Analysis

  • max time kernel
    156s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:47

General

  • Target

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0.exe

  • Size

    29KB

  • MD5

    2ec4de9fb46f096cb9d8cda59dbf0a9f

  • SHA1

    c798a2b7efa30131712cc93d257665782aa7e493

  • SHA256

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0

  • SHA512

    cf80dcf90fde9eb4fd5109c70405006df94cd2424ab43085303a6bea809de35a81ed78a19c8894ccd24a03057e46a87d9f8c816f5de436ae4e0861a24b8c4ec4

  • SSDEEP

    768:cx77Kk4XeP/Fzsq+xre6BKh0p29SgR6d:27K7W4zx3KhG29j6d

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

husseinsaif.linkpc.net:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0.exe
    "C:\Users\Admin\AppData\Local\Temp\c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
      "C:\Users\Admin\AppData\Local\Temp\Trojan.exe"
      2⤵
      • Executes dropped EXE
      PID:2256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

    Filesize

    29KB

    MD5

    2ec4de9fb46f096cb9d8cda59dbf0a9f

    SHA1

    c798a2b7efa30131712cc93d257665782aa7e493

    SHA256

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0

    SHA512

    cf80dcf90fde9eb4fd5109c70405006df94cd2424ab43085303a6bea809de35a81ed78a19c8894ccd24a03057e46a87d9f8c816f5de436ae4e0861a24b8c4ec4

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

    Filesize

    29KB

    MD5

    2ec4de9fb46f096cb9d8cda59dbf0a9f

    SHA1

    c798a2b7efa30131712cc93d257665782aa7e493

    SHA256

    c7f27f39bc1aa0128a98aa1fafc71f8008f6d897d74cae9d10f59fd8dc1f1af0

    SHA512

    cf80dcf90fde9eb4fd5109c70405006df94cd2424ab43085303a6bea809de35a81ed78a19c8894ccd24a03057e46a87d9f8c816f5de436ae4e0861a24b8c4ec4

  • memory/568-132-0x0000000075360000-0x0000000075911000-memory.dmp

    Filesize

    5.7MB

  • memory/568-136-0x0000000075360000-0x0000000075911000-memory.dmp

    Filesize

    5.7MB

  • memory/2256-133-0x0000000000000000-mapping.dmp

  • memory/2256-137-0x0000000075360000-0x0000000075911000-memory.dmp

    Filesize

    5.7MB