Analysis
-
max time kernel
152s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 01:30
Static task
static1
Behavioral task
behavioral1
Sample
25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exe
Resource
win10v2004-20220901-en
General
-
Target
25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exe
-
Size
228KB
-
MD5
011bb75fb268a7d8ec0c65176bb18570
-
SHA1
1ad5b8251012ef4aa1c968c8a97ebdb3eeb48999
-
SHA256
25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd
-
SHA512
ecfbca52a9fcc833d3a5a271172e3ef483bbbf076e9255f8922f7434c291d85f3a8967973777a032186f9bc7e57b463cb7d7d9c94b58b1dbb98ffb619b5442c4
-
SSDEEP
3072:PNR8MhW0lc+5cTpk6nq0l90o+VEz4vel4f2ZnZKfNsJQ1cZiQ8:Pp/lc3pk+91z4vV2nWS8
Malware Config
Extracted
njrat
0.6.4
HacKed
sex4233.no-ip.biz:1177
573ca50cfe6c999db883b04b1fd23b44
-
reg_key
573ca50cfe6c999db883b04b1fd23b44
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
goog1le.exepid process 2016 goog1le.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
goog1le.exepid process 2016 goog1le.exe 2016 goog1le.exe 2016 goog1le.exe 2016 goog1le.exe 2016 goog1le.exe 2016 goog1le.exe 2016 goog1le.exe 2016 goog1le.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
goog1le.exedescription pid process Token: SeDebugPrivilege 2016 goog1le.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exegoog1le.exedescription pid process target process PID 1976 wrote to memory of 2016 1976 25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exe goog1le.exe PID 1976 wrote to memory of 2016 1976 25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exe goog1le.exe PID 1976 wrote to memory of 2016 1976 25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exe goog1le.exe PID 2016 wrote to memory of 1124 2016 goog1le.exe netsh.exe PID 2016 wrote to memory of 1124 2016 goog1le.exe netsh.exe PID 2016 wrote to memory of 1124 2016 goog1le.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exe"C:\Users\Admin\AppData\Local\Temp\25e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\goog1le.exe"C:\Users\Admin\AppData\Local\Temp\goog1le.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\goog1le.exe" "goog1le.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1124
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5011bb75fb268a7d8ec0c65176bb18570
SHA11ad5b8251012ef4aa1c968c8a97ebdb3eeb48999
SHA25625e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd
SHA512ecfbca52a9fcc833d3a5a271172e3ef483bbbf076e9255f8922f7434c291d85f3a8967973777a032186f9bc7e57b463cb7d7d9c94b58b1dbb98ffb619b5442c4
-
Filesize
228KB
MD5011bb75fb268a7d8ec0c65176bb18570
SHA11ad5b8251012ef4aa1c968c8a97ebdb3eeb48999
SHA25625e8214b16a263f671a643e0272376c1f1d70b0b585ec7ab83c9234710da9bdd
SHA512ecfbca52a9fcc833d3a5a271172e3ef483bbbf076e9255f8922f7434c291d85f3a8967973777a032186f9bc7e57b463cb7d7d9c94b58b1dbb98ffb619b5442c4