Analysis
-
max time kernel
37s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 16:18
Behavioral task
behavioral1
Sample
ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe
Resource
win7-20220812-en
General
-
Target
ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe
-
Size
29KB
-
MD5
42bafdfa039f7a0fc54d2cb7ec699ad0
-
SHA1
1ae11d9e6364f59185662111da19c8888e23d38e
-
SHA256
ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286
-
SHA512
b9327dbbd2cbc5c79353d9f9e436edb7162292297ecd59e3e6a0254c3ece1d8e9af5b6eba72150c7b4391c6b946979d39268f07428988d6dce7a408a4111158c
-
SSDEEP
768:KCu75oa4fu124AuhjXeJBKh0p29SgRvU5:O75CPAj8KhG29jv4
Malware Config
Extracted
njrat
0.6.4
HacKed
dmaarr.no.ip.info:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Trojan.exepid process 1516 Trojan.exe -
Loads dropped DLL 1 IoCs
Processes:
ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exepid process 1968 ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exedescription pid process target process PID 1968 wrote to memory of 1516 1968 ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe Trojan.exe PID 1968 wrote to memory of 1516 1968 ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe Trojan.exe PID 1968 wrote to memory of 1516 1968 ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe Trojan.exe PID 1968 wrote to memory of 1516 1968 ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe Trojan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe"C:\Users\Admin\AppData\Local\Temp\ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exeFilesize
29KB
MD542bafdfa039f7a0fc54d2cb7ec699ad0
SHA11ae11d9e6364f59185662111da19c8888e23d38e
SHA256ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286
SHA512b9327dbbd2cbc5c79353d9f9e436edb7162292297ecd59e3e6a0254c3ece1d8e9af5b6eba72150c7b4391c6b946979d39268f07428988d6dce7a408a4111158c
-
C:\Users\Admin\AppData\Local\Temp\Trojan.exeFilesize
29KB
MD542bafdfa039f7a0fc54d2cb7ec699ad0
SHA11ae11d9e6364f59185662111da19c8888e23d38e
SHA256ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286
SHA512b9327dbbd2cbc5c79353d9f9e436edb7162292297ecd59e3e6a0254c3ece1d8e9af5b6eba72150c7b4391c6b946979d39268f07428988d6dce7a408a4111158c
-
\Users\Admin\AppData\Local\Temp\Trojan.exeFilesize
29KB
MD542bafdfa039f7a0fc54d2cb7ec699ad0
SHA11ae11d9e6364f59185662111da19c8888e23d38e
SHA256ac88b8cb4a6f389a77fd6c6dde34ba8eb1ade2eeda78acedf4bb60efcc556286
SHA512b9327dbbd2cbc5c79353d9f9e436edb7162292297ecd59e3e6a0254c3ece1d8e9af5b6eba72150c7b4391c6b946979d39268f07428988d6dce7a408a4111158c
-
memory/1516-57-0x0000000000000000-mapping.dmp
-
memory/1516-60-0x0000000074840000-0x0000000074DEB000-memory.dmpFilesize
5.7MB
-
memory/1968-54-0x0000000076141000-0x0000000076143000-memory.dmpFilesize
8KB
-
memory/1968-55-0x0000000074840000-0x0000000074DEB000-memory.dmpFilesize
5.7MB
-
memory/1968-61-0x0000000074840000-0x0000000074DEB000-memory.dmpFilesize
5.7MB