Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 00:58
Behavioral task
behavioral1
Sample
92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe
Resource
win7-20220812-en
General
-
Target
92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe
-
Size
29KB
-
MD5
3ce85fe3e09e4362b85907bf72b85310
-
SHA1
9ca267e54f0f93220ef04928b7baa254c8580d28
-
SHA256
92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12
-
SHA512
127480783bd3f797fd6dc2ae4db427ee1440927e08e58ab90612762b252a88bea277d5d0f452826409f23511cf86ca1441276a17ae275d1dc9e18e0047026241
-
SSDEEP
384:uFUHEBl7p3hUw2s7bD55gEKJmqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzNr:u57bUw2C3kEpqNreHBKh0p29SgR/x
Malware Config
Extracted
njrat
0.6.4
HacKed
klawess1.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Trojan.exepid process 1628 Trojan.exe -
Loads dropped DLL 1 IoCs
Processes:
92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exepid process 1652 92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exedescription pid process target process PID 1652 wrote to memory of 1628 1652 92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe Trojan.exe PID 1652 wrote to memory of 1628 1652 92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe Trojan.exe PID 1652 wrote to memory of 1628 1652 92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe Trojan.exe PID 1652 wrote to memory of 1628 1652 92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe Trojan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe"C:\Users\Admin\AppData\Local\Temp\92f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exeFilesize
29KB
MD53ce85fe3e09e4362b85907bf72b85310
SHA19ca267e54f0f93220ef04928b7baa254c8580d28
SHA25692f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12
SHA512127480783bd3f797fd6dc2ae4db427ee1440927e08e58ab90612762b252a88bea277d5d0f452826409f23511cf86ca1441276a17ae275d1dc9e18e0047026241
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exeFilesize
29KB
MD53ce85fe3e09e4362b85907bf72b85310
SHA19ca267e54f0f93220ef04928b7baa254c8580d28
SHA25692f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12
SHA512127480783bd3f797fd6dc2ae4db427ee1440927e08e58ab90612762b252a88bea277d5d0f452826409f23511cf86ca1441276a17ae275d1dc9e18e0047026241
-
\Users\Admin\AppData\Local\Temp\Trojan.exeFilesize
29KB
MD53ce85fe3e09e4362b85907bf72b85310
SHA19ca267e54f0f93220ef04928b7baa254c8580d28
SHA25692f8727ac61832086aef0d6445d602d25a08688f7a6e5f09556654a24df7aa12
SHA512127480783bd3f797fd6dc2ae4db427ee1440927e08e58ab90612762b252a88bea277d5d0f452826409f23511cf86ca1441276a17ae275d1dc9e18e0047026241
-
memory/1628-57-0x0000000000000000-mapping.dmp
-
memory/1628-61-0x0000000074500000-0x0000000074AAB000-memory.dmpFilesize
5.7MB
-
memory/1652-54-0x0000000076041000-0x0000000076043000-memory.dmpFilesize
8KB
-
memory/1652-56-0x0000000074500000-0x0000000074AAB000-memory.dmpFilesize
5.7MB
-
memory/1652-62-0x0000000074500000-0x0000000074AAB000-memory.dmpFilesize
5.7MB