Analysis

  • max time kernel
    156s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:47

General

  • Target

    85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101.exe

  • Size

    56KB

  • MD5

    6ec722039c95fda117a7a8e37057c689

  • SHA1

    924187760a08fe76aca2c83d222009f4310a9736

  • SHA256

    85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101

  • SHA512

    4d3e947a4a7ba7306ca14dcf0c071d1ee7d7526e7fefe5f2179626ca97d781d94f7c8207a142d6e00d43d0975abbc67ebd4817360033c04a4e3e23e0ef359b2a

  • SSDEEP

    768:G/sgxcAtCL90oWAktUOqWTRHV/oZkTXyxnPurcrxT/fnF+l7R5sTgbOluT:cxc6CLeoWA5ZWTRHCZkOtzfstRe+OlO

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

US ACCOUNT

C2

212.7.208.123:6020

Mutex

93f19dda2412c86ad7520ba4198f39a0

Attributes
  • reg_key

    93f19dda2412c86ad7520ba4198f39a0

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101.exe
    "C:\Users\Admin\AppData\Local\Temp\85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\AppData\Local\Temp\85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101.exe
      "C:\Users\Admin\AppData\Local\Temp\85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:380
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101.exe" "85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:2848
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\ewylyfckjukn.vbs"
      2⤵
        PID:2468
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" import C:\Users\Admin\AppData\Local\ewylyfckjthho.reg
        2⤵
        • Adds Run key to start application
        PID:3148

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101.exe
      Filesize

      56KB

      MD5

      6ec722039c95fda117a7a8e37057c689

      SHA1

      924187760a08fe76aca2c83d222009f4310a9736

      SHA256

      85eb70322648b91b6731ae31fefd7307bf1243d5076a0312367461b57d4ea101

      SHA512

      4d3e947a4a7ba7306ca14dcf0c071d1ee7d7526e7fefe5f2179626ca97d781d94f7c8207a142d6e00d43d0975abbc67ebd4817360033c04a4e3e23e0ef359b2a

    • C:\Users\Admin\AppData\Local\ewylyfckjthho.reg
      Filesize

      140B

      MD5

      19e112962b7efeb7eb2ea4734a9b5d3c

      SHA1

      e637c6adbe73aa70237e1abdb6d81654950d6fea

      SHA256

      8d6e00c3d7c50ebe6d03e81413910ffd7738f96fdef82f5de88683b5a1e241db

      SHA512

      6d4ad1bf0db6dc3005d95ac2374aae20b5e5c08cdf703d2b6c6ebbe1f274aaa72843546f27e41554a086ea90f22a153afa1a074f41f1f390ab1fe64b47c98333

    • C:\Users\Admin\AppData\Local\ewylyfckjukn.vbs
      Filesize

      447B

      MD5

      93528f58f8133fceed85a29b5617fe5a

      SHA1

      cfb69b42acdeaa949cf34a461456e3c445cb0394

      SHA256

      f639739f74f85fd7d65d519fa5c89197eb49bc665f4d38f1968366d6bec3166e

      SHA512

      e45d7c5c20042b6a8214ebf8956ad04df5a600717dc3a63d663d9d1a2d77a53962fe0320d570d744edac2ae7c39338cdcecd0ba0f3aa88a68399fb42778bc736

    • memory/380-134-0x0000000000400000-0x000000000040E000-memory.dmp
      Filesize

      56KB

    • memory/380-136-0x0000000074850000-0x0000000074E01000-memory.dmp
      Filesize

      5.7MB

    • memory/380-133-0x0000000000000000-mapping.dmp
    • memory/380-144-0x0000000074850000-0x0000000074E01000-memory.dmp
      Filesize

      5.7MB

    • memory/2468-139-0x0000000000000000-mapping.dmp
    • memory/2848-137-0x0000000000000000-mapping.dmp
    • memory/3148-140-0x0000000000000000-mapping.dmp
    • memory/4584-138-0x0000000074850000-0x0000000074E01000-memory.dmp
      Filesize

      5.7MB

    • memory/4584-132-0x0000000074850000-0x0000000074E01000-memory.dmp
      Filesize

      5.7MB

    • memory/4584-143-0x0000000074850000-0x0000000074E01000-memory.dmp
      Filesize

      5.7MB