Analysis

  • max time kernel
    106s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 15:18

General

  • Target

    4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe

  • Size

    740KB

  • MD5

    49c503f108a8d690e917ce8937b1fc10

  • SHA1

    4fff4209e2bbd21720887f20917e39f0dff617e8

  • SHA256

    4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771

  • SHA512

    4529a38d498d4a929d92264745b46aae993fc09b5a894f21cc46a02b78de51d04d7889dff1b4611ec7e1f81cd54861b1d7f79ff2f7001dd9aecbfd538dcb8eeb

  • SSDEEP

    12288:tSIiCyhy8QhOnE/4JSIiCyhy8QhOnE/4jXLnyLdS:WLYLN3

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe
    "C:\Users\Admin\AppData\Local\Temp\4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:604
    • C:\Users\Admin\AppData\Local\Temp\4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE
      "C:\Users\Admin\AppData\Local\Temp\4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=4c8977c17d7a2022b059cbf04c07aac73b49f3822a760e03f6e9ff83f34f6771.EXE&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:772 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C37M8BRP.txt

    Filesize

    601B

    MD5

    e1707375d23c0aff15582ac4bf8a328c

    SHA1

    4d269b044630a5ec606b82dbf95b4d207bebe572

    SHA256

    87ef20d86d934d0ea01695e96b3dae45df6506f5ae03c1b65fb8a8cabc899edd

    SHA512

    efbe9f88efe82cfea5b2e36c79399728bbca80ce28d25c92f035b7b3166d3642e4557a8a8206681fdaa62bc68a24d111392152941bab87de911a8cfa9f59f2c5

  • memory/1716-56-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1716-61-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1716-62-0x000000000040891E-mapping.dmp

  • memory/1716-60-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1716-59-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1716-57-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1716-64-0x0000000000402000-0x0000000000408A00-memory.dmp

    Filesize

    26KB

  • memory/1716-65-0x0000000000402000-0x0000000000408A00-memory.dmp

    Filesize

    26KB

  • memory/1716-66-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB