Analysis

  • max time kernel
    114s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2022 16:04

General

  • Target

    cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe

  • Size

    6KB

  • MD5

    bf483dc9b494c3143835ec286c1c4360

  • SHA1

    b3e6792d37d360bb28d37c25d44394e58f1d9b09

  • SHA256

    cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284

  • SHA512

    f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce

  • SSDEEP

    96:OKqxIGt9iNzw8IdvzrlsllTyQRx2/JwyruI+cZ3GnUODL:5qimu5ImllO4xIyyBxZv0

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

update

C2

money2022.ddns.net:8080

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe
    "C:\Users\Admin\AppData\Local\Temp\cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA2AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:960
    • C:\Users\Admin\AppData\Local\Temp\cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe
      C:\Users\Admin\AppData\Local\Temp\cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284.exe
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1816
      • C:\Users\Admin\AppData\Roaming\update.exe
        "C:\Users\Admin\AppData\Roaming\update.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA2AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1760
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Roaming\update.exe"
        3⤵
        • Views/modifies file attributes
        PID:676

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    Filesize

    7KB

    MD5

    9331e2836ec667870259c4dd1e13fc8d

    SHA1

    ef47bd38adfb392c65291f97e5048e2291d16e71

    SHA256

    b5864e09f1416fde4da1968292fba4b57080d405d8267ad074f6af3f85f42e69

    SHA512

    f012874ee68a49b029ec9224521e2eb736bb940f80945e62915af88bb06088d186acc560a462511573b517f49f8e8de5a0f74596e44504b9e7f34700c6232d17

  • C:\Users\Admin\AppData\Roaming\update.exe
    Filesize

    6KB

    MD5

    bf483dc9b494c3143835ec286c1c4360

    SHA1

    b3e6792d37d360bb28d37c25d44394e58f1d9b09

    SHA256

    cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284

    SHA512

    f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce

  • C:\Users\Admin\AppData\Roaming\update.exe
    Filesize

    6KB

    MD5

    bf483dc9b494c3143835ec286c1c4360

    SHA1

    b3e6792d37d360bb28d37c25d44394e58f1d9b09

    SHA256

    cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284

    SHA512

    f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce

  • \Users\Admin\AppData\Roaming\update.exe
    Filesize

    6KB

    MD5

    bf483dc9b494c3143835ec286c1c4360

    SHA1

    b3e6792d37d360bb28d37c25d44394e58f1d9b09

    SHA256

    cbb22c9a91a492cd4ed6aa9467fd525bd2e1776f66e9c726364e4d518a0af284

    SHA512

    f00e279b93014ee9284bb59f1cfdf0b9913a2745562dc0f389298ae654736572e98f2cca89b8925dddbf4a254680e53ce4827fb5fff654bb82a1a926bb5a1dce

  • memory/676-80-0x0000000000000000-mapping.dmp
  • memory/960-61-0x000000006F3A0000-0x000000006F94B000-memory.dmp
    Filesize

    5.7MB

  • memory/960-59-0x0000000000000000-mapping.dmp
  • memory/960-62-0x000000006F3A0000-0x000000006F94B000-memory.dmp
    Filesize

    5.7MB

  • memory/960-63-0x000000006F3A0000-0x000000006F94B000-memory.dmp
    Filesize

    5.7MB

  • memory/1720-58-0x0000000004820000-0x00000000048B2000-memory.dmp
    Filesize

    584KB

  • memory/1720-57-0x0000000000790000-0x00000000007D0000-memory.dmp
    Filesize

    256KB

  • memory/1720-56-0x0000000000620000-0x00000000006A8000-memory.dmp
    Filesize

    544KB

  • memory/1720-55-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
    Filesize

    8KB

  • memory/1720-54-0x0000000000C50000-0x0000000000C58000-memory.dmp
    Filesize

    32KB

  • memory/1724-77-0x0000000000000000-mapping.dmp
  • memory/1724-81-0x0000000001210000-0x0000000001218000-memory.dmp
    Filesize

    32KB

  • memory/1760-83-0x0000000000000000-mapping.dmp
  • memory/1760-86-0x000000006F370000-0x000000006F91B000-memory.dmp
    Filesize

    5.7MB

  • memory/1760-87-0x000000006F370000-0x000000006F91B000-memory.dmp
    Filesize

    5.7MB

  • memory/1816-72-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1816-74-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1816-70-0x000000000040837E-mapping.dmp
  • memory/1816-69-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1816-68-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1816-67-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1816-65-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/1816-64-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB