93596ffb0f7f8c65243c579180939acb26
SHA256e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96
SHA512635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeFilesize
10KB
MD578804992142dc59588864ad8cac91adb
SHA18d59928595fa3fb2a1cd2da307e69826211cc764
SHA256a058e00501f7ef29684bb22fc1fc64d88d08019daafe42b6332e810ca9319368
SHA5124238327540c146f7671f7ef12a11fcd116ea4912b4b4a876dcc6c7b65843bb9c871d71340aa3a92f0d26fe46df7592b6c123874551885cc99b662c1c85ed13f1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeFilesize
28KB
MD5ecc73a63bafd7ce583709d703258b6e2
SHA1ffd9ec6b0c61e4644963bfd95b41246cac054390
SHA2569eae5862ccde32b45f658abdc2bc2518e38d73e53a2cd1e074124c5157f81407
SHA512e514f49cd0ee41fceb222da171a1735be154b33f54a7a1ffcf92ac087985b7337b0e164833ca0105fa77f2ee363f8df414a16d6fa0261aeb53b53709aa758546
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c.datFilesize
15KB
MD54a500ecc4da8b552017e723b6ce1a61a
SHA10e45f2d7cb7ac284bb29669eac95e7dd42afc163
SHA256bec71841fb9cb1a6ff21c82de7450d1e0f72b636d41cf14aa1813fd945b9c4a5
SHA512d05db379d2e07e0cbab7ac03e2dc539b8e28299e5af4ffd402c680c6dbb12cd29c46a9f9d20dc4a02ee1900bf8ac08e47a93da7dfaf022119d4ea47aa5adc49c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exeFilesize
23KB
MD594fa68bbf74308218c84ce10c10823b5
SHA123d88e65b36b92d3bcc00e902e5b50f9dab0ee0d
SHA256ad9141b2ab57cfc15e771222ecd4573d223e9db376da4c7c047ad1b42fda3f19
SHA5129d2c4eceb828cb62ca7bdc19aef5a09b4da9d51aa1132242aa4755bbb6abeba80a6346da312977612749a5b293ab3eca735219d420f3e4bf63f4f1c622e6106e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exeFilesize
18KB
MD5f70aa754f9e7b17227a419984fdc6390
SHA1cddbede6e9c0418bce0320522370e2d16b80469b
SHA2567b42a3452782cdcfab21719956e759478d4a174faf70430801afba2dc072dcd8
SHA512a6271eeb6dd979b79d74655542e42864cad90b66d4a2b3201dd43d09515fa47640aa2942ddaf509ce79eb4a698ea97f3f0e7514475ce38b1733096e7ce41b29d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fs.settingsFilesize
5B
MD568934a3e9455fa72420237eb05902327
SHA17cb6efb98ba5972a9b5090dc2e517fe14d12cb04
SHA256fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa
SHA512719fa67eef49c4b2a2b83f0c62bddd88c106aaadb7e21ae057c8802b700e36f81fe3f144812d8b05d66dc663d908b25645e153262cf6d457aa34e684af9e328d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lua5.1.dllFilesize
10KB
MD5b730b9361d9bc0fdf2f46b9a36fbe25f
SHA1d1ac364b56ac1990663f501f8a54b76c849e250e
SHA256e7844704deb274e8ed756f9eee4f9fa9c9f45c502d68a6dfbe3d478e4871654e
SHA512aebbe3923ba28b5d4e336abff237bc711279afc95a00daaca4d15477766351f489ab5671fd60de87caaecb9c81c28b820cb277137e7d4a5e93c4b60887de0eb2
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeFilesize
16KB
MD5dd22291d47ed083118d51b7527bc8c95
SHA1babad2dd0379f1902085a1fa176b989baebfcb86
SHA2569b79af29319a2d422f22297ec7efe119186ff07c46f64f560805c9bbba3c502d
SHA5124d2e5d2e2aae8a02a1a6004ea80c17c65abddff466939a34cfb9fd363b3bd5a66d8e6f261134d49bda495b68ff8ac03c1b43e78a0cc05322f8f83b674254c0df
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeFilesize
7KB
MD5b1612746f30a3a37fbc697c7d5b7e905
SHA129ea0d908637f638ec97e03586dd12a235a12b69
SHA25612b03a0cd6f3e5e3d3f10a1f7621adce63c7aa32ebb4aa5d4535e37100ca6ea6
SHA5127312685cba0c7c2e1f9a25721ba3df3cf3882456ccc24ff07de4a9a8d229c306228038cf076afe082b983dc0e2a78105616409ecf4a96776fc06dfa32d017c58
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeFilesize
44KB
MD51cea4098c6e598905eaff15ca2ea2410
SHA1f8bd34ce2d3bbf331d517e18ed2404b0328769aa
SHA25602f43f1ac8e1fac471d772bd3b6a80b684493bbca3f2177891ae272442c05775
SHA5120bdb78e4d7537925c4017f993feffdf842d9df536b8073dbb26e6bce7616f3a07cd0b0497bca17846fad185197cf3d491613e7decabe2cec692dee62fb263c09
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exeFilesize
20KB
MD5fb2a9f8abb1a983c368e19904270f856
SHA1a5cae1a7eaaa7eeb0a246c7beff8ed0dcaaa7d6c
SHA256fb7dd25233ac83d52043e030654e1be42f413e811b21448faf9113024b603b44
SHA512059eae0f89eea12bcdb011b57a6edc05a09fb25945a4fcdf2edc0b442057e92aa77924d902f52b4b49a786a622a19167f431c78ecefb9f309c2afe5afb312fd7
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exeFilesize
17KB
MD5bafbe470c74888de685d88c63661fa5a
SHA12fe2a3d9a9d8bf7055547a57615b2eb9881bc9d8
SHA25668c334c762475e8b3aa39e1e61341c5c1d13ae90dd87a7470fab4088bc96082d
SHA51217f852ecedbddb168cfef659427678d65fba6935383108028216014c61436c00cb920b46f07ff8b2c371f0f8f509e1169d43666dfff85140488d247bdd28dcee
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exeFilesize
6KB
MD507184787e0956b1b9938d81a1e0d26bf
SHA1b0b0de1bd796eea6f233d1fe4d80d661825c9215
SHA25618bae2336a2278d3dacd3e9b875a3cd95517c958e897cb4e2c234445c40f9f2a
SHA512dbf7586901123d28cc4a3a6c1d5e2c2011323570f511bd839532d0103d1a75bb9a7bd15d1b1b2670e3d3a24040dfe92b7a8d2b3002516af12d0e769d368a6232
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exeFilesize
21KB
MD5e3fe49f962688138c8583e08d7f6dd4c
SHA1ae03d902ff44ed462709934c2ba33511d73e28fa
SHA256f906ef8247e730d1b33be28aed54effe1f7f35d121cf6e45bafb08b492181966
SHA5120dd610f43e715e6631ec188ce401a7ff34986f816def71a99d744b1e1c3f6a6e6cb2a33a97bba0b42c4e0a0582e6475c0a64b0decc8b3a2a8d05ef35f9a85c87
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\lua5.1.dllFilesize
17KB
MD514bf034f14e3593f85f44eab9b2b5835
SHA1b87da6e9f014de23a2da04853de56f32e5dc88b8
SHA2564e04da4c1fa6f61d51c3cb561218271b4c9b81e1e3bd21a533c8730c8914aa49
SHA51299f5b1e6c9f9ea26af95d303d26bdee6b06433786aa4e094d25ee374bf184b00cb149b50d27828714da6355281db90cd8e93d7f55076f8c377f9cf1f0416f9a7
-
memory/1212-71-0x0000000000000000-mapping.dmp
-
memory/1212-76-0x00000000735B0000-0x0000000073B5B000-memory.dmpFilesize
5.7MB
-
memory/1312-56-0x0000000000000000-mapping.dmp
-
memory/1680-54-0x0000000076451000-0x0000000076453000-memory.dmpFilesize
8KB