Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 10:13

General

  • Target

    b16945da30d28760d111a30d1461fa4cb548d3febedd0447e82f2799b8912178.exe

  • Size

    868KB

  • MD5

    6344136916735c417ffd49606be4aea0

  • SHA1

    246bec05170515feaf08a88387beb78fe3d01df4

  • SHA256

    b16945da30d28760d111a30d1461fa4cb548d3febedd0447e82f2799b8912178

  • SHA512

    a9bce68c621d5f9affe355c2048cd4b48cc32fefc462aecae676e3ab4b3ea9fdc24f1f94400c8b4ea8a3d2f86e399916788a970ac23aa15b674236e5c26b4009

  • SSDEEP

    24576:c1NRQ0/S7A5SkvNYxllTRS/wibJ482oNrt27EF:c1NQMSdxNSlbN2M4C

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

mosa15.zapto.org:15

Mutex

db202f2d0c993a02c48604d33df7e68f

Attributes
  • reg_key

    db202f2d0c993a02c48604d33df7e68f

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b16945da30d28760d111a30d1461fa4cb548d3febedd0447e82f2799b8912178.exe
    "C:\Users\Admin\AppData\Local\Temp\b16945da30d28760d111a30d1461fa4cb548d3febedd0447e82f2799b8912178.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\s.exe
      "C:\Users\Admin\AppData\Local\Temp\s.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Windows\SysWOW64\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im SYNBOZ.EXE
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1896
      • C:\Windows\SYNBOZMAX\SYNBOZLIB.exe
        "C:\Windows\SYNBOZMAX\SYNBOZLIB.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\RunDll32.exe
          RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 8
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          PID:968
    • C:\Users\Admin\AppData\Local\Temp\6.exe
      "C:\Users\Admin\AppData\Local\Temp\6.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Users\Admin\AppData\Local\Temp\googlachorme.exe
        "C:\Users\Admin\AppData\Local\Temp\googlachorme.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\googlachorme.exe" "googlachorme.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:1676
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x410
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:328

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • C:\Users\Admin\AppData\Local\Temp\6.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • C:\Users\Admin\AppData\Local\Temp\googlachorme.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • C:\Users\Admin\AppData\Local\Temp\googlachorme.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • C:\Users\Admin\AppData\Local\Temp\s.exe
    Filesize

    862KB

    MD5

    849b05a8a0f630bdab9a39223116eda1

    SHA1

    9acf4a1f3cb6035dba398f3ce88cd0922f5d7a32

    SHA256

    d0fed36c8db70c4849c6fe80e44742215104072315ddea41406fecdd744c8ed1

    SHA512

    5347a06d8ecf7b45be36ddf323f9e6ca52fa84f96dfed9d5b6670d0d4425aa0a5918365219c4d9aa5d85cb15b905f16185a3c08ba4f588f9ba266c8ff2d51ea0

  • C:\Users\Admin\AppData\Local\Temp\s.exe
    Filesize

    862KB

    MD5

    849b05a8a0f630bdab9a39223116eda1

    SHA1

    9acf4a1f3cb6035dba398f3ce88cd0922f5d7a32

    SHA256

    d0fed36c8db70c4849c6fe80e44742215104072315ddea41406fecdd744c8ed1

    SHA512

    5347a06d8ecf7b45be36ddf323f9e6ca52fa84f96dfed9d5b6670d0d4425aa0a5918365219c4d9aa5d85cb15b905f16185a3c08ba4f588f9ba266c8ff2d51ea0

  • C:\Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • C:\Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • \Users\Admin\AppData\Local\Temp\6.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • \Users\Admin\AppData\Local\Temp\6.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • \Users\Admin\AppData\Local\Temp\6.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • \Users\Admin\AppData\Local\Temp\googlachorme.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • \Users\Admin\AppData\Local\Temp\googlachorme.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • \Users\Admin\AppData\Local\Temp\googlachorme.exe
    Filesize

    29KB

    MD5

    e4cdddd6b316e2ea7ce8a492428f15c7

    SHA1

    344691143abde6eb48b688145abc2e768e5a3432

    SHA256

    797d02646aa5af694718f9485795fec23578089723c82c8745724edef7c5520c

    SHA512

    a603b7e614fe42ce84ae0ce8c2493e326f937d57df5d3bf824a75d47c50250206b202516755457a1ebf7be7fc844f7229dc773c09127f1b3ff0f0fdff5171aa0

  • \Users\Admin\AppData\Local\Temp\s.exe
    Filesize

    862KB

    MD5

    849b05a8a0f630bdab9a39223116eda1

    SHA1

    9acf4a1f3cb6035dba398f3ce88cd0922f5d7a32

    SHA256

    d0fed36c8db70c4849c6fe80e44742215104072315ddea41406fecdd744c8ed1

    SHA512

    5347a06d8ecf7b45be36ddf323f9e6ca52fa84f96dfed9d5b6670d0d4425aa0a5918365219c4d9aa5d85cb15b905f16185a3c08ba4f588f9ba266c8ff2d51ea0

  • \Users\Admin\AppData\Local\Temp\s.exe
    Filesize

    862KB

    MD5

    849b05a8a0f630bdab9a39223116eda1

    SHA1

    9acf4a1f3cb6035dba398f3ce88cd0922f5d7a32

    SHA256

    d0fed36c8db70c4849c6fe80e44742215104072315ddea41406fecdd744c8ed1

    SHA512

    5347a06d8ecf7b45be36ddf323f9e6ca52fa84f96dfed9d5b6670d0d4425aa0a5918365219c4d9aa5d85cb15b905f16185a3c08ba4f588f9ba266c8ff2d51ea0

  • \Users\Admin\AppData\Local\Temp\s.exe
    Filesize

    862KB

    MD5

    849b05a8a0f630bdab9a39223116eda1

    SHA1

    9acf4a1f3cb6035dba398f3ce88cd0922f5d7a32

    SHA256

    d0fed36c8db70c4849c6fe80e44742215104072315ddea41406fecdd744c8ed1

    SHA512

    5347a06d8ecf7b45be36ddf323f9e6ca52fa84f96dfed9d5b6670d0d4425aa0a5918365219c4d9aa5d85cb15b905f16185a3c08ba4f588f9ba266c8ff2d51ea0

  • \Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • \Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • \Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • \Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • \Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • \Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • \Windows\SYNBOZMAX\SYNBOZLIB.exe
    Filesize

    532KB

    MD5

    8c4c16c0354b29a4c307dea498e93c7d

    SHA1

    fb77560fe6454f1b2e6ad37c77aae79aee997ecd

    SHA256

    81c4a2d44dc6ec5e53fb663b2edce35780084b170c67e8d46bee65e395b99c40

    SHA512

    59c49289333b9e2c8434e6ea39970896828d4f3826ab36f1214cfb7d32adcf146b62b502f5a7274aee0458f524c662ba6c63cbfb49cfc3fbe4bb7212a3ee9191

  • memory/900-56-0x0000000000000000-mapping.dmp
  • memory/968-94-0x0000000000000000-mapping.dmp
  • memory/968-96-0x000000006FB61000-0x000000006FB63000-memory.dmp
    Filesize

    8KB

  • memory/1176-85-0x0000000000000000-mapping.dmp
  • memory/1624-79-0x00000000743F0000-0x000000007499B000-memory.dmp
    Filesize

    5.7MB

  • memory/1624-70-0x0000000000000000-mapping.dmp
  • memory/1624-100-0x00000000743F0000-0x000000007499B000-memory.dmp
    Filesize

    5.7MB

  • memory/1676-97-0x0000000000000000-mapping.dmp
  • memory/1808-54-0x0000000075AC1000-0x0000000075AC3000-memory.dmp
    Filesize

    8KB

  • memory/1896-72-0x0000000000000000-mapping.dmp
  • memory/2024-78-0x00000000743F0000-0x000000007499B000-memory.dmp
    Filesize

    5.7MB

  • memory/2024-59-0x0000000000000000-mapping.dmp