Analysis
-
max time kernel
169s -
max time network
249s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 02:26
Static task
static1
Behavioral task
behavioral1
Sample
7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef.exe
Resource
win7-20220812-en
General
-
Target
7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef.exe
-
Size
366KB
-
MD5
2ec5f966af8485c4d445efb4c651e6c7
-
SHA1
fc9781a10f1fdf02680f6b5d560169ef1aeb24cf
-
SHA256
7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef
-
SHA512
af5033db437dde5921568b59c453e4a09d4a145ca6c6ff077718cb96897a5e16a7ba46c25482b7cbb5cc9bd39f68d11d3d550c80180b75c288308e4790b1ea51
-
SSDEEP
6144:WsxanyfX5k7JlJDlABKUtfU/WQcb5e+CthMmBVuIpB6zk0OfgdGIohT+Y7bOPzAV:H0nyfXuIBDtfuFtCW3akTgdjoh6wbOkV
Malware Config
Extracted
njrat
0.6.4
HacKed
kawtherkahla.ddns.net:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 772 Server.sfx.exe 4936 Server.exe 1448 Trojan.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Server.sfx.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 944 wrote to memory of 1960 944 7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef.exe 82 PID 944 wrote to memory of 1960 944 7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef.exe 82 PID 944 wrote to memory of 1960 944 7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef.exe 82 PID 1960 wrote to memory of 772 1960 cmd.exe 85 PID 1960 wrote to memory of 772 1960 cmd.exe 85 PID 1960 wrote to memory of 772 1960 cmd.exe 85 PID 772 wrote to memory of 4936 772 Server.sfx.exe 86 PID 772 wrote to memory of 4936 772 Server.sfx.exe 86 PID 772 wrote to memory of 4936 772 Server.sfx.exe 86 PID 4936 wrote to memory of 1448 4936 Server.exe 87 PID 4936 wrote to memory of 1448 4936 Server.exe 87 PID 4936 wrote to memory of 1448 4936 Server.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef.exe"C:\Users\Admin\AppData\Local\Temp\7fd1f28c3c49a43cff14302b0d5e790be64412f3b8d142e1df84715cf144cdef.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fud.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Server.sfx.exeServer.sfx.exe -p123 -dC:\Users\Admin\AppData\Local\Temp3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"5⤵
- Executes dropped EXE
PID:1448
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD55ab8be54f0ff13232e92e1483931f8e3
SHA1279bea8f3a4593563385283ac40f816583f6130e
SHA256d7d5eff9f1e9324b0aa98265e2000d409357439d317cd1951d0adf77e3e41a57
SHA5128a4d7e25260f368072bb6a3e7cd2c02bb44d7879530ae9c6454eb9c0f6cafc6acf3fab06fe1c354b34d21a28182a8896785b07bb4eddb326d9d6be097fdc2264
-
Filesize
29KB
MD55ab8be54f0ff13232e92e1483931f8e3
SHA1279bea8f3a4593563385283ac40f816583f6130e
SHA256d7d5eff9f1e9324b0aa98265e2000d409357439d317cd1951d0adf77e3e41a57
SHA5128a4d7e25260f368072bb6a3e7cd2c02bb44d7879530ae9c6454eb9c0f6cafc6acf3fab06fe1c354b34d21a28182a8896785b07bb4eddb326d9d6be097fdc2264
-
Filesize
218KB
MD53b97de6480cd08b8068475bc5f41d9ec
SHA1be7692bd43a5a271ec8b5df614ea006f0a2998c3
SHA2562a3651c434b80145d8aef18782266a11848353ef2c4a57126a40c97f557bc68e
SHA512ec504fd79978201e56f2f9a85dfcff8ed1697a5cee1cf38e45d0b7774d3a66f0427a72e9f5a9ccb0c3a7fe84a2ec18a1ee282c621914c163c5e506c152d6ffab
-
Filesize
218KB
MD53b97de6480cd08b8068475bc5f41d9ec
SHA1be7692bd43a5a271ec8b5df614ea006f0a2998c3
SHA2562a3651c434b80145d8aef18782266a11848353ef2c4a57126a40c97f557bc68e
SHA512ec504fd79978201e56f2f9a85dfcff8ed1697a5cee1cf38e45d0b7774d3a66f0427a72e9f5a9ccb0c3a7fe84a2ec18a1ee282c621914c163c5e506c152d6ffab
-
Filesize
29KB
MD55ab8be54f0ff13232e92e1483931f8e3
SHA1279bea8f3a4593563385283ac40f816583f6130e
SHA256d7d5eff9f1e9324b0aa98265e2000d409357439d317cd1951d0adf77e3e41a57
SHA5128a4d7e25260f368072bb6a3e7cd2c02bb44d7879530ae9c6454eb9c0f6cafc6acf3fab06fe1c354b34d21a28182a8896785b07bb4eddb326d9d6be097fdc2264
-
Filesize
29KB
MD55ab8be54f0ff13232e92e1483931f8e3
SHA1279bea8f3a4593563385283ac40f816583f6130e
SHA256d7d5eff9f1e9324b0aa98265e2000d409357439d317cd1951d0adf77e3e41a57
SHA5128a4d7e25260f368072bb6a3e7cd2c02bb44d7879530ae9c6454eb9c0f6cafc6acf3fab06fe1c354b34d21a28182a8896785b07bb4eddb326d9d6be097fdc2264
-
Filesize
29B
MD52f7a8311a80bac88bdb24f6444cf867b
SHA1b88808595430620ccb47e1513f9f80a7300672c7
SHA25642a20ef5dd7d810ca2a2e64c84ce7ebdd1710ea338fed7c22d7b8b4c2ad0edd7
SHA512c5805844df8d8f1a3bd10f25db72484cda47f7e6f77d7c823c6777497983ebd42a498f3efffddf0e9feeb0bb8c0e5d09c2a5bb1779c65841d8ea4f3ba47ae012