Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-07-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe
Resource
win10v2004-20220414-en
General
-
Target
9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe
-
Size
13.2MB
-
MD5
c00c09e7fa52bc19bd425d71e78ff4cb
-
SHA1
2cd1a7130a03d4056454733b62e4667a08451262
-
SHA256
9bb347dce075e62a7df2121b6f413769b564e0b58d4302a2372bedeac6a2880b
-
SHA512
8d18238fe7c906ddd155b8af3a0d32604aeafaf352ab1947a07f273168740c5971083b157c7e21b74125a7e42d8684db5daba2cb3bc4971ca92f20949828a9d5
Malware Config
Extracted
njrat
v2.0
System
2.tcp.ngrok.io:13817
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE 3 IoCs
Processes:
paylod.exeremcos.exeSystem.exepid process 3136 paylod.exe 4916 remcos.exe 3200 System.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exepaylod.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation paylod.exe -
Drops startup file 2 IoCs
Processes:
System.exepaylod.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk System.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk paylod.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
System.exepaylod.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\ProgramData\\System.exe" paylod.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
remcos.exepid process 4916 remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
remcos.exepid process 4916 remcos.exe 4916 remcos.exe 4916 remcos.exe 4916 remcos.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
System.exedescription pid process Token: SeDebugPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe Token: 33 3200 System.exe Token: SeIncBasePriorityPrivilege 3200 System.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
remcos.exepid process 4916 remcos.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exepaylod.exedescription pid process target process PID 752 wrote to memory of 3136 752 9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe paylod.exe PID 752 wrote to memory of 3136 752 9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe paylod.exe PID 752 wrote to memory of 3136 752 9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe paylod.exe PID 752 wrote to memory of 4916 752 9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe remcos.exe PID 752 wrote to memory of 4916 752 9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe remcos.exe PID 752 wrote to memory of 4916 752 9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe remcos.exe PID 3136 wrote to memory of 3200 3136 paylod.exe System.exe PID 3136 wrote to memory of 3200 3136 paylod.exe System.exe PID 3136 wrote to memory of 3200 3136 paylod.exe System.exe PID 3136 wrote to memory of 3992 3136 paylod.exe attrib.exe PID 3136 wrote to memory of 3992 3136 paylod.exe attrib.exe PID 3136 wrote to memory of 3992 3136 paylod.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe"C:\Users\Admin\AppData\Local\Temp\9BB347DCE075E62A7DF2121B6F413769B564E0B58D430.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\paylod.exe"C:\Users\Admin\AppData\Local\Temp\paylod.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\ProgramData\System.exe"3⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\remcos.exe"C:\Users\Admin\AppData\Local\Temp\remcos.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\System.exeFilesize
26KB
MD524bf1ae1d62be5e1283fc4ddc9110dd9
SHA17b60b080982e77eb4565dce877236297280fcf36
SHA25655cc06f563e305e118f8d9d6307e88de5f802cd36f6bdf394e17b95bf852bd69
SHA512b0b1228c90ac6f795c3ee641c94045023cfc8fea0dba82c37c382cc91376c3b03ca0900c82881d9c8d99363a4fdeca4e8bc758c47730444195d0c52703bef391
-
C:\ProgramData\System.exeFilesize
26KB
MD524bf1ae1d62be5e1283fc4ddc9110dd9
SHA17b60b080982e77eb4565dce877236297280fcf36
SHA25655cc06f563e305e118f8d9d6307e88de5f802cd36f6bdf394e17b95bf852bd69
SHA512b0b1228c90ac6f795c3ee641c94045023cfc8fea0dba82c37c382cc91376c3b03ca0900c82881d9c8d99363a4fdeca4e8bc758c47730444195d0c52703bef391
-
C:\Users\Admin\AppData\Local\Temp\paylod.exeFilesize
26KB
MD524bf1ae1d62be5e1283fc4ddc9110dd9
SHA17b60b080982e77eb4565dce877236297280fcf36
SHA25655cc06f563e305e118f8d9d6307e88de5f802cd36f6bdf394e17b95bf852bd69
SHA512b0b1228c90ac6f795c3ee641c94045023cfc8fea0dba82c37c382cc91376c3b03ca0900c82881d9c8d99363a4fdeca4e8bc758c47730444195d0c52703bef391
-
C:\Users\Admin\AppData\Local\Temp\paylod.exeFilesize
26KB
MD524bf1ae1d62be5e1283fc4ddc9110dd9
SHA17b60b080982e77eb4565dce877236297280fcf36
SHA25655cc06f563e305e118f8d9d6307e88de5f802cd36f6bdf394e17b95bf852bd69
SHA512b0b1228c90ac6f795c3ee641c94045023cfc8fea0dba82c37c382cc91376c3b03ca0900c82881d9c8d99363a4fdeca4e8bc758c47730444195d0c52703bef391
-
C:\Users\Admin\AppData\Local\Temp\remcos.exeFilesize
9.9MB
MD5ed1e424ea6f625968a334377e8ac629f
SHA1ad00cc58a59a3d5b78d6603a1d09378e5dbd1647
SHA2561e5375b400f68c422804703390489b2cf3968c2a8bccb0b5b3c55fe1d2e3c991
SHA5125119b6ac8c1becda5b59a4802fc96828d338ba2d2767e5521bc226bf04b6637c1925b0cc1b0cf560540b1399730f695c55de23665e59d0683eb07d32939b8094
-
C:\Users\Admin\AppData\Local\Temp\remcos.exeFilesize
9.9MB
MD5ed1e424ea6f625968a334377e8ac629f
SHA1ad00cc58a59a3d5b78d6603a1d09378e5dbd1647
SHA2561e5375b400f68c422804703390489b2cf3968c2a8bccb0b5b3c55fe1d2e3c991
SHA5125119b6ac8c1becda5b59a4802fc96828d338ba2d2767e5521bc226bf04b6637c1925b0cc1b0cf560540b1399730f695c55de23665e59d0683eb07d32939b8094
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnkFilesize
1KB
MD5410ae6573a57f8905a61a761ba8a4bf7
SHA105f7ac4fbb3b28620c2d1e3bdf720dfc0dfc49c9
SHA256e42e80a74d27dc83abfba9279eec985235c2c38635fb581eff53920868bdb1fc
SHA5123051abccb8d94dfb95a16a8f935463a8a320a55d854f5482a124e64768d0dfee01e23cb7401a9f15063219a015101263cc738e8b72122f7256b2d1cfb9030438
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnkFilesize
1KB
MD588186e2545bd518b1e115b85887ae39f
SHA11251bf62f316af94da94c16b37fc7fa03c3c212d
SHA256b80c05ac61f81322b55b0b4519042a0c5b160a076ead78b43d59d28386314c6d
SHA51211ab6eef239e777ed25fdd8b919e25faf24049aac23c3fd3cc1bb04de095d4204897eab3cc603144bbf23866a93ec407ee74827abf098ca819ce8f4e57121974
-
memory/752-136-0x0000000074CF0000-0x00000000752A1000-memory.dmpFilesize
5.7MB
-
memory/752-130-0x0000000074CF0000-0x00000000752A1000-memory.dmpFilesize
5.7MB
-
memory/3136-138-0x0000000074CF0000-0x00000000752A1000-memory.dmpFilesize
5.7MB
-
memory/3136-131-0x0000000000000000-mapping.dmp
-
memory/3136-147-0x0000000074CF0000-0x00000000752A1000-memory.dmpFilesize
5.7MB
-
memory/3200-152-0x0000000074CF0000-0x00000000752A1000-memory.dmpFilesize
5.7MB
-
memory/3200-150-0x0000000074CF0000-0x00000000752A1000-memory.dmpFilesize
5.7MB
-
memory/3200-143-0x0000000000000000-mapping.dmp
-
memory/3992-145-0x0000000000000000-mapping.dmp
-
memory/4916-139-0x0000000000400000-0x0000000001ABE000-memory.dmpFilesize
22.7MB
-
memory/4916-134-0x0000000000000000-mapping.dmp
-
memory/4916-142-0x0000000000400000-0x0000000001ABE000-memory.dmpFilesize
22.7MB
-
memory/4916-151-0x0000000000400000-0x0000000001ABE000-memory.dmpFilesize
22.7MB
-
memory/4916-141-0x0000000000400000-0x0000000001ABE000-memory.dmpFilesize
22.7MB