Analysis
-
max time kernel
114s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-11-2022 16:04
Static task
static1
Behavioral task
behavioral1
Sample
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe
Resource
win10v2004-20220901-en
General
-
Target
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe
-
Size
6KB
-
MD5
bf483dc9b494c3143835ec286c1c4360
-
SHA1
b3e6792d37d360bb28d37c25d44394e58f1d9b09
-
SHA256
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284
-
SHA512
f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce
-
SSDEEP
96:OKqxIGt9iNzw8IdvzrlsllTyQRx2/JwyruI+cZ3GnUODL:5qimu5ImllO4xIyyBxZv0
Malware Config
Extracted
njrat
v2.0
update
money2022.ddns.net:8080
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
update.exepid process 1724 update.exe -
Drops startup file 1 IoCs
Processes:
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe -
Loads dropped DLL 1 IoCs
Processes:
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exepid process 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.execbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tcqjhjjt = "\"C:\\Users\\Admin\\AppData\\Roaming\\Hovpith\\Tcqjhjjt.exe\"" cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\update.exe" cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exedescription pid process target process PID 1720 set thread context of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 960 powershell.exe 1760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exepowershell.exeupdate.exepowershell.exedescription pid process Token: SeDebugPrivilege 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe Token: SeDebugPrivilege 960 powershell.exe Token: SeDebugPrivilege 1724 update.exe Token: SeDebugPrivilege 1760 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.execbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exeupdate.exedescription pid process target process PID 1720 wrote to memory of 960 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe powershell.exe PID 1720 wrote to memory of 960 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe powershell.exe PID 1720 wrote to memory of 960 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe powershell.exe PID 1720 wrote to memory of 960 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe powershell.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1720 wrote to memory of 1816 1720 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe PID 1816 wrote to memory of 1724 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe update.exe PID 1816 wrote to memory of 1724 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe update.exe PID 1816 wrote to memory of 1724 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe update.exe PID 1816 wrote to memory of 1724 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe update.exe PID 1816 wrote to memory of 1724 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe update.exe PID 1816 wrote to memory of 1724 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe update.exe PID 1816 wrote to memory of 1724 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe update.exe PID 1816 wrote to memory of 676 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe attrib.exe PID 1816 wrote to memory of 676 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe attrib.exe PID 1816 wrote to memory of 676 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe attrib.exe PID 1816 wrote to memory of 676 1816 cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe attrib.exe PID 1724 wrote to memory of 1760 1724 update.exe powershell.exe PID 1724 wrote to memory of 1760 1724 update.exe powershell.exe PID 1724 wrote to memory of 1760 1724 update.exe powershell.exe PID 1724 wrote to memory of 1760 1724 update.exe powershell.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe"C:\Users\Admin\AppData\Local\Temp\cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA2AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exeC:\Users\Admin\AppData\Local\Temp\cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\update.exe"C:\Users\Admin\AppData\Roaming\update.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA2AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\update.exe"3⤵
- Views/modifies file attributes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD59331e2836ec667870259c4dd1e13fc8d
SHA1ef47bd38adfb392c65291f97e5048e2291d16e71
SHA256b5864e09f1416fde4da1968292fba4b57080d405d8267ad074f6af3f85f42e69
SHA512f012874ee68a49b029ec9224521e2eb736bb940f80945e62915af88bb06088d186acc560a462511573b517f49f8e8de5a0f74596e44504b9e7f34700c6232d17
-
C:\Users\Admin\AppData\Roaming\update.exeFilesize
6KB
MD5bf483dc9b494c3143835ec286c1c4360
SHA1b3e6792d37d360bb28d37c25d44394e58f1d9b09
SHA256cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284
SHA512f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce
-
C:\Users\Admin\AppData\Roaming\update.exeFilesize
6KB
MD5bf483dc9b494c3143835ec286c1c4360
SHA1b3e6792d37d360bb28d37c25d44394e58f1d9b09
SHA256cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284
SHA512f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce
-
\Users\Admin\AppData\Roaming\update.exeFilesize
6KB
MD5bf483dc9b494c3143835ec286c1c4360
SHA1b3e6792d37d360bb28d37c25d44394e58f1d9b09
SHA256cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284
SHA512f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce
-
memory/676-80-0x0000000000000000-mapping.dmp
-
memory/960-61-0x000000006F3A0000-0x000000006F94B000-memory.dmpFilesize
5.7MB
-
memory/960-59-0x0000000000000000-mapping.dmp
-
memory/960-62-0x000000006F3A0000-0x000000006F94B000-memory.dmpFilesize
5.7MB
-
memory/960-63-0x000000006F3A0000-0x000000006F94B000-memory.dmpFilesize
5.7MB
-
memory/1720-58-0x0000000004820000-0x00000000048B2000-memory.dmpFilesize
584KB
-
memory/1720-57-0x0000000000790000-0x00000000007D0000-memory.dmpFilesize
256KB
-
memory/1720-56-0x0000000000620000-0x00000000006A8000-memory.dmpFilesize
544KB
-
memory/1720-55-0x0000000075BD1000-0x0000000075BD3000-memory.dmpFilesize
8KB
-
memory/1720-54-0x0000000000C50000-0x0000000000C58000-memory.dmpFilesize
32KB
-
memory/1724-77-0x0000000000000000-mapping.dmp
-
memory/1724-81-0x0000000001210000-0x0000000001218000-memory.dmpFilesize
32KB
-
memory/1760-83-0x0000000000000000-mapping.dmp
-
memory/1760-86-0x000000006F370000-0x000000006F91B000-memory.dmpFilesize
5.7MB
-
memory/1760-87-0x000000006F370000-0x000000006F91B000-memory.dmpFilesize
5.7MB
-
memory/1816-72-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1816-74-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1816-70-0x000000000040837E-mapping.dmp
-
memory/1816-69-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1816-68-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1816-67-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1816-65-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/1816-64-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB