Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:47

General

  • Target

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0.exe

  • Size

    29KB

  • MD5

    2ec4de9fb46f096cb9d8cda59dbf0a9f

  • SHA1

    c798a2b7efa30131712cc93d257665782aa7e493

  • SHA256

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0

  • SHA512

    cf80dcf90fde9eb4fd5109c70405006df94cd2424ab43085303a6bea809de35a81ed78a19c8894ccd24a03057e46a87d9f8c816f5de436ae4e0861a24b8c4ec4

  • SSDEEP

    768:cx77Kk4XeP/Fzsq+xre6BKh0p29SgR6d:27K7W4zx3KhG29j6d

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

husseinsaif.linkpc.net:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0.exe
    "C:\Users\Admin\AppData\Local\Temp\c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
      "C:\Users\Admin\AppData\Local\Temp\Trojan.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

    Filesize

    29KB

    MD5

    2ec4de9fb46f096cb9d8cda59dbf0a9f

    SHA1

    c798a2b7efa30131712cc93d257665782aa7e493

    SHA256

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0

    SHA512

    cf80dcf90fde9eb4fd5109c70405006df94cd2424ab43085303a6bea809de35a81ed78a19c8894ccd24a03057e46a87d9f8c816f5de436ae4e0861a24b8c4ec4

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

    Filesize

    29KB

    MD5

    2ec4de9fb46f096cb9d8cda59dbf0a9f

    SHA1

    c798a2b7efa30131712cc93d257665782aa7e493

    SHA256

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0

    SHA512

    cf80dcf90fde9eb4fd5109c70405006df94cd2424ab43085303a6bea809de35a81ed78a19c8894ccd24a03057e46a87d9f8c816f5de436ae4e0861a24b8c4ec4

  • \Users\Admin\AppData\Local\Temp\Trojan.exe

    Filesize

    29KB

    MD5

    2ec4de9fb46f096cb9d8cda59dbf0a9f

    SHA1

    c798a2b7efa30131712cc93d257665782aa7e493

    SHA256

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0

    SHA512

    cf80dcf90fde9eb4fd5109c70405006df94cd2424ab43085303a6bea809de35a81ed78a19c8894ccd24a03057e46a87d9f8c816f5de436ae4e0861a24b8c4ec4

  • memory/456-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB

  • memory/456-55-0x00000000743D0000-0x000000007497B000-memory.dmp

    Filesize

    5.7MB

  • memory/456-61-0x00000000743D0000-0x000000007497B000-memory.dmp

    Filesize

    5.7MB

  • memory/1584-62-0x0000000000000000-mapping.dmp

  • memory/1628-57-0x0000000000000000-mapping.dmp

  • memory/1628-64-0x00000000743D0000-0x000000007497B000-memory.dmp

    Filesize

    5.7MB

  • memory/1628-65-0x00000000743D0000-0x000000007497B000-memory.dmp

    Filesize

    5.7MB