Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 04:05
Behavioral task
behavioral1
Sample
0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe
Resource
win10v2004-20220812-en
General
-
Target
0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe
-
Size
29KB
-
MD5
5f2dcbae4ae2b6181ebc93428f55e110
-
SHA1
aa2085260873e9ef345e114d81f9da09f8d4489a
-
SHA256
0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec
-
SHA512
c75522718b75cda9b4b4da9be241438ba3280810a8c384cde5077015238b9cc5fec9c32924eebf8774e7fe7231b0e347966f15ef4e2e24beaf4839b782953ffd
-
SSDEEP
384:2s/hl7b1/JEI+GPWrb5hFEaemaD6CLeQTGBsbh0w4wlAokw9OhgOL1vYRGOZzNZl:P7bXEI+GevhEsadLe3BKh0p29SgR/l
Malware Config
Extracted
njrat
0.6.4
HacKed
alm3lm100.noip.me:1133
baf5dc13eb4c7b00798fd1e4e35c0f4a
-
reg_key
baf5dc13eb4c7b00798fd1e4e35c0f4a
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3628 sss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4860 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baf5dc13eb4c7b00798fd1e4e35c0f4a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sss.exe\" .." sss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\baf5dc13eb4c7b00798fd1e4e35c0f4a = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sss.exe\" .." sss.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0B09389F-C3F6-4757-BF70-A7DD25CBBE3E}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{8C7B04E1-57BE-4BF9-A870-D55F736674DA}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe 3628 sss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3628 sss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3232 wrote to memory of 3628 3232 0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe 77 PID 3232 wrote to memory of 3628 3232 0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe 77 PID 3232 wrote to memory of 3628 3232 0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe 77 PID 3628 wrote to memory of 4860 3628 sss.exe 78 PID 3628 wrote to memory of 4860 3628 sss.exe 78 PID 3628 wrote to memory of 4860 3628 sss.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe"C:\Users\Admin\AppData\Local\Temp\0400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\sss.exe"C:\Users\Admin\AppData\Local\Temp\sss.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\sss.exe" "sss.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4860
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:5032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD55f2dcbae4ae2b6181ebc93428f55e110
SHA1aa2085260873e9ef345e114d81f9da09f8d4489a
SHA2560400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec
SHA512c75522718b75cda9b4b4da9be241438ba3280810a8c384cde5077015238b9cc5fec9c32924eebf8774e7fe7231b0e347966f15ef4e2e24beaf4839b782953ffd
-
Filesize
29KB
MD55f2dcbae4ae2b6181ebc93428f55e110
SHA1aa2085260873e9ef345e114d81f9da09f8d4489a
SHA2560400e1584001520ea45d8c920bedd61fe3c64f3aa8011db4fd2e506ff6ba02ec
SHA512c75522718b75cda9b4b4da9be241438ba3280810a8c384cde5077015238b9cc5fec9c32924eebf8774e7fe7231b0e347966f15ef4e2e24beaf4839b782953ffd