Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 04:03

General

  • Target

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0.exe

  • Size

    23KB

  • MD5

    c3937e4173da9306dc07e161ae067436

  • SHA1

    cbfe2e5dcf01bdeca85d4b15bc258c97411f1c66

  • SHA256

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0

  • SHA512

    5fb4e8cbd7f6e3383368833531f60ebb05d59c5f746cc52012c50820332db28019a55f622db48087428a79fc8fe706c7297af14f6c239af0c25bd665dc1dc0ba

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

fsky2.hopto.org:5552

Mutex

2cc58bd89a2903b40440fbd58d12d95c

Attributes
  • reg_key

    2cc58bd89a2903b40440fbd58d12d95c

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0.exe
    "C:\Users\Admin\AppData\Local\Temp\12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\explorer.exe
      "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\explorer.exe" "explorer.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:692

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
    Filesize

    23KB

    MD5

    c3937e4173da9306dc07e161ae067436

    SHA1

    cbfe2e5dcf01bdeca85d4b15bc258c97411f1c66

    SHA256

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0

    SHA512

    5fb4e8cbd7f6e3383368833531f60ebb05d59c5f746cc52012c50820332db28019a55f622db48087428a79fc8fe706c7297af14f6c239af0c25bd665dc1dc0ba

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
    Filesize

    23KB

    MD5

    c3937e4173da9306dc07e161ae067436

    SHA1

    cbfe2e5dcf01bdeca85d4b15bc258c97411f1c66

    SHA256

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0

    SHA512

    5fb4e8cbd7f6e3383368833531f60ebb05d59c5f746cc52012c50820332db28019a55f622db48087428a79fc8fe706c7297af14f6c239af0c25bd665dc1dc0ba

  • \Users\Admin\AppData\Local\Temp\explorer.exe
    Filesize

    23KB

    MD5

    c3937e4173da9306dc07e161ae067436

    SHA1

    cbfe2e5dcf01bdeca85d4b15bc258c97411f1c66

    SHA256

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0

    SHA512

    5fb4e8cbd7f6e3383368833531f60ebb05d59c5f746cc52012c50820332db28019a55f622db48087428a79fc8fe706c7297af14f6c239af0c25bd665dc1dc0ba

  • memory/608-57-0x0000000000000000-mapping.dmp
  • memory/608-62-0x00000000743A0000-0x000000007494B000-memory.dmp
    Filesize

    5.7MB

  • memory/608-65-0x00000000743A0000-0x000000007494B000-memory.dmp
    Filesize

    5.7MB

  • memory/692-63-0x0000000000000000-mapping.dmp
  • memory/1992-54-0x00000000751C1000-0x00000000751C3000-memory.dmp
    Filesize

    8KB

  • memory/1992-55-0x00000000743A0000-0x000000007494B000-memory.dmp
    Filesize

    5.7MB

  • memory/1992-61-0x00000000743A0000-0x000000007494B000-memory.dmp
    Filesize

    5.7MB