Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2022, 02:01

General

  • Target

    221332d0df66d7228d91fc8cdb18afb1.exe

  • Size

    23KB

  • MD5

    221332d0df66d7228d91fc8cdb18afb1

  • SHA1

    a778920c01d5d2ed184911cd9910021b73745d5b

  • SHA256

    1f244c4c093c1daa7c24d73eac62b3279032ef3f90e6ba0c29a82d0307e87f59

  • SHA512

    8b5e71a09308592461fa1b4ddc8f5266ced5c10928ddf9a8a72602b20d19364c21940799973b6c7f39f03ad029cfcdced9340f150a8942b6c0b85916ced35d33

  • SSDEEP

    384:RBQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZ3D:RW5yBVd7Rpcnug

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\221332d0df66d7228d91fc8cdb18afb1.exe
    "C:\Users\Admin\AppData\Local\Temp\221332d0df66d7228d91fc8cdb18afb1.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\221332d0df66d7228d91fc8cdb18afb1.exe" "221332d0df66d7228d91fc8cdb18afb1.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4840-132-0x00000000752E0000-0x0000000075891000-memory.dmp

    Filesize

    5.7MB

  • memory/4840-134-0x00000000752E0000-0x0000000075891000-memory.dmp

    Filesize

    5.7MB