Analysis
-
max time kernel
151s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 08:26
Behavioral task
behavioral1
Sample
b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe
Resource
win7-20220812-en
General
-
Target
b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe
-
Size
29KB
-
MD5
6733a25b5cc4577c5101c2fa583e9f30
-
SHA1
8806867144e267542cc63d2304cd97e0cb76ae9b
-
SHA256
b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14
-
SHA512
cca0213f61532f0ae220bdac85a5d852270c12ceacaaa67d255878e2e20d4cb8221165bb89da282e324dc2285f454903150b60a1f3c6acaedc0a85dc1a4f401f
-
SSDEEP
384:OhQXpl7dzns8oDw/LRP55/4GWmqDSeXegLGBsbh0w4wlAokw9OhgOL1vYRGOZzXB:OE7Js8oDSJz4wqZXenBKh0p29SgRh/
Malware Config
Extracted
njrat
0.6.4
hacked
captinsp.no-ip.biz:1177
babe8364d0b44de2ea6e4bcccd70281e
-
reg_key
babe8364d0b44de2ea6e4bcccd70281e
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1052 server.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 992 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\babe8364d0b44de2ea6e4bcccd70281e.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\babe8364d0b44de2ea6e4bcccd70281e.exe server.exe -
Loads dropped DLL 1 IoCs
pid Process 1640 b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\babe8364d0b44de2ea6e4bcccd70281e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\babe8364d0b44de2ea6e4bcccd70281e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe 1052 server.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1052 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1052 1640 b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe 27 PID 1640 wrote to memory of 1052 1640 b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe 27 PID 1640 wrote to memory of 1052 1640 b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe 27 PID 1640 wrote to memory of 1052 1640 b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe 27 PID 1052 wrote to memory of 992 1052 server.exe 28 PID 1052 wrote to memory of 992 1052 server.exe 28 PID 1052 wrote to memory of 992 1052 server.exe 28 PID 1052 wrote to memory of 992 1052 server.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe"C:\Users\Admin\AppData\Local\Temp\b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:992
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD56733a25b5cc4577c5101c2fa583e9f30
SHA18806867144e267542cc63d2304cd97e0cb76ae9b
SHA256b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14
SHA512cca0213f61532f0ae220bdac85a5d852270c12ceacaaa67d255878e2e20d4cb8221165bb89da282e324dc2285f454903150b60a1f3c6acaedc0a85dc1a4f401f
-
Filesize
29KB
MD56733a25b5cc4577c5101c2fa583e9f30
SHA18806867144e267542cc63d2304cd97e0cb76ae9b
SHA256b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14
SHA512cca0213f61532f0ae220bdac85a5d852270c12ceacaaa67d255878e2e20d4cb8221165bb89da282e324dc2285f454903150b60a1f3c6acaedc0a85dc1a4f401f
-
Filesize
29KB
MD56733a25b5cc4577c5101c2fa583e9f30
SHA18806867144e267542cc63d2304cd97e0cb76ae9b
SHA256b6e5d2153b3a9c78b8e0e03e23357a96531d8514919bd64330a90fb6a59a3a14
SHA512cca0213f61532f0ae220bdac85a5d852270c12ceacaaa67d255878e2e20d4cb8221165bb89da282e324dc2285f454903150b60a1f3c6acaedc0a85dc1a4f401f