Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 23:52
Static task
static1
Behavioral task
behavioral1
Sample
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe
Resource
win10v2004-20220812-en
General
-
Target
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe
-
Size
110KB
-
MD5
e2244ad72eb4152a062e3eeb5ce1891d
-
SHA1
abfa32d92c0c32b380080f4ba15fbce5a72afb3e
-
SHA256
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474
-
SHA512
0fbd09fb6ce628c416e0252fcfba5e5323f8c2383dff38dc246ea0f1e8e419d0e2b39af150823455f384442259a2d519e05ad25673bc91a7b3979eb425066d5f
-
SSDEEP
1536:I08asokr96ISsdi9wMEkDN63QqMOzOIuxUNUnSqo/f2cDTNX3pc4gggYiURpB5Rf:1sFrHSsW6gnXcUnS9fhHh3pHjGH2KgB
Malware Config
Extracted
njrat
0.7d
HacKed
omarosama123456.ddns.net:1177
456cebe97b6e0b79767853fec7f09165
-
reg_key
456cebe97b6e0b79767853fec7f09165
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
System.exeSystem.exepid process 1896 System.exe 1620 System.exe -
Loads dropped DLL 2 IoCs
Processes:
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exepid process 1688 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 1688 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exeSystem.exedescription pid process target process PID 2032 set thread context of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 1896 set thread context of 1620 1896 System.exe System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exeSystem.exepid process 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 1896 System.exe 1896 System.exe 1896 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exeSystem.exedescription pid process Token: SeDebugPrivilege 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe Token: SeDebugPrivilege 1896 System.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exeSystem.exedescription pid process target process PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 2032 wrote to memory of 1688 2032 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe PID 1688 wrote to memory of 1896 1688 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe System.exe PID 1688 wrote to memory of 1896 1688 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe System.exe PID 1688 wrote to memory of 1896 1688 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe System.exe PID 1688 wrote to memory of 1896 1688 09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe PID 1896 wrote to memory of 1620 1896 System.exe System.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe"C:\Users\Admin\AppData\Local\Temp\09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exeC:\Users\Admin\AppData\Local\Temp\09a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\System.exeC:\Users\Admin\AppData\Roaming\System.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\System.exeFilesize
110KB
MD5e2244ad72eb4152a062e3eeb5ce1891d
SHA1abfa32d92c0c32b380080f4ba15fbce5a72afb3e
SHA25609a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474
SHA5120fbd09fb6ce628c416e0252fcfba5e5323f8c2383dff38dc246ea0f1e8e419d0e2b39af150823455f384442259a2d519e05ad25673bc91a7b3979eb425066d5f
-
C:\Users\Admin\AppData\Roaming\System.exeFilesize
110KB
MD5e2244ad72eb4152a062e3eeb5ce1891d
SHA1abfa32d92c0c32b380080f4ba15fbce5a72afb3e
SHA25609a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474
SHA5120fbd09fb6ce628c416e0252fcfba5e5323f8c2383dff38dc246ea0f1e8e419d0e2b39af150823455f384442259a2d519e05ad25673bc91a7b3979eb425066d5f
-
C:\Users\Admin\AppData\Roaming\System.exeFilesize
110KB
MD5e2244ad72eb4152a062e3eeb5ce1891d
SHA1abfa32d92c0c32b380080f4ba15fbce5a72afb3e
SHA25609a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474
SHA5120fbd09fb6ce628c416e0252fcfba5e5323f8c2383dff38dc246ea0f1e8e419d0e2b39af150823455f384442259a2d519e05ad25673bc91a7b3979eb425066d5f
-
\Users\Admin\AppData\Roaming\System.exeFilesize
110KB
MD5e2244ad72eb4152a062e3eeb5ce1891d
SHA1abfa32d92c0c32b380080f4ba15fbce5a72afb3e
SHA25609a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474
SHA5120fbd09fb6ce628c416e0252fcfba5e5323f8c2383dff38dc246ea0f1e8e419d0e2b39af150823455f384442259a2d519e05ad25673bc91a7b3979eb425066d5f
-
\Users\Admin\AppData\Roaming\System.exeFilesize
110KB
MD5e2244ad72eb4152a062e3eeb5ce1891d
SHA1abfa32d92c0c32b380080f4ba15fbce5a72afb3e
SHA25609a09aafb99588cd17b81a7c33fe66ca7813b4f9d68944b56ed05b3969f8e474
SHA5120fbd09fb6ce628c416e0252fcfba5e5323f8c2383dff38dc246ea0f1e8e419d0e2b39af150823455f384442259a2d519e05ad25673bc91a7b3979eb425066d5f
-
memory/1620-76-0x000000000040749E-mapping.dmp
-
memory/1688-61-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1688-59-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1688-56-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1688-64-0x0000000074E10000-0x00000000753BB000-memory.dmpFilesize
5.7MB
-
memory/1688-73-0x0000000074E10000-0x00000000753BB000-memory.dmpFilesize
5.7MB
-
memory/1688-57-0x000000000040749E-mapping.dmp
-
memory/1896-74-0x0000000074E10000-0x00000000753BB000-memory.dmpFilesize
5.7MB
-
memory/1896-69-0x0000000000000000-mapping.dmp
-
memory/1896-79-0x0000000074E10000-0x00000000753BB000-memory.dmpFilesize
5.7MB
-
memory/1896-80-0x0000000000B85000-0x0000000000B96000-memory.dmpFilesize
68KB
-
memory/2032-54-0x00000000766D1000-0x00000000766D3000-memory.dmpFilesize
8KB
-
memory/2032-63-0x0000000000245000-0x0000000000256000-memory.dmpFilesize
68KB
-
memory/2032-66-0x0000000000245000-0x0000000000256000-memory.dmpFilesize
68KB
-
memory/2032-65-0x0000000074E10000-0x00000000753BB000-memory.dmpFilesize
5.7MB
-
memory/2032-55-0x0000000074E10000-0x00000000753BB000-memory.dmpFilesize
5.7MB