Analysis
-
max time kernel
168s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:40
Behavioral task
behavioral1
Sample
2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe
Resource
win10v2004-20221111-en
General
-
Target
2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe
-
Size
28KB
-
MD5
3492d6c98dd85f9abcc6c34cf4491998
-
SHA1
212d4d385f72d7906e3ea7832e5c720dc392021f
-
SHA256
2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960
-
SHA512
bdfaf0e244355b12ffbf6e473a270d5247fbfb8b0960c1e478b866940956b8eb0088e9bc7699ecd0ada85b250224ba059c538618cf6f2ee4f6a8ffcfc8c66e31
-
SSDEEP
384:WCZ2hJl7tjrMSJIeURd545rCWmqDebDveoEGBsbh0w4wlAokw9OhgOL1vYRGOZzG:VM79MSJ07srcqETe6BKh0p29SgRj+t
Malware Config
Extracted
njrat
0.6.4
Đǿsħka ĦąĈķễr
ahmad-rimawi1998.zapto.org:1188
1ffcf52b0cd64d83554855bd6f04fc1f
-
reg_key
1ffcf52b0cd64d83554855bd6f04fc1f
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
taskhost.exepid process 2128 taskhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exedescription pid process target process PID 460 wrote to memory of 2128 460 2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe taskhost.exe PID 460 wrote to memory of 2128 460 2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe taskhost.exe PID 460 wrote to memory of 2128 460 2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe taskhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe"C:\Users\Admin\AppData\Local\Temp\2413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"2⤵
- Executes dropped EXE
PID:2128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD53492d6c98dd85f9abcc6c34cf4491998
SHA1212d4d385f72d7906e3ea7832e5c720dc392021f
SHA2562413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960
SHA512bdfaf0e244355b12ffbf6e473a270d5247fbfb8b0960c1e478b866940956b8eb0088e9bc7699ecd0ada85b250224ba059c538618cf6f2ee4f6a8ffcfc8c66e31
-
Filesize
28KB
MD53492d6c98dd85f9abcc6c34cf4491998
SHA1212d4d385f72d7906e3ea7832e5c720dc392021f
SHA2562413b7f8b03acf212c1c9bd092dc8892d74885dc49e2d926d607618f203fa960
SHA512bdfaf0e244355b12ffbf6e473a270d5247fbfb8b0960c1e478b866940956b8eb0088e9bc7699ecd0ada85b250224ba059c538618cf6f2ee4f6a8ffcfc8c66e31