Analysis
-
max time kernel
147s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 04:38
Static task
static1
Behavioral task
behavioral1
Sample
47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe
Resource
win10v2004-20220414-en
General
-
Target
47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe
-
Size
2.5MB
-
MD5
27d06d38b1f8e37b47d23c9efd8e25c9
-
SHA1
b8bdf3ab19c109deb5509f45132686b671fb9552
-
SHA256
47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d
-
SHA512
c8afe02e5ce73b371b09d663189248c1c13395f0b3b1bd92c826223193f304ca1a8d1047bd87e289805ac20c10c9443b04688e8d8699bbf503c5d7f5935a8c85
Malware Config
Extracted
njrat
0.7d
SteamCompany12bit
192.168.1.183:4444
760207cdf3aa547d353591aefcf32cc3
-
reg_key
760207cdf3aa547d353591aefcf32cc3
-
splitter
Y262SUCZ4UJJ
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
S.exepid process 900 S.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 2 IoCs
Processes:
S.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\760207cdf3aa547d353591aefcf32cc3.exe S.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\760207cdf3aa547d353591aefcf32cc3.exe S.exe -
Loads dropped DLL 1 IoCs
Processes:
47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exepid process 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
S.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\760207cdf3aa547d353591aefcf32cc3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\S.exe\" .." S.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\760207cdf3aa547d353591aefcf32cc3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\S.exe\" .." S.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1996 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1996 vlc.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
AUDIODG.EXEvlc.exeS.exedescription pid process Token: 33 1796 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1796 AUDIODG.EXE Token: 33 1796 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1796 AUDIODG.EXE Token: 33 1996 vlc.exe Token: SeIncBasePriorityPrivilege 1996 vlc.exe Token: SeDebugPrivilege 900 S.exe Token: 33 900 S.exe Token: SeIncBasePriorityPrivilege 900 S.exe Token: 33 900 S.exe Token: SeIncBasePriorityPrivilege 900 S.exe Token: 33 900 S.exe Token: SeIncBasePriorityPrivilege 900 S.exe Token: 33 900 S.exe Token: SeIncBasePriorityPrivilege 900 S.exe Token: 33 900 S.exe Token: SeIncBasePriorityPrivilege 900 S.exe Token: 33 900 S.exe Token: SeIncBasePriorityPrivilege 900 S.exe Token: 33 900 S.exe Token: SeIncBasePriorityPrivilege 900 S.exe Token: 33 900 S.exe Token: SeIncBasePriorityPrivilege 900 S.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
vlc.exepid process 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe 1996 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1996 vlc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exeS.exedescription pid process target process PID 1408 wrote to memory of 900 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe S.exe PID 1408 wrote to memory of 900 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe S.exe PID 1408 wrote to memory of 900 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe S.exe PID 1408 wrote to memory of 900 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe S.exe PID 1408 wrote to memory of 1996 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe vlc.exe PID 1408 wrote to memory of 1996 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe vlc.exe PID 1408 wrote to memory of 1996 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe vlc.exe PID 1408 wrote to memory of 1996 1408 47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe vlc.exe PID 900 wrote to memory of 996 900 S.exe netsh.exe PID 900 wrote to memory of 996 900 S.exe netsh.exe PID 900 wrote to memory of 996 900 S.exe netsh.exe PID 900 wrote to memory of 996 900 S.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe"C:\Users\Admin\AppData\Local\Temp\47c6ed7fb2afbadd95212c4dcbb7bd8815c47b218e45c78e8b8589ca93df797d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\S.exe"C:\Users\Admin\AppData\Local\Temp\S.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\S.exe" "S.exe" ENABLE3⤵
- Modifies Windows Firewall
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\2019-08-08 16-45-13.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x56c1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2019-08-08 16-45-13.mp4Filesize
2.5MB
MD52019a19bff2503e95fbc0c56ba275355
SHA1b52c1aa2f3aad7c36d91e806801af8cbae5ff93d
SHA25693d3b795c295d2b5839cbc46814315b688be12df13ee0fb4d6dfe4ecdc900d11
SHA5129b116d68799621b64df45a2eb96d0f286bc4463f424e3eba8f4b03337ea466d70bf94f9d3d313d1a624c85eff5afa9f95b48fac231cfa6164911855e3c46fee9
-
C:\Users\Admin\AppData\Local\Temp\S.exeFilesize
31KB
MD5a5834960773eafc790b7c12f10f4f4f8
SHA17499831a72eb690c753fd849d22aa2bc81f58a1f
SHA25663f21e248f2946030353157e16dc9810827539d74a46b88f9750c5c59a37a00f
SHA5122d2ff3e4e85473f745fb82d0a931fb770584859a7eee125789d72921ccf202884b9a50fd0b8d0cfe722fad243f7fdf5b95289287d10f5119edd4c0d8dd9414ac
-
C:\Users\Admin\AppData\Local\Temp\S.exeFilesize
31KB
MD5a5834960773eafc790b7c12f10f4f4f8
SHA17499831a72eb690c753fd849d22aa2bc81f58a1f
SHA25663f21e248f2946030353157e16dc9810827539d74a46b88f9750c5c59a37a00f
SHA5122d2ff3e4e85473f745fb82d0a931fb770584859a7eee125789d72921ccf202884b9a50fd0b8d0cfe722fad243f7fdf5b95289287d10f5119edd4c0d8dd9414ac
-
\Users\Admin\AppData\Local\Temp\S.exeFilesize
31KB
MD5a5834960773eafc790b7c12f10f4f4f8
SHA17499831a72eb690c753fd849d22aa2bc81f58a1f
SHA25663f21e248f2946030353157e16dc9810827539d74a46b88f9750c5c59a37a00f
SHA5122d2ff3e4e85473f745fb82d0a931fb770584859a7eee125789d72921ccf202884b9a50fd0b8d0cfe722fad243f7fdf5b95289287d10f5119edd4c0d8dd9414ac
-
memory/900-56-0x0000000000000000-mapping.dmp
-
memory/900-63-0x00000000742A0000-0x000000007484B000-memory.dmpFilesize
5.7MB
-
memory/900-65-0x00000000742A0000-0x000000007484B000-memory.dmpFilesize
5.7MB
-
memory/996-64-0x0000000000000000-mapping.dmp
-
memory/1408-54-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/1996-59-0x0000000000000000-mapping.dmp
-
memory/1996-61-0x000007FEFBC21000-0x000007FEFBC23000-memory.dmpFilesize
8KB