Analysis
-
max time kernel
179s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:42
Static task
static1
Behavioral task
behavioral1
Sample
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe
Resource
win7-20220812-en
General
-
Target
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe
-
Size
180KB
-
MD5
f76896af9cfc0316ef7f670c7f5ed927
-
SHA1
e536ae98ec304649f5bc9f18f9731e54f544228e
-
SHA256
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28
-
SHA512
9f9f904ccd867aa94b8822416641d105ecba9b2e67f9675e48303c696083b50c89f22f831faa9a6a6696004417d141a74ada77d40119c424eb546b47ec0197da
-
SSDEEP
3072:YbzRtQ/hKbSjSQgBp0kZlqTb/dtzDE+Khtntpsak8rDWtV+:YQoSqhZlQRtzDCt3t4
Malware Config
Extracted
njrat
0.7d
HacKed
0788878940.no-ip.org:55554
46123a2deb0d891e7972ee418c053b39
-
reg_key
46123a2deb0d891e7972ee418c053b39
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windows.exepid process 2872 windows.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exedescription ioc process File opened for modification C:\Windows\assembly\Desktop.ini 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe File created C:\Windows\assembly\Desktop.ini 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exedescription pid process target process PID 1940 set thread context of 3432 1940 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe -
Drops file in Windows directory 3 IoCs
Processes:
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exedescription ioc process File opened for modification C:\Windows\assembly 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe File created C:\Windows\assembly\Desktop.ini 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe File opened for modification C:\Windows\assembly\Desktop.ini 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exewindows.exedescription pid process Token: SeDebugPrivilege 1940 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe Token: SeDebugPrivilege 2872 windows.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exewindows.exedescription pid process target process PID 1940 wrote to memory of 3432 1940 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe PID 1940 wrote to memory of 3432 1940 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe PID 1940 wrote to memory of 3432 1940 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe PID 1940 wrote to memory of 3432 1940 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe PID 1940 wrote to memory of 3432 1940 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe PID 3432 wrote to memory of 2872 3432 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe windows.exe PID 3432 wrote to memory of 2872 3432 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe windows.exe PID 3432 wrote to memory of 2872 3432 3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe windows.exe PID 2872 wrote to memory of 5064 2872 windows.exe windows.exe PID 2872 wrote to memory of 5064 2872 windows.exe windows.exe PID 2872 wrote to memory of 5064 2872 windows.exe windows.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe"C:\Users\Admin\AppData\Local\Temp\3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exeC:\Users\Admin\AppData\Local\Temp\3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Roaming\windows.exe"C:\Users\Admin\AppData\Roaming\windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\windows.exeC:\Users\Admin\AppData\Roaming\windows.exe4⤵PID:5064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\3e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28.exe.log
Filesize496B
MD57baa6583f69f63f7230df9bf98448356
SHA1fe9eb85b57192362da704a3c130377fe83862320
SHA256a632504621b4cac1d5ba5465c7ad9b30f3d036e9838682506782124a211bed4f
SHA5120e72541791281c0fdac1f5fc6beea0b9eb8766b2a386aecb92cb8a44e5b59b7114c79194393ddeff957ffe86021a311caed7ce2731b863d97ad441870efbc051
-
Filesize
180KB
MD5f76896af9cfc0316ef7f670c7f5ed927
SHA1e536ae98ec304649f5bc9f18f9731e54f544228e
SHA2563e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28
SHA5129f9f904ccd867aa94b8822416641d105ecba9b2e67f9675e48303c696083b50c89f22f831faa9a6a6696004417d141a74ada77d40119c424eb546b47ec0197da
-
Filesize
180KB
MD5f76896af9cfc0316ef7f670c7f5ed927
SHA1e536ae98ec304649f5bc9f18f9731e54f544228e
SHA2563e8d65e81df336aa3bac5b1d332e075fe48c2b6e256c004f1635168674883f28
SHA5129f9f904ccd867aa94b8822416641d105ecba9b2e67f9675e48303c696083b50c89f22f831faa9a6a6696004417d141a74ada77d40119c424eb546b47ec0197da