Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 19:32
Behavioral task
behavioral1
Sample
4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe
Resource
win10v2004-20220812-en
General
-
Target
4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe
-
Size
29KB
-
MD5
81d47137b6e65a165d195653d94b4dd0
-
SHA1
1ef18f2a7cd19ea0ea9936ae378e848d7b675284
-
SHA256
4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507
-
SHA512
95b4d44715a904f340e68da95466f5ab96cb09250ff3ed46a2b891c17b4c083a922e127480d0e8ee56f219bae1fe500d03ffcb70261023452a55bad85e7511ce
-
SSDEEP
768:/2u75oa4fu124A2FjXeJBKh0p29SgRwm:T75CPoj8KhG29jwm
Malware Config
Extracted
njrat
0.6.4
HacKed
maaher1.no-ip.biz:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4648 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4988 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe 4648 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4648 Trojan.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4648 5104 4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe 78 PID 5104 wrote to memory of 4648 5104 4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe 78 PID 5104 wrote to memory of 4648 5104 4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe 78 PID 4648 wrote to memory of 4988 4648 Trojan.exe 79 PID 4648 wrote to memory of 4988 4648 Trojan.exe 79 PID 4648 wrote to memory of 4988 4648 Trojan.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe"C:\Users\Admin\AppData\Local\Temp\4a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD581d47137b6e65a165d195653d94b4dd0
SHA11ef18f2a7cd19ea0ea9936ae378e848d7b675284
SHA2564a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507
SHA51295b4d44715a904f340e68da95466f5ab96cb09250ff3ed46a2b891c17b4c083a922e127480d0e8ee56f219bae1fe500d03ffcb70261023452a55bad85e7511ce
-
Filesize
29KB
MD581d47137b6e65a165d195653d94b4dd0
SHA11ef18f2a7cd19ea0ea9936ae378e848d7b675284
SHA2564a3c93c33c26152f7f1cef21b7cf9e27efca0e514fc7b419d23f7b64aefb5507
SHA51295b4d44715a904f340e68da95466f5ab96cb09250ff3ed46a2b891c17b4c083a922e127480d0e8ee56f219bae1fe500d03ffcb70261023452a55bad85e7511ce