Analysis

  • max time kernel
    30s
  • max time network
    29s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220718-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-07-2022 09:43

General

  • Target

    Doc Exploit.exe

  • Size

    962KB

  • MD5

    1daa09b102d6ab7c6018c1eef85b5ede

  • SHA1

    f78812012be7b8835a20f304ae23f7b27e1e43f2

  • SHA256

    30a1c47c640de86c7a315b94519678372dec89ff78e05690b93cfd180cb66f86

  • SHA512

    aa22a9e33e81dca276081b86406594df2aebfc52414f5a86b95f591ed163d7ae77d9012badaf1cacbc3ce7027cc0bae86d66233337eae222c1a13fa24b4ca57e

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

contents-burn.at.playit.gg:50182

Mutex

5276b1886f2a5c8a7d50871be674198b

Attributes
  • reg_key

    5276b1886f2a5c8a7d50871be674198b

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Doc Exploit.exe
    "C:\Users\Admin\AppData\Local\Temp\Doc Exploit.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Roaming\Explorer.exe
      "C:\Users\Admin\AppData\Roaming\Explorer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Explorer.exe" "Explorer.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:3288
    • C:\Users\Admin\AppData\Roaming\Doc.exe
      "C:\Users\Admin\AppData\Roaming\Doc.exe"
      2⤵
      • Executes dropped EXE
      PID:1792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Doc.exe

    Filesize

    503KB

    MD5

    c6bf43d4b46a1f80d2393d530a6803f3

    SHA1

    6fd8394c4298f217bb00da13ffc3946ed9d7d8b8

    SHA256

    6cbd12e0322d1332c29e3d1e14d9fda173e2ea7f74eb645986b3152dfb9aa348

    SHA512

    0ee229f37a3f45197f45469c83f357a0d240eadede36c1a7aab7a3a1d85692903e6f4d5451764db28bb58323c001c9df6dadf20f0fd30977265a8dd87784418d

  • C:\Users\Admin\AppData\Roaming\Doc.exe

    Filesize

    503KB

    MD5

    c6bf43d4b46a1f80d2393d530a6803f3

    SHA1

    6fd8394c4298f217bb00da13ffc3946ed9d7d8b8

    SHA256

    6cbd12e0322d1332c29e3d1e14d9fda173e2ea7f74eb645986b3152dfb9aa348

    SHA512

    0ee229f37a3f45197f45469c83f357a0d240eadede36c1a7aab7a3a1d85692903e6f4d5451764db28bb58323c001c9df6dadf20f0fd30977265a8dd87784418d

  • C:\Users\Admin\AppData\Roaming\Explorer.exe

    Filesize

    88KB

    MD5

    47ad4afb1db6f901de4fadf9d579879c

    SHA1

    61a35a823cc93b8ae034aeacd0dd33af5c081094

    SHA256

    149f7ab886543e93f5dec6dbac775906ecfa5849649d773befafed1623a67e07

    SHA512

    1362420d440765bd42ef68bd72d2449dc2cac555c5c34eae5b0ea95099b75dc6cfaa809eb7c01a36b9546e0f9a4e7431c63d24b39af5999d90bd009a2bf674e8

  • C:\Users\Admin\AppData\Roaming\Explorer.exe

    Filesize

    88KB

    MD5

    47ad4afb1db6f901de4fadf9d579879c

    SHA1

    61a35a823cc93b8ae034aeacd0dd33af5c081094

    SHA256

    149f7ab886543e93f5dec6dbac775906ecfa5849649d773befafed1623a67e07

    SHA512

    1362420d440765bd42ef68bd72d2449dc2cac555c5c34eae5b0ea95099b75dc6cfaa809eb7c01a36b9546e0f9a4e7431c63d24b39af5999d90bd009a2bf674e8

  • memory/1792-138-0x0000000000470000-0x00000000004F2000-memory.dmp

    Filesize

    520KB

  • memory/1792-144-0x0000000005140000-0x0000000005196000-memory.dmp

    Filesize

    344KB

  • memory/1792-133-0x0000000000000000-mapping.dmp

  • memory/1792-143-0x0000000004E90000-0x0000000004E9A000-memory.dmp

    Filesize

    40KB

  • memory/1792-141-0x0000000004FB0000-0x0000000005042000-memory.dmp

    Filesize

    584KB

  • memory/1792-139-0x0000000004F10000-0x0000000004FAC000-memory.dmp

    Filesize

    624KB

  • memory/1792-140-0x0000000005560000-0x0000000005B04000-memory.dmp

    Filesize

    5.6MB

  • memory/2588-130-0x0000000000570000-0x0000000000666000-memory.dmp

    Filesize

    984KB

  • memory/2588-137-0x00007FFC487B0000-0x00007FFC49271000-memory.dmp

    Filesize

    10.8MB

  • memory/2588-146-0x00007FFC487B0000-0x00007FFC49271000-memory.dmp

    Filesize

    10.8MB

  • memory/3288-145-0x0000000000000000-mapping.dmp

  • memory/3668-142-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB

  • memory/3668-131-0x0000000000000000-mapping.dmp

  • memory/3668-147-0x0000000074A40000-0x0000000074FF1000-memory.dmp

    Filesize

    5.7MB