Analysis

  • max time kernel
    174s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 14:13

General

  • Target

    11695dc77d6971a58cba9b2230eee1dea2f6f36064ea44fee33a6361d24c4e79.exe

  • Size

    29KB

  • MD5

    634ab053307a90fe48245b72292180a0

  • SHA1

    9f0e59ddeeffa2b280b8f3379902022179521ef2

  • SHA256

    11695dc77d6971a58cba9b2230eee1dea2f6f36064ea44fee33a6361d24c4e79

  • SHA512

    f8e94ac7fe9f6b37be2e0b5262e43a8bcd76a898d6c910e0ddff38eaf58760fa258e7a17128e66e3edecc91fd8faf8be84228dcfaf6cf2fab8c0cd3520c2f6e5

  • SSDEEP

    768:GrD71oGc1FRVp74q2HesBKh0p29SgRHO:kD71IPkjZKhG29jHO

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

feras9999.no-ip.biz:1177

Mutex

d5a38e9b5f206c41f8851bf04a251d26

Attributes
  • reg_key

    d5a38e9b5f206c41f8851bf04a251d26

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11695dc77d6971a58cba9b2230eee1dea2f6f36064ea44fee33a6361d24c4e79.exe
    "C:\Users\Admin\AppData\Local\Temp\11695dc77d6971a58cba9b2230eee1dea2f6f36064ea44fee33a6361d24c4e79.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\chrome.exe
      "C:\Users\Admin\AppData\Local\Temp\chrome.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\chrome.exe" "chrome.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1976

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\chrome.exe
    Filesize

    29KB

    MD5

    634ab053307a90fe48245b72292180a0

    SHA1

    9f0e59ddeeffa2b280b8f3379902022179521ef2

    SHA256

    11695dc77d6971a58cba9b2230eee1dea2f6f36064ea44fee33a6361d24c4e79

    SHA512

    f8e94ac7fe9f6b37be2e0b5262e43a8bcd76a898d6c910e0ddff38eaf58760fa258e7a17128e66e3edecc91fd8faf8be84228dcfaf6cf2fab8c0cd3520c2f6e5

  • C:\Users\Admin\AppData\Local\Temp\chrome.exe
    Filesize

    29KB

    MD5

    634ab053307a90fe48245b72292180a0

    SHA1

    9f0e59ddeeffa2b280b8f3379902022179521ef2

    SHA256

    11695dc77d6971a58cba9b2230eee1dea2f6f36064ea44fee33a6361d24c4e79

    SHA512

    f8e94ac7fe9f6b37be2e0b5262e43a8bcd76a898d6c910e0ddff38eaf58760fa258e7a17128e66e3edecc91fd8faf8be84228dcfaf6cf2fab8c0cd3520c2f6e5

  • \Users\Admin\AppData\Local\Temp\chrome.exe
    Filesize

    29KB

    MD5

    634ab053307a90fe48245b72292180a0

    SHA1

    9f0e59ddeeffa2b280b8f3379902022179521ef2

    SHA256

    11695dc77d6971a58cba9b2230eee1dea2f6f36064ea44fee33a6361d24c4e79

    SHA512

    f8e94ac7fe9f6b37be2e0b5262e43a8bcd76a898d6c910e0ddff38eaf58760fa258e7a17128e66e3edecc91fd8faf8be84228dcfaf6cf2fab8c0cd3520c2f6e5

  • memory/892-56-0x0000000000000000-mapping.dmp
  • memory/892-64-0x0000000074E90000-0x000000007543B000-memory.dmp
    Filesize

    5.7MB

  • memory/892-65-0x0000000074E90000-0x000000007543B000-memory.dmp
    Filesize

    5.7MB

  • memory/1680-54-0x0000000075921000-0x0000000075923000-memory.dmp
    Filesize

    8KB

  • memory/1680-58-0x0000000074E90000-0x000000007543B000-memory.dmp
    Filesize

    5.7MB

  • memory/1680-62-0x0000000074E90000-0x000000007543B000-memory.dmp
    Filesize

    5.7MB

  • memory/1976-61-0x0000000000000000-mapping.dmp