Analysis
-
max time kernel
312s -
max time network
333s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exe
Resource
win7-20221111-en
General
-
Target
0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exe
-
Size
616KB
-
MD5
93bc0b0789dc983fd4d3b1f099d6ca06
-
SHA1
519f983007ec0e3aaf2bd5274a38dfcb861833fe
-
SHA256
0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08
-
SHA512
3fa9207476b52a59c0e59eaa6e38290be85eaf5a8bb102b578a87e19c621c6b790fd6cef7bd7b2597080fe5d51c07cbacc8e01efecaa1c5dc56f8a3137adcdb7
-
SSDEEP
12288:0sg+XyCpWKqKqKqKqKzKqKqKqKqKltoHGGrjko2N5mZU:6+XGqHG+jko2KZ
Malware Config
Extracted
njrat
0.6.4
HacKed
jafares.ddns.net:1177
85ce27c90f0ba2b98ceb888e2ca7acde
-
reg_key
85ce27c90f0ba2b98ceb888e2ca7acde
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
LocalFEnUgqRZUM.exeLocalFEnUgqRZUM.exepid process 3456 LocalFEnUgqRZUM.exe 4920 LocalFEnUgqRZUM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
LocalFEnUgqRZUM.exedescription pid process target process PID 3456 set thread context of 4920 3456 LocalFEnUgqRZUM.exe LocalFEnUgqRZUM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
LocalFEnUgqRZUM.exepid process 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe 3456 LocalFEnUgqRZUM.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
LocalFEnUgqRZUM.exedescription pid process Token: SeDebugPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe Token: 33 3456 LocalFEnUgqRZUM.exe Token: SeIncBasePriorityPrivilege 3456 LocalFEnUgqRZUM.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exeLocalFEnUgqRZUM.exedescription pid process target process PID 4396 wrote to memory of 3456 4396 0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exe LocalFEnUgqRZUM.exe PID 4396 wrote to memory of 3456 4396 0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exe LocalFEnUgqRZUM.exe PID 4396 wrote to memory of 3456 4396 0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exe LocalFEnUgqRZUM.exe PID 3456 wrote to memory of 4920 3456 LocalFEnUgqRZUM.exe LocalFEnUgqRZUM.exe PID 3456 wrote to memory of 4920 3456 LocalFEnUgqRZUM.exe LocalFEnUgqRZUM.exe PID 3456 wrote to memory of 4920 3456 LocalFEnUgqRZUM.exe LocalFEnUgqRZUM.exe PID 3456 wrote to memory of 4920 3456 LocalFEnUgqRZUM.exe LocalFEnUgqRZUM.exe PID 3456 wrote to memory of 4920 3456 LocalFEnUgqRZUM.exe LocalFEnUgqRZUM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exe"C:\Users\Admin\AppData\Local\Temp\0261ae7bcfa532e3492cb55acc4de4df60cfedfdce553617ae8801b1b8006f08.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\LocalFEnUgqRZUM.exe"C:\Users\Admin\AppData\LocalFEnUgqRZUM.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\LocalFEnUgqRZUM.exeC:\Users\Admin\AppData\LocalFEnUgqRZUM.exe3⤵
- Executes dropped EXE
PID:4920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD539669e5a0b4e4b6b569fb204b6b9eedf
SHA16b305e9240d5ace4aeb6a528501b7b40b20423b5
SHA2568ffd0ede4e3f0b6d033146cbb6b1b5126e9170707732eeeb46ede3b35d187883
SHA512ef76621c91f80dd7bbf3adc766bc4aaa1252be1b81c0715004a6f7d5fcd71e3bf9384ff25b34eb6b24a0aca691c84295fde6f6e65d3abc2e73d0534bb38ca6c0
-
Filesize
350KB
MD539669e5a0b4e4b6b569fb204b6b9eedf
SHA16b305e9240d5ace4aeb6a528501b7b40b20423b5
SHA2568ffd0ede4e3f0b6d033146cbb6b1b5126e9170707732eeeb46ede3b35d187883
SHA512ef76621c91f80dd7bbf3adc766bc4aaa1252be1b81c0715004a6f7d5fcd71e3bf9384ff25b34eb6b24a0aca691c84295fde6f6e65d3abc2e73d0534bb38ca6c0
-
Filesize
350KB
MD539669e5a0b4e4b6b569fb204b6b9eedf
SHA16b305e9240d5ace4aeb6a528501b7b40b20423b5
SHA2568ffd0ede4e3f0b6d033146cbb6b1b5126e9170707732eeeb46ede3b35d187883
SHA512ef76621c91f80dd7bbf3adc766bc4aaa1252be1b81c0715004a6f7d5fcd71e3bf9384ff25b34eb6b24a0aca691c84295fde6f6e65d3abc2e73d0534bb38ca6c0