Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 12:23
Behavioral task
behavioral1
Sample
c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe
Resource
win10v2004-20220812-en
General
-
Target
c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe
-
Size
29KB
-
MD5
642dfb848c81bc8041cf6d752f8cc900
-
SHA1
1f778a332d590a9faf89fba51b483a93846a0af0
-
SHA256
c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0
-
SHA512
eb91aa69484dc77302f078f587e4858332bc7b4871a6d314c4b98eef2b468c9f3429ef7e502702aa0ef2f4e077a15fe0d284c7ef2c493bfe74f9d8acf54b409c
-
SSDEEP
384:SFpQjtl7jBnoKoK3JX15nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZzX:Si7hoKoGJFNK4Aq1RehBKh0p29SgRd9
Malware Config
Extracted
njrat
0.6.4
HacKed
127.0.0.1:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2380 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4008 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe 2380 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2380 Trojan.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3436 wrote to memory of 2380 3436 c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe 83 PID 3436 wrote to memory of 2380 3436 c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe 83 PID 3436 wrote to memory of 2380 3436 c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe 83 PID 2380 wrote to memory of 4008 2380 Trojan.exe 84 PID 2380 wrote to memory of 4008 2380 Trojan.exe 84 PID 2380 wrote to memory of 4008 2380 Trojan.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe"C:\Users\Admin\AppData\Local\Temp\c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4008
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5642dfb848c81bc8041cf6d752f8cc900
SHA11f778a332d590a9faf89fba51b483a93846a0af0
SHA256c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0
SHA512eb91aa69484dc77302f078f587e4858332bc7b4871a6d314c4b98eef2b468c9f3429ef7e502702aa0ef2f4e077a15fe0d284c7ef2c493bfe74f9d8acf54b409c
-
Filesize
29KB
MD5642dfb848c81bc8041cf6d752f8cc900
SHA11f778a332d590a9faf89fba51b483a93846a0af0
SHA256c19e6a377a5b8926f96c6f06363ce714b12317633137c728bffe9a816d9620c0
SHA512eb91aa69484dc77302f078f587e4858332bc7b4871a6d314c4b98eef2b468c9f3429ef7e502702aa0ef2f4e077a15fe0d284c7ef2c493bfe74f9d8acf54b409c