Analysis
-
max time kernel
53s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 01:57
Static task
static1
Behavioral task
behavioral1
Sample
87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe
Resource
win7-20220901-en
General
-
Target
87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe
-
Size
108KB
-
MD5
6c1ee36aacf5079d4d537ebd2fc5f148
-
SHA1
5325df501e2bccd44c262445e8015ea6dd9de647
-
SHA256
87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960
-
SHA512
1d0386f239beae85e850fd7adeccf6bf709ae3647aeaa0dcfc8cd00d2d6464eaa3a029c1451cc9b29f2e1acfcee8415f18c287bf3e84d7f366872a2c8436f8d4
-
SSDEEP
1536:WbnRoHJT3p+KADy00wJk2/uJOo/Yl2v0Som2hsDQwBTyYqjPvZO4w4:WbRopDpuz/ucoglG+fSDPQYqjPQ4w4
Malware Config
Extracted
njrat
0.6.4
HacKed
funkymalware.zapto.org:1177
468488565f27c01a98cb0ac6112a97d0
-
reg_key
468488565f27c01a98cb0ac6112a97d0
-
splitter
|'|'|
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exedescription pid process target process PID 3172 set thread context of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe -
Drops file in Windows directory 1 IoCs
Processes:
dw20.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 4632 dw20.exe Token: SeBackupPrivilege 4632 dw20.exe Token: SeBackupPrivilege 4632 dw20.exe Token: SeBackupPrivilege 4632 dw20.exe Token: SeBackupPrivilege 4632 dw20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exevbc.exedescription pid process target process PID 3172 wrote to memory of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe PID 3172 wrote to memory of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe PID 3172 wrote to memory of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe PID 3172 wrote to memory of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe PID 3172 wrote to memory of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe PID 3172 wrote to memory of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe PID 3172 wrote to memory of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe PID 3172 wrote to memory of 5028 3172 87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe vbc.exe PID 5028 wrote to memory of 4632 5028 vbc.exe dw20.exe PID 5028 wrote to memory of 4632 5028 vbc.exe dw20.exe PID 5028 wrote to memory of 4632 5028 vbc.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe"C:\Users\Admin\AppData\Local\Temp\87e1732dae8a72a8ab46360f9db9e38ceeeab05fa1492d507a346ad32a092960.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7883⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-