Analysis
-
max time kernel
152s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 01:25
Static task
static1
Behavioral task
behavioral1
Sample
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe
Resource
win10v2004-20220812-en
General
-
Target
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe
-
Size
135KB
-
MD5
5545ae28ff0bebf154aef083b82850b0
-
SHA1
475f7df3a0fd6c97fa5b3f7847e67e259f144cb5
-
SHA256
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c
-
SHA512
a6b1ba07a7a1786625dee19d412ed27e6ba4380f89c00681e662b4162f56d46527189f8a0d4e9962875360998be1e29fb654397e2534f60b777466d585ee451f
-
SSDEEP
3072:2nj9jtfU+INndIc0J45iTgmygDgRrmIWdoQGq00D:2jbeiVVDgRI3GqN
Malware Config
Extracted
njrat
0.7d
HacKed
turkmurat.no-ip.org:1604
632188ae0b130ac89e674b99bc07ac55
-
reg_key
632188ae0b130ac89e674b99bc07ac55
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 8 IoCs
Processes:
B.exeB.exeB.exeB.exeserver.exeserver.exeserver.exeserver.exepid process 2740 B.exe 4360 B.exe 4624 B.exe 2240 B.exe 1132 server.exe 4120 server.exe 4648 server.exe 3664 server.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
B.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation B.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exeserver.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\632188ae0b130ac89e674b99bc07ac55 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\632188ae0b130ac89e674b99bc07ac55 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
B.exeserver.exedescription pid process target process PID 2740 set thread context of 2240 2740 B.exe B.exe PID 1132 set thread context of 3664 1132 server.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
B.exeserver.exepid process 2740 B.exe 2740 B.exe 1132 server.exe 1132 server.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
B.exeserver.exeserver.exedescription pid process Token: SeDebugPrivilege 2740 B.exe Token: SeDebugPrivilege 1132 server.exe Token: SeDebugPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe Token: 33 3664 server.exe Token: SeIncBasePriorityPrivilege 3664 server.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exeB.exeB.exeserver.exeserver.exedescription pid process target process PID 5080 wrote to memory of 2740 5080 bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe B.exe PID 5080 wrote to memory of 2740 5080 bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe B.exe PID 5080 wrote to memory of 2740 5080 bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe B.exe PID 2740 wrote to memory of 4360 2740 B.exe B.exe PID 2740 wrote to memory of 4360 2740 B.exe B.exe PID 2740 wrote to memory of 4360 2740 B.exe B.exe PID 2740 wrote to memory of 4624 2740 B.exe B.exe PID 2740 wrote to memory of 4624 2740 B.exe B.exe PID 2740 wrote to memory of 4624 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2740 wrote to memory of 2240 2740 B.exe B.exe PID 2240 wrote to memory of 1132 2240 B.exe server.exe PID 2240 wrote to memory of 1132 2240 B.exe server.exe PID 2240 wrote to memory of 1132 2240 B.exe server.exe PID 1132 wrote to memory of 4120 1132 server.exe server.exe PID 1132 wrote to memory of 4120 1132 server.exe server.exe PID 1132 wrote to memory of 4120 1132 server.exe server.exe PID 1132 wrote to memory of 4648 1132 server.exe server.exe PID 1132 wrote to memory of 4648 1132 server.exe server.exe PID 1132 wrote to memory of 4648 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 1132 wrote to memory of 3664 1132 server.exe server.exe PID 3664 wrote to memory of 3688 3664 server.exe netsh.exe PID 3664 wrote to memory of 3688 3664 server.exe netsh.exe PID 3664 wrote to memory of 3688 3664 server.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe"C:\Users\Admin\AppData\Local\Temp\bab8b77c6c6aa926cf3eb3811ebe77706775883db759e5344e6e663bd2253b4c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B.exe3⤵
- Executes dropped EXE
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B.exe3⤵
- Executes dropped EXE
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp\server.exe5⤵
- Executes dropped EXE
PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp\server.exe5⤵
- Executes dropped EXE
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp\server.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:3688
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fcf8da848c845080ab04a566acd93885
SHA12c20c067cf7fa01f55b903bdd6f90c639d8cb344
SHA256a23200380432574ccf72fcd4f63769bc9b700c1c0f6dda9aad88b4331a2f25e8
SHA512b0d0d078a2f32d102f7819ac0627c893f52f94b2dc1661836b8256029e902828e5f858bc7f4ff6189c2a2e28a9b1914c31cbbfda6105109c645e56ecae83376c
-
Filesize
64KB
MD5fcf8da848c845080ab04a566acd93885
SHA12c20c067cf7fa01f55b903bdd6f90c639d8cb344
SHA256a23200380432574ccf72fcd4f63769bc9b700c1c0f6dda9aad88b4331a2f25e8
SHA512b0d0d078a2f32d102f7819ac0627c893f52f94b2dc1661836b8256029e902828e5f858bc7f4ff6189c2a2e28a9b1914c31cbbfda6105109c645e56ecae83376c
-
Filesize
64KB
MD5fcf8da848c845080ab04a566acd93885
SHA12c20c067cf7fa01f55b903bdd6f90c639d8cb344
SHA256a23200380432574ccf72fcd4f63769bc9b700c1c0f6dda9aad88b4331a2f25e8
SHA512b0d0d078a2f32d102f7819ac0627c893f52f94b2dc1661836b8256029e902828e5f858bc7f4ff6189c2a2e28a9b1914c31cbbfda6105109c645e56ecae83376c
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7
-
Filesize
32KB
MD57beafd70412d229ad4dae8ce293e0e4d
SHA176c919ff14a4cd2b1f03688063f713679f6d0395
SHA256b492b86e80c8a03d837d7021d18d833f3c870cffb7b67de61574d7e2e4267ffb
SHA5122b4bb48b4283ab49af2cb13295273ffb2f21713840d9d23c8bde3cc5c1cf26c4b5b761c4a68bc6abf8250b12981b2bf5202872849ba2968181c42b9a998a82d7