Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-08-2022 19:16
Behavioral task
behavioral1
Sample
VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe
Resource
win10v2004-20220812-en
General
-
Target
VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe
-
Size
111KB
-
MD5
88e469aebd9529524d4420e3bf7d4964
-
SHA1
d8e22b9746702e583b5307b1ed1ac2a0f250f31b
-
SHA256
6cd445a30c853960af9d9ce87a23bf57b22cb494a5c9fe216b2afb296f0654d6
-
SHA512
5977c2755f82ab31375bd0ca99a8ef29d2eabc0a52b62dea40eacc80834250a626293fe017ea3adc5703157760438c5f535475a61b2bfe27a7d4576dfb6ed434
Malware Config
Extracted
njrat
v2.0
Victime
algiriano.ddns.net:6000
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WindowsUpdater.batpid process 1196 WindowsUpdater.bat -
Drops startup file 2 IoCs
Processes:
VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exeWindowsUpdater.batdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk WindowsUpdater.bat -
Loads dropped DLL 1 IoCs
Processes:
VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exepid process 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exeWindowsUpdater.batdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WindowsUpdater.bat" VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe Set value (str) \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdater.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdater.bat Set value (str) \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdater.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" WindowsUpdater.bat -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
WindowsUpdater.batdescription pid process Token: SeDebugPrivilege 1196 WindowsUpdater.bat Token: 33 1196 WindowsUpdater.bat Token: SeIncBasePriorityPrivilege 1196 WindowsUpdater.bat Token: 33 1196 WindowsUpdater.bat Token: SeIncBasePriorityPrivilege 1196 WindowsUpdater.bat Token: 33 1196 WindowsUpdater.bat Token: SeIncBasePriorityPrivilege 1196 WindowsUpdater.bat Token: 33 1196 WindowsUpdater.bat Token: SeIncBasePriorityPrivilege 1196 WindowsUpdater.bat Token: 33 1196 WindowsUpdater.bat Token: SeIncBasePriorityPrivilege 1196 WindowsUpdater.bat Token: 33 1196 WindowsUpdater.bat Token: SeIncBasePriorityPrivilege 1196 WindowsUpdater.bat Token: 33 1196 WindowsUpdater.bat Token: SeIncBasePriorityPrivilege 1196 WindowsUpdater.bat -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exeWindowsUpdater.batdescription pid process target process PID 1808 wrote to memory of 1196 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe WindowsUpdater.bat PID 1808 wrote to memory of 1196 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe WindowsUpdater.bat PID 1808 wrote to memory of 1196 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe WindowsUpdater.bat PID 1808 wrote to memory of 1196 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe WindowsUpdater.bat PID 1808 wrote to memory of 1196 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe WindowsUpdater.bat PID 1808 wrote to memory of 1196 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe WindowsUpdater.bat PID 1808 wrote to memory of 1196 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe WindowsUpdater.bat PID 1808 wrote to memory of 2040 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe attrib.exe PID 1808 wrote to memory of 2040 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe attrib.exe PID 1808 wrote to memory of 2040 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe attrib.exe PID 1808 wrote to memory of 2040 1808 VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe attrib.exe PID 1196 wrote to memory of 1724 1196 WindowsUpdater.bat attrib.exe PID 1196 wrote to memory of 1724 1196 WindowsUpdater.bat attrib.exe PID 1196 wrote to memory of 1724 1196 WindowsUpdater.bat attrib.exe PID 1196 wrote to memory of 1724 1196 WindowsUpdater.bat attrib.exe PID 1196 wrote to memory of 1704 1196 WindowsUpdater.bat attrib.exe PID 1196 wrote to memory of 1704 1196 WindowsUpdater.bat attrib.exe PID 1196 wrote to memory of 1704 1196 WindowsUpdater.bat attrib.exe PID 1196 wrote to memory of 1704 1196 WindowsUpdater.bat attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 2040 attrib.exe 1724 attrib.exe 1704 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe"C:\Users\Admin\AppData\Local\Temp\VXUHEUR-Trojan.MSIL.Crypt.gen-6cd445a30c85396.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.bat"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.bat"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.bat"2⤵
- Views/modifies file attributes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.batFilesize
111KB
MD588e469aebd9529524d4420e3bf7d4964
SHA1d8e22b9746702e583b5307b1ed1ac2a0f250f31b
SHA2566cd445a30c853960af9d9ce87a23bf57b22cb494a5c9fe216b2afb296f0654d6
SHA5125977c2755f82ab31375bd0ca99a8ef29d2eabc0a52b62dea40eacc80834250a626293fe017ea3adc5703157760438c5f535475a61b2bfe27a7d4576dfb6ed434
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.batFilesize
111KB
MD588e469aebd9529524d4420e3bf7d4964
SHA1d8e22b9746702e583b5307b1ed1ac2a0f250f31b
SHA2566cd445a30c853960af9d9ce87a23bf57b22cb494a5c9fe216b2afb296f0654d6
SHA5125977c2755f82ab31375bd0ca99a8ef29d2eabc0a52b62dea40eacc80834250a626293fe017ea3adc5703157760438c5f535475a61b2bfe27a7d4576dfb6ed434
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnkFilesize
1KB
MD54bfb051a34131224e7b94030c98fea8d
SHA10c87ce198a8e04d2c76a01e629e7454baf51b688
SHA256ad4e5f041a40d848d404850b08e5f282e66812a4151627a6429e52faa6599c35
SHA512146f69a063f4be94e1b118534915ca92013384ccfc43c84522e6a755e6cd7b6795323b4ed0e7e243ab658e05e64edce5953e219bd9a64b936cf100ebe35fb28c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnkFilesize
1022B
MD59b20f3e33f751c440eee66fdcdf8fd3a
SHA1d0bf1457286e976c80244abb2a99524a07a90852
SHA256443b3f231ede7b381ff9108cca8925fdd6d4b213535bc673611d927869633533
SHA5121de6f5f6abf8f1b5f2b06d2e170d908bac547229d2a8711c3e08a8e61db7326d1259e4642d68ed9b8babbc0b6de371f5127d26d199ddf428ea9fa65fd2cfd445
-
\Users\Admin\AppData\Local\Temp\WindowsUpdater.batFilesize
111KB
MD588e469aebd9529524d4420e3bf7d4964
SHA1d8e22b9746702e583b5307b1ed1ac2a0f250f31b
SHA2566cd445a30c853960af9d9ce87a23bf57b22cb494a5c9fe216b2afb296f0654d6
SHA5125977c2755f82ab31375bd0ca99a8ef29d2eabc0a52b62dea40eacc80834250a626293fe017ea3adc5703157760438c5f535475a61b2bfe27a7d4576dfb6ed434
-
memory/1196-57-0x0000000000000000-mapping.dmp
-
memory/1196-62-0x0000000074E50000-0x00000000753FB000-memory.dmpFilesize
5.7MB
-
memory/1704-67-0x0000000000000000-mapping.dmp
-
memory/1724-66-0x0000000000000000-mapping.dmp
-
memory/1808-55-0x0000000074E50000-0x00000000753FB000-memory.dmpFilesize
5.7MB
-
memory/1808-54-0x0000000076051000-0x0000000076053000-memory.dmpFilesize
8KB
-
memory/1808-63-0x0000000074E50000-0x00000000753FB000-memory.dmpFilesize
5.7MB
-
memory/2040-60-0x0000000000000000-mapping.dmp