Resubmissions

08-09-2022 17:44

220908-wblklafbe7 3

07-09-2022 00:27

220907-arqnlaafh7 1

05-09-2022 16:52

220905-vdthjsehd3 3

05-09-2022 16:42

220905-t7p7jsegc2 7

05-09-2022 16:37

220905-t49f1sefh3 3

31-08-2022 06:37

220831-hdwlpabhc7 1

31-08-2022 06:32

220831-haw32sabhk 10

31-08-2022 05:40

220831-gcy5rahffl 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    31-08-2022 06:32

General

  • Target

    http://20.7.14.99/server/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

20.7.14.99:5552

Mutex

9636f5e673cfb8069e1ef3d1f8bc784b

Attributes
  • reg_key

    9636f5e673cfb8069e1ef3d1f8bc784b

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://20.7.14.99/server/
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1224
    • C:\Users\Admin\Downloads\Server.exe
      "C:\Users\Admin\Downloads\Server.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:1736

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat
    Filesize

    34KB

    MD5

    e59d05e3ab436d138aa477af9fcac136

    SHA1

    ac2c829b6954e7b74c7cb6e9774592a7a5ff3070

    SHA256

    775e989ea0fd2ad0881f1bae7ea17a8fc88069775eb7e7d00ca1c356c41aec77

    SHA512

    ac3ea11d7b08916638084a23b7a564b6934f4c87cce5eddcbaa425adea25798aaebdb4dc262bef1632296312f693a54067e0fd294f469edd57e1b5265173798d

  • C:\Users\Admin\AppData\Local\Temp\server.exe
    Filesize

    23KB

    MD5

    4cc52b12b15e02c96fed275defa813af

    SHA1

    a35a727745e25e1b71119968d3f090dfc4c07c18

    SHA256

    db62cd044da6120e08c11b7cc41f9ac0fb160adedd1f7a3a6380713d3a305357

    SHA512

    addaa15db05d0eee7f43715406fc41ebd1dd0dc1b626d473c85c302ff541f7033dd77585912e1630e10474db212aa5d9122bb8527d9383437fba9d56e90c3676

  • C:\Users\Admin\AppData\Local\Temp\server.exe
    Filesize

    23KB

    MD5

    4cc52b12b15e02c96fed275defa813af

    SHA1

    a35a727745e25e1b71119968d3f090dfc4c07c18

    SHA256

    db62cd044da6120e08c11b7cc41f9ac0fb160adedd1f7a3a6380713d3a305357

    SHA512

    addaa15db05d0eee7f43715406fc41ebd1dd0dc1b626d473c85c302ff541f7033dd77585912e1630e10474db212aa5d9122bb8527d9383437fba9d56e90c3676

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PPOS0VTN.txt
    Filesize

    608B

    MD5

    d6e4cae8d2e78d449fda6012964eb774

    SHA1

    ddfb5964841e5a2a50ec91f2e0babdc69de8c425

    SHA256

    8c3461ac3a1cfe7ca67cc16d42bc05946a577b18414748081ee1a5bb22dd7c7d

    SHA512

    11b4ebe28519fc92556f087516097b4494f5c16d280b5c80d9617b703e6fe1ba04cad17a6ebb319a31c5d2f18c48c28468b0c8d1befcabc0f7e2a13c8a80b474

  • C:\Users\Admin\Downloads\Server.exe
    Filesize

    23KB

    MD5

    4cc52b12b15e02c96fed275defa813af

    SHA1

    a35a727745e25e1b71119968d3f090dfc4c07c18

    SHA256

    db62cd044da6120e08c11b7cc41f9ac0fb160adedd1f7a3a6380713d3a305357

    SHA512

    addaa15db05d0eee7f43715406fc41ebd1dd0dc1b626d473c85c302ff541f7033dd77585912e1630e10474db212aa5d9122bb8527d9383437fba9d56e90c3676

  • C:\Users\Admin\Downloads\Server.exe.y0ibym7.partial
    Filesize

    23KB

    MD5

    4cc52b12b15e02c96fed275defa813af

    SHA1

    a35a727745e25e1b71119968d3f090dfc4c07c18

    SHA256

    db62cd044da6120e08c11b7cc41f9ac0fb160adedd1f7a3a6380713d3a305357

    SHA512

    addaa15db05d0eee7f43715406fc41ebd1dd0dc1b626d473c85c302ff541f7033dd77585912e1630e10474db212aa5d9122bb8527d9383437fba9d56e90c3676

  • \Users\Admin\AppData\Local\Temp\server.exe
    Filesize

    23KB

    MD5

    4cc52b12b15e02c96fed275defa813af

    SHA1

    a35a727745e25e1b71119968d3f090dfc4c07c18

    SHA256

    db62cd044da6120e08c11b7cc41f9ac0fb160adedd1f7a3a6380713d3a305357

    SHA512

    addaa15db05d0eee7f43715406fc41ebd1dd0dc1b626d473c85c302ff541f7033dd77585912e1630e10474db212aa5d9122bb8527d9383437fba9d56e90c3676

  • memory/1736-67-0x0000000000000000-mapping.dmp
  • memory/1744-61-0x0000000000000000-mapping.dmp
  • memory/1744-66-0x0000000070CC0000-0x000000007126B000-memory.dmp
    Filesize

    5.7MB

  • memory/1744-70-0x0000000070CC0000-0x000000007126B000-memory.dmp
    Filesize

    5.7MB

  • memory/1940-59-0x0000000070CC0000-0x000000007126B000-memory.dmp
    Filesize

    5.7MB

  • memory/1940-58-0x0000000075071000-0x0000000075073000-memory.dmp
    Filesize

    8KB

  • memory/1940-65-0x0000000070CC0000-0x000000007126B000-memory.dmp
    Filesize

    5.7MB

  • memory/1940-56-0x0000000000000000-mapping.dmp