Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 04:03

General

  • Target

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0.exe

  • Size

    23KB

  • MD5

    c3937e4173da9306dc07e161ae067436

  • SHA1

    cbfe2e5dcf01bdeca85d4b15bc258c97411f1c66

  • SHA256

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0

  • SHA512

    5fb4e8cbd7f6e3383368833531f60ebb05d59c5f746cc52012c50820332db28019a55f622db48087428a79fc8fe706c7297af14f6c239af0c25bd665dc1dc0ba

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

fsky2.hopto.org:5552

Mutex

2cc58bd89a2903b40440fbd58d12d95c

Attributes
  • reg_key

    2cc58bd89a2903b40440fbd58d12d95c

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0.exe
    "C:\Users\Admin\AppData\Local\Temp\12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\explorer.exe
      "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\explorer.exe" "explorer.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1192

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
    Filesize

    23KB

    MD5

    c3937e4173da9306dc07e161ae067436

    SHA1

    cbfe2e5dcf01bdeca85d4b15bc258c97411f1c66

    SHA256

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0

    SHA512

    5fb4e8cbd7f6e3383368833531f60ebb05d59c5f746cc52012c50820332db28019a55f622db48087428a79fc8fe706c7297af14f6c239af0c25bd665dc1dc0ba

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
    Filesize

    23KB

    MD5

    c3937e4173da9306dc07e161ae067436

    SHA1

    cbfe2e5dcf01bdeca85d4b15bc258c97411f1c66

    SHA256

    12db2daa8cb68fce8c7ac779d317c6f803477bbefcced7ac9cb779bf674cb0e0

    SHA512

    5fb4e8cbd7f6e3383368833531f60ebb05d59c5f746cc52012c50820332db28019a55f622db48087428a79fc8fe706c7297af14f6c239af0c25bd665dc1dc0ba

  • memory/1192-136-0x0000000000000000-mapping.dmp
  • memory/4416-130-0x00000000747F0000-0x0000000074DA1000-memory.dmp
    Filesize

    5.7MB

  • memory/4416-134-0x00000000747F0000-0x0000000074DA1000-memory.dmp
    Filesize

    5.7MB

  • memory/4460-131-0x0000000000000000-mapping.dmp
  • memory/4460-135-0x00000000747F0000-0x0000000074DA1000-memory.dmp
    Filesize

    5.7MB

  • memory/4460-137-0x00000000747F0000-0x0000000074DA1000-memory.dmp
    Filesize

    5.7MB