Analysis

  • max time kernel
    118s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 01:48

General

  • Target

    b88e59a671c867f267518f0deb3ed811db8e0ffb28d686e607f21750c63a5d8d.exe

  • Size

    26KB

  • MD5

    6b83c9f02abe3ce67e3d1b8c5f51d980

  • SHA1

    577ce124a5e939ba7a47aa6b2a11f85550dd42e1

  • SHA256

    b88e59a671c867f267518f0deb3ed811db8e0ffb28d686e607f21750c63a5d8d

  • SHA512

    9057e733e4a9ef5eeccccc95244e25adc0017e870aebe347afde8df58e8c74a5c682ec5a16184f978a612083f4de32c295fc065d23033bf89a686bf3b497122e

  • SSDEEP

    384:Zf5PFbpphlkPJC5eyq9jbECJ23nzWadIiuj2hd0hAIGTLqNznL78drggtxXJC:ZfDXhdWbEkbi6hAdLgPAtxXA

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

:D

C2

governmentservice.servebeer.com:20968

Mutex

dd8213f1bf066875b4691b73b62514e4

Attributes
  • reg_key

    dd8213f1bf066875b4691b73b62514e4

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b88e59a671c867f267518f0deb3ed811db8e0ffb28d686e607f21750c63a5d8d.exe
    "C:\Users\Admin\AppData\Local\Temp\b88e59a671c867f267518f0deb3ed811db8e0ffb28d686e607f21750c63a5d8d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\SysWOW64\svchost.exe
      "\Windows\System32\svchost.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:276
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1684

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MV31TML1.txt
    Filesize

    608B

    MD5

    11657c3c8e7d262660265b04c069c8e8

    SHA1

    476d1e93c198f6aee9b5e2e289749dcd9b55e5eb

    SHA256

    6ee27b941ce4dd522dc649d37cfb9634e5acaf5fd4e349cb3e3efc0b9aac627b

    SHA512

    dab5ba4d4b0ac75dceab24da370572b4dfad23f4d6d2c6aa679991e502b8358eb9465ef28e8824487c41830218df3766600c9ccc12b3585c5496a90dc5fcd17c

  • memory/276-61-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/276-57-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/276-58-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/276-60-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/276-62-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/276-63-0x000000000040749E-mapping.dmp
  • memory/276-65-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/276-67-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1396-56-0x0000000074720000-0x0000000074CCB000-memory.dmp
    Filesize

    5.7MB

  • memory/1396-54-0x00000000760E1000-0x00000000760E3000-memory.dmp
    Filesize

    8KB

  • memory/1396-68-0x0000000074720000-0x0000000074CCB000-memory.dmp
    Filesize

    5.7MB

  • memory/1396-55-0x0000000074720000-0x0000000074CCB000-memory.dmp
    Filesize

    5.7MB