Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-07-2022 04:21
Behavioral task
behavioral1
Sample
481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe
Resource
win7-20220414-en
General
-
Target
481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe
-
Size
29KB
-
MD5
761931aa493ef696ab7a6114f5838279
-
SHA1
8930277e98496bc512f7f87f6b67cb90b693fc8b
-
SHA256
481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739
-
SHA512
d14742ec7bfb936396e4538821fd0df9a405939392f263e58ef669ee72f9288ae244e0ee37a00a814ba590385b320c085243fcaa5344f8c2608393d87937577f
Malware Config
Extracted
njrat
0.6.4
love
hostmorning.no-ip.biz:1177
a0ae746fbab3868c8ea432a9f04c7d16
-
reg_key
a0ae746fbab3868c8ea432a9f04c7d16
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
idn.exepid process 1568 idn.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 1 IoCs
Processes:
481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exepid process 1980 481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
idn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\a0ae746fbab3868c8ea432a9f04c7d16 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\idn.exe\" .." idn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\a0ae746fbab3868c8ea432a9f04c7d16 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\idn.exe\" .." idn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
idn.exepid process 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe 1568 idn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
idn.exedescription pid process Token: SeDebugPrivilege 1568 idn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exeidn.exedescription pid process target process PID 1980 wrote to memory of 1568 1980 481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe idn.exe PID 1980 wrote to memory of 1568 1980 481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe idn.exe PID 1980 wrote to memory of 1568 1980 481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe idn.exe PID 1980 wrote to memory of 1568 1980 481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe idn.exe PID 1568 wrote to memory of 1532 1568 idn.exe netsh.exe PID 1568 wrote to memory of 1532 1568 idn.exe netsh.exe PID 1568 wrote to memory of 1532 1568 idn.exe netsh.exe PID 1568 wrote to memory of 1532 1568 idn.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe"C:\Users\Admin\AppData\Local\Temp\481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\idn.exe"C:\Users\Admin\AppData\Local\Temp\idn.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\idn.exe" "idn.exe" ENABLE3⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\idn.exeFilesize
29KB
MD5761931aa493ef696ab7a6114f5838279
SHA18930277e98496bc512f7f87f6b67cb90b693fc8b
SHA256481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739
SHA512d14742ec7bfb936396e4538821fd0df9a405939392f263e58ef669ee72f9288ae244e0ee37a00a814ba590385b320c085243fcaa5344f8c2608393d87937577f
-
C:\Users\Admin\AppData\Local\Temp\idn.exeFilesize
29KB
MD5761931aa493ef696ab7a6114f5838279
SHA18930277e98496bc512f7f87f6b67cb90b693fc8b
SHA256481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739
SHA512d14742ec7bfb936396e4538821fd0df9a405939392f263e58ef669ee72f9288ae244e0ee37a00a814ba590385b320c085243fcaa5344f8c2608393d87937577f
-
\Users\Admin\AppData\Local\Temp\idn.exeFilesize
29KB
MD5761931aa493ef696ab7a6114f5838279
SHA18930277e98496bc512f7f87f6b67cb90b693fc8b
SHA256481744d8559043a22a7a164cad83799725f289b5a4bdfbf6a267df31a758c739
SHA512d14742ec7bfb936396e4538821fd0df9a405939392f263e58ef669ee72f9288ae244e0ee37a00a814ba590385b320c085243fcaa5344f8c2608393d87937577f
-
memory/1532-61-0x0000000000000000-mapping.dmp
-
memory/1568-56-0x0000000000000000-mapping.dmp
-
memory/1568-62-0x0000000074970000-0x0000000074F1B000-memory.dmpFilesize
5.7MB
-
memory/1568-64-0x0000000074970000-0x0000000074F1B000-memory.dmpFilesize
5.7MB
-
memory/1980-54-0x00000000768D1000-0x00000000768D3000-memory.dmpFilesize
8KB
-
memory/1980-60-0x0000000074970000-0x0000000074F1B000-memory.dmpFilesize
5.7MB