Analysis

  • max time kernel
    1796s
  • max time network
    1803s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 21:10

General

  • Target

    74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe

  • Size

    572KB

  • MD5

    3c62f18b9cc44d48e2187bf66d9fae04

  • SHA1

    7010bf5ae66555b4891eb32b9e7b1e2ab603bf8b

  • SHA256

    74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8

  • SHA512

    2f82f30fbfe30b2be09538e9c0c465aa9fd71135e42cd9103b56a1ed4dbabcf1347475aa78277d7b87ade5c217e20f39896466cd3309010a81208015d1b028d6

  • SSDEEP

    12288:hToPWBv/cpGrU3yXoT77F1KQSSOS14Gr59aAqg4/G:hTbBv5rUfFnSST14GrfAR/G

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

FRANSESCOTQ3LjE4NS4yFRANSESCOjEuFRANSESCOjEx:MjAxMTE=

Mutex

15c02f637abec4a65e1044f0fcf0abcc

Attributes
  • reg_key

    15c02f637abec4a65e1044f0fcf0abcc

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe
    "C:\Users\Admin\AppData\Local\Temp\74010de42a61c8836e3139b705d25bfbf12879c772594e614fc690a1878280e8.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\a.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c start wifi.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:336
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wifi.exe
          wifi.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1192
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c start conhost.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\conhost.exe
          conhost.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\RarSFX0\conhost.exe" "conhost.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            PID:1028
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c start system.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:304
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system.exe
          system.exe
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:676

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\a.bat
    Filesize

    72B

    MD5

    1e69f563f624286bb08f54117072090f

    SHA1

    7ba580822307de955385917a4f6db8eb08e074fa

    SHA256

    27913eda39841546c3dfa735db3cdbbb5450a5388fca2cc2956e0ba3fdb9970b

    SHA512

    a6e9af3f0eb0f69e2fbad033462de5b5fd423553c69379053b4626d381d754d3840e822e3eb4427d430ac8845457ae5eee7d8fa88781ae6fa4cb795f8f0a86aa

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\conhost.exe
    Filesize

    93KB

    MD5

    c6364a0668fe7a9bac5b67fc6983586a

    SHA1

    0657571e752e99daaee81e96feddc915398ac90c

    SHA256

    45c0da24b5057cff90fcfd896a33ec9e4c7fb75e918c70a7e19e7ea6ddc806b0

    SHA512

    fb23c1c9282a4ab641b4f7f08f8eb71558594e6611e258bd56990a1a6bbbd7aaaf8301f20815aa7c48d05372b4ad695336ee43b346e329350fbb59f01d240e56

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\conhost.exe
    Filesize

    93KB

    MD5

    c6364a0668fe7a9bac5b67fc6983586a

    SHA1

    0657571e752e99daaee81e96feddc915398ac90c

    SHA256

    45c0da24b5057cff90fcfd896a33ec9e4c7fb75e918c70a7e19e7ea6ddc806b0

    SHA512

    fb23c1c9282a4ab641b4f7f08f8eb71558594e6611e258bd56990a1a6bbbd7aaaf8301f20815aa7c48d05372b4ad695336ee43b346e329350fbb59f01d240e56

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system.exe
    Filesize

    159KB

    MD5

    ec66102014000040e566229d431aa206

    SHA1

    16ec31507cf63505535bae4c931865afa8566b39

    SHA256

    b7c257aac74c25f3fc568f579f64155d664f59a3743a5238df279c35d6435380

    SHA512

    74b40388a5e9f6ecadd2f43858009ccb8a1b66b799dd610bfcd7275dc0a04bc4d0ace56cc7b513a0a3c39fef4bb5a87f055fd5e22a5e6dcbd6bcdf050a2ea090

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system.exe
    Filesize

    159KB

    MD5

    ec66102014000040e566229d431aa206

    SHA1

    16ec31507cf63505535bae4c931865afa8566b39

    SHA256

    b7c257aac74c25f3fc568f579f64155d664f59a3743a5238df279c35d6435380

    SHA512

    74b40388a5e9f6ecadd2f43858009ccb8a1b66b799dd610bfcd7275dc0a04bc4d0ace56cc7b513a0a3c39fef4bb5a87f055fd5e22a5e6dcbd6bcdf050a2ea090

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wifi.exe
    Filesize

    36KB

    MD5

    4b5a108918f563dab60d63a7e79b7046

    SHA1

    cff2a9c877b786821fb8d8b9111e3724ace1de9f

    SHA256

    a4eec1d719b512b3cbf4daff311db391269e5d63deb46f0c4da3d63f0833a3c0

    SHA512

    a60cc3dbd33bb68d304df4e9870cf33a41e97fce9ad9c84b7d67ca89a68bf58050f1b1cea5ea14d0b299d217a8e1bf01dadd2b4b19a148346223bab11791e8a7

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wifi.exe
    Filesize

    36KB

    MD5

    4b5a108918f563dab60d63a7e79b7046

    SHA1

    cff2a9c877b786821fb8d8b9111e3724ace1de9f

    SHA256

    a4eec1d719b512b3cbf4daff311db391269e5d63deb46f0c4da3d63f0833a3c0

    SHA512

    a60cc3dbd33bb68d304df4e9870cf33a41e97fce9ad9c84b7d67ca89a68bf58050f1b1cea5ea14d0b299d217a8e1bf01dadd2b4b19a148346223bab11791e8a7

  • \Users\Admin\AppData\Local\Temp\RarSFX0\conhost.exe
    Filesize

    93KB

    MD5

    c6364a0668fe7a9bac5b67fc6983586a

    SHA1

    0657571e752e99daaee81e96feddc915398ac90c

    SHA256

    45c0da24b5057cff90fcfd896a33ec9e4c7fb75e918c70a7e19e7ea6ddc806b0

    SHA512

    fb23c1c9282a4ab641b4f7f08f8eb71558594e6611e258bd56990a1a6bbbd7aaaf8301f20815aa7c48d05372b4ad695336ee43b346e329350fbb59f01d240e56

  • \Users\Admin\AppData\Local\Temp\RarSFX0\conhost.exe
    Filesize

    93KB

    MD5

    c6364a0668fe7a9bac5b67fc6983586a

    SHA1

    0657571e752e99daaee81e96feddc915398ac90c

    SHA256

    45c0da24b5057cff90fcfd896a33ec9e4c7fb75e918c70a7e19e7ea6ddc806b0

    SHA512

    fb23c1c9282a4ab641b4f7f08f8eb71558594e6611e258bd56990a1a6bbbd7aaaf8301f20815aa7c48d05372b4ad695336ee43b346e329350fbb59f01d240e56

  • \Users\Admin\AppData\Local\Temp\RarSFX0\conhost.exe
    Filesize

    93KB

    MD5

    c6364a0668fe7a9bac5b67fc6983586a

    SHA1

    0657571e752e99daaee81e96feddc915398ac90c

    SHA256

    45c0da24b5057cff90fcfd896a33ec9e4c7fb75e918c70a7e19e7ea6ddc806b0

    SHA512

    fb23c1c9282a4ab641b4f7f08f8eb71558594e6611e258bd56990a1a6bbbd7aaaf8301f20815aa7c48d05372b4ad695336ee43b346e329350fbb59f01d240e56

  • \Users\Admin\AppData\Local\Temp\RarSFX0\system.exe
    Filesize

    159KB

    MD5

    ec66102014000040e566229d431aa206

    SHA1

    16ec31507cf63505535bae4c931865afa8566b39

    SHA256

    b7c257aac74c25f3fc568f579f64155d664f59a3743a5238df279c35d6435380

    SHA512

    74b40388a5e9f6ecadd2f43858009ccb8a1b66b799dd610bfcd7275dc0a04bc4d0ace56cc7b513a0a3c39fef4bb5a87f055fd5e22a5e6dcbd6bcdf050a2ea090

  • \Users\Admin\AppData\Local\Temp\RarSFX0\system.exe
    Filesize

    159KB

    MD5

    ec66102014000040e566229d431aa206

    SHA1

    16ec31507cf63505535bae4c931865afa8566b39

    SHA256

    b7c257aac74c25f3fc568f579f64155d664f59a3743a5238df279c35d6435380

    SHA512

    74b40388a5e9f6ecadd2f43858009ccb8a1b66b799dd610bfcd7275dc0a04bc4d0ace56cc7b513a0a3c39fef4bb5a87f055fd5e22a5e6dcbd6bcdf050a2ea090

  • \Users\Admin\AppData\Local\Temp\RarSFX0\system.exe
    Filesize

    159KB

    MD5

    ec66102014000040e566229d431aa206

    SHA1

    16ec31507cf63505535bae4c931865afa8566b39

    SHA256

    b7c257aac74c25f3fc568f579f64155d664f59a3743a5238df279c35d6435380

    SHA512

    74b40388a5e9f6ecadd2f43858009ccb8a1b66b799dd610bfcd7275dc0a04bc4d0ace56cc7b513a0a3c39fef4bb5a87f055fd5e22a5e6dcbd6bcdf050a2ea090

  • \Users\Admin\AppData\Local\Temp\RarSFX0\wifi.exe
    Filesize

    36KB

    MD5

    4b5a108918f563dab60d63a7e79b7046

    SHA1

    cff2a9c877b786821fb8d8b9111e3724ace1de9f

    SHA256

    a4eec1d719b512b3cbf4daff311db391269e5d63deb46f0c4da3d63f0833a3c0

    SHA512

    a60cc3dbd33bb68d304df4e9870cf33a41e97fce9ad9c84b7d67ca89a68bf58050f1b1cea5ea14d0b299d217a8e1bf01dadd2b4b19a148346223bab11791e8a7

  • \Users\Admin\AppData\Local\Temp\RarSFX0\wifi.exe
    Filesize

    36KB

    MD5

    4b5a108918f563dab60d63a7e79b7046

    SHA1

    cff2a9c877b786821fb8d8b9111e3724ace1de9f

    SHA256

    a4eec1d719b512b3cbf4daff311db391269e5d63deb46f0c4da3d63f0833a3c0

    SHA512

    a60cc3dbd33bb68d304df4e9870cf33a41e97fce9ad9c84b7d67ca89a68bf58050f1b1cea5ea14d0b299d217a8e1bf01dadd2b4b19a148346223bab11791e8a7

  • memory/304-72-0x0000000000000000-mapping.dmp
  • memory/336-59-0x0000000000000000-mapping.dmp
  • memory/676-77-0x0000000000000000-mapping.dmp
  • memory/676-80-0x0000000000D90000-0x0000000000DBE000-memory.dmp
    Filesize

    184KB

  • memory/976-54-0x0000000074E41000-0x0000000074E43000-memory.dmp
    Filesize

    8KB

  • memory/1028-82-0x0000000000000000-mapping.dmp
  • memory/1192-63-0x0000000000000000-mapping.dmp
  • memory/1248-57-0x0000000000000000-mapping.dmp
  • memory/1660-70-0x0000000000000000-mapping.dmp
  • memory/1660-81-0x0000000073820000-0x0000000073DCB000-memory.dmp
    Filesize

    5.7MB

  • memory/1660-84-0x0000000073820000-0x0000000073DCB000-memory.dmp
    Filesize

    5.7MB

  • memory/1664-65-0x0000000000000000-mapping.dmp