Analysis
-
max time kernel
2s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 00:06
Behavioral task
behavioral1
Sample
c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7.exe
Resource
win7-20220812-en
General
-
Target
c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7.exe
-
Size
28KB
-
MD5
070366b1e13d0db607bf91ce11d3f1a0
-
SHA1
1b43ac3d2adb907cb22efef2c9e8ad6166a831a0
-
SHA256
c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7
-
SHA512
4a139242cf56c5d193d8daf8145dee890436bf9540d0c758aa7d1fc1868339cf6dec2a2361d08820286a9956cd7138fab6ba9537544b722c32470482aeb8a0f3
-
SSDEEP
384:MaFCtl7Dh+oqIqEXV5HEQTGumqDgN3eH6GBsbh0w4wlAokw9OhgOL1vYRGOZzCZW:m74oqIjlLTAqM3eFBKh0p29SgREW
Malware Config
Extracted
njrat
0.6.4
HacKed
topsayed223.no-ip.biz:1177
6af29fbbfed65718b18fac14bbf76b5c
-
reg_key
6af29fbbfed65718b18fac14bbf76b5c
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1036 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1500 c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7.exe"C:\Users\Admin\AppData\Local\Temp\c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7.exe"1⤵
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Roaming\Elsayed.exe"C:\Users\Admin\AppData\Roaming\Elsayed.exe"2⤵PID:876
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Elsayed.exe" "Elsayed.exe" ENABLE1⤵
- Modifies Windows Firewall
PID:1036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5070366b1e13d0db607bf91ce11d3f1a0
SHA11b43ac3d2adb907cb22efef2c9e8ad6166a831a0
SHA256c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7
SHA5124a139242cf56c5d193d8daf8145dee890436bf9540d0c758aa7d1fc1868339cf6dec2a2361d08820286a9956cd7138fab6ba9537544b722c32470482aeb8a0f3
-
Filesize
28KB
MD5070366b1e13d0db607bf91ce11d3f1a0
SHA11b43ac3d2adb907cb22efef2c9e8ad6166a831a0
SHA256c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7
SHA5124a139242cf56c5d193d8daf8145dee890436bf9540d0c758aa7d1fc1868339cf6dec2a2361d08820286a9956cd7138fab6ba9537544b722c32470482aeb8a0f3
-
Filesize
21KB
MD51a90993587bb57b56ca50f8e808f5997
SHA1539342cc082c8e9df7a505823cb10d5db2d8eb2b
SHA25680ace5736bb6112da4c0fac72b828e2aae7b9e4a924cf165fe075a8a315ec682
SHA51287b6115e23cad2337426a938e2d1ef9fb2df5a69913bd70882b5ef21ba2ae4bc97fcde82ae2b103dcc37085af7afabece8aa0a0106258f635a5ce12d9fc34e8b
-
Filesize
28KB
MD5070366b1e13d0db607bf91ce11d3f1a0
SHA11b43ac3d2adb907cb22efef2c9e8ad6166a831a0
SHA256c91ee9c3b3408d397b2fd36b4f09e715932fdd722a42829ef81451690f1844e7
SHA5124a139242cf56c5d193d8daf8145dee890436bf9540d0c758aa7d1fc1868339cf6dec2a2361d08820286a9956cd7138fab6ba9537544b722c32470482aeb8a0f3