Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:36
Static task
static1
Behavioral task
behavioral1
Sample
973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe
Resource
win10v2004-20220812-en
General
-
Target
973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe
-
Size
878KB
-
MD5
f5af188a585adc74007264e0d043a3c1
-
SHA1
6912cf14453f8c8f3182995ae8162c98f6cc7f34
-
SHA256
973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077
-
SHA512
d3c2f501595499bf2a0cf6a502a10743d06426e2c51bcde4fce9f3e4676555d9e3ea48eb663545bb30c915dbe6a2c8ac829916051862bf386436fc8631a556b2
-
SSDEEP
12288:Pat0EAH49n8BZ7yMhmuPgJ3BhOl+nHzHdQJ0pTCaQfOgNgrX2gIvvsL/8T3eJGix:yt24+7+uPgJ3ul+nTd+OSgLpz4T3eJGO
Malware Config
Extracted
njrat
0.7d
BILLY
withgod.hopper.pw:770
b84a37071759ef5cf75837e93f4b857b
-
reg_key
b84a37071759ef5cf75837e93f4b857b
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
xjgdw.pifxjgdw.pifRegSvcs.exepid process 780 xjgdw.pif 1976 xjgdw.pif 432 RegSvcs.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 6 IoCs
Processes:
973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exexjgdw.pifxjgdw.pifpid process 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe 780 xjgdw.pif 1976 xjgdw.pif -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
xjgdw.pifdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run xjgdw.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cvtres = "C:\\Users\\Admin\\AppData\\Roaming\\dcdsp\\xjgdw.pif C:\\Users\\Admin\\AppData\\Roaming\\dcdsp\\qsleh.qie" xjgdw.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
xjgdw.pifdescription pid process target process PID 1976 set thread context of 432 1976 xjgdw.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe Token: 33 432 RegSvcs.exe Token: SeIncBasePriorityPrivilege 432 RegSvcs.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exexjgdw.pifxjgdw.pifRegSvcs.exedescription pid process target process PID 2000 wrote to memory of 780 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe xjgdw.pif PID 2000 wrote to memory of 780 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe xjgdw.pif PID 2000 wrote to memory of 780 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe xjgdw.pif PID 2000 wrote to memory of 780 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe xjgdw.pif PID 2000 wrote to memory of 780 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe xjgdw.pif PID 2000 wrote to memory of 780 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe xjgdw.pif PID 2000 wrote to memory of 780 2000 973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe xjgdw.pif PID 780 wrote to memory of 1976 780 xjgdw.pif xjgdw.pif PID 780 wrote to memory of 1976 780 xjgdw.pif xjgdw.pif PID 780 wrote to memory of 1976 780 xjgdw.pif xjgdw.pif PID 780 wrote to memory of 1976 780 xjgdw.pif xjgdw.pif PID 780 wrote to memory of 1976 780 xjgdw.pif xjgdw.pif PID 780 wrote to memory of 1976 780 xjgdw.pif xjgdw.pif PID 780 wrote to memory of 1976 780 xjgdw.pif xjgdw.pif PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 1976 wrote to memory of 432 1976 xjgdw.pif RegSvcs.exe PID 432 wrote to memory of 1716 432 RegSvcs.exe netsh.exe PID 432 wrote to memory of 1716 432 RegSvcs.exe netsh.exe PID 432 wrote to memory of 1716 432 RegSvcs.exe netsh.exe PID 432 wrote to memory of 1716 432 RegSvcs.exe netsh.exe PID 432 wrote to memory of 1716 432 RegSvcs.exe netsh.exe PID 432 wrote to memory of 1716 432 RegSvcs.exe netsh.exe PID 432 wrote to memory of 1716 432 RegSvcs.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe"C:\Users\Admin\AppData\Local\Temp\973c9e8c1325a97b1f899f5a10cea9d2f8f80b3aa3e33c10bb63336e09ee4077.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pif"C:\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pif" qsleh.qie2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifC:\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pif C:\Users\Admin\AppData\Roaming\dcdsp\OJGOU3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe" "RegSvcs.exe" ENABLE5⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
33KB
MD5994c7859304a76ceb46392f23ce0fa69
SHA1de58d3439afc32a5c8bece7284ba998985dfa1ab
SHA256f814d623a26b86b7147a95f773c67f188e6f655b0a168d38a8b16b1f5894cc71
SHA512d2b7020fd4d6715452d20fe72652bae67669346862b8fd198f147598571fcf081d97ea68849e5ff69d41a58ee22372914ac4d07ef097ea9db760351b3e0eaaf0
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
33KB
MD5994c7859304a76ceb46392f23ce0fa69
SHA1de58d3439afc32a5c8bece7284ba998985dfa1ab
SHA256f814d623a26b86b7147a95f773c67f188e6f655b0a168d38a8b16b1f5894cc71
SHA512d2b7020fd4d6715452d20fe72652bae67669346862b8fd198f147598571fcf081d97ea68849e5ff69d41a58ee22372914ac4d07ef097ea9db760351b3e0eaaf0
-
C:\Users\Admin\AppData\Roaming\dcdsp\OJGOUFilesize
118KB
MD5c346f5cd7684d742e218dc717b47c027
SHA1c1486531db25d3c7f86e6a0031342885bd8580b5
SHA256f4277a31ceba382ca8de4d8771e9d12e67dac07c421edbb9dc38be4d843bcb63
SHA51290548e009e967c0151b3330c5070352a5de2e227d61a0695044ebaddad492d2a95a05fbeddb7155b959320ffbfbb0866f091348f8e7927a5810aa8ec2344edaf
-
C:\Users\Admin\AppData\Roaming\dcdsp\YMQGIXFilesize
29KB
MD57b7b71df124bc97c534515dcf50ce86e
SHA10cdd2b9f2dde88f2ff78ffca3557bee3dff77154
SHA256602ea3bc757612fc4dd9a3e4b83de03283684afa3e31d2c61f1b559d6c513f14
SHA512f9d4e142945aff10f561bf5ae7718128df04adbbfcc97b18d647985e71e88b4e2bcc539d1950e1115d386649b0a838f243982c783eee69a144f13125cf2723dd
-
C:\Users\Admin\AppData\Roaming\dcdsp\ettttFilesize
1KB
MD5640db8da702baaf410c9790e09b7cc82
SHA17c4539c77c83ea64e85133969aa94795a76a43fd
SHA2566aad9f2e7c636dcea995389fcd99c558d5a9c136aaa9cfbcbb132cc7f7abefd8
SHA51225132c750641f572a6c739971d219ff8da01d6899480c8bbefd05fb054246f6ca2bbb46c0fd72132cee8bd70bb695692bc1c66c3b8e51233ad4fc2d9c7ba47a2
-
C:\Users\Admin\AppData\Roaming\dcdsp\ppcof.qveFilesize
118KB
MD5f5bacdd6c1b958b5f71b2104468564c2
SHA169844070a757c70050ea53bb511117b13e5664be
SHA2564d326ee4122d3c8664105f3bb590b5ef799a60e233bf74217e19d4c9f609f601
SHA512e03772e56d0e069809f5b94052f315c0063cc6235a34b68ae1639769fe7cb43522950a7fe3c7776b2b3e90e2c59954954430a0be64e84d07a29fd7854efc9f8e
-
C:\Users\Admin\AppData\Roaming\dcdsp\qmvshFilesize
23KB
MD55a712708d9e44c1155486fe98f43e902
SHA1e38fed07c7ba70cd767d6523efd405172cfaf25d
SHA25694755876bbca49070b732853ee3ecc345690d56818dc0bd6557e22c94fa954fd
SHA512a93b64ff068a93ab034507e16d946fc05bf2fdc19d52aaadf253a93b999dac39c64e55b82723a7a24accd390d35845f3d720203c523699cf9e6d93b25f59838c
-
C:\Users\Admin\AppData\Roaming\dcdsp\qsleh.qieFilesize
3KB
MD5d5b4309ba1f32fd202be951358732d2f
SHA1045b0d44191088c05a76c12f38d9979482def488
SHA2567f991f482669a82eb2317c45777350a738487fa9d7bcbc66ca731bfaf617cbe7
SHA512378e34554c166cef62ba5a1832d6a15845b092c3f9a76c937bc5ec7eea69c20f01a5b7293bf2f18b84bc31dbd780cc0ad4541e8e371ea8c52a976f3f41b9d6d2
-
C:\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
33KB
MD5994c7859304a76ceb46392f23ce0fa69
SHA1de58d3439afc32a5c8bece7284ba998985dfa1ab
SHA256f814d623a26b86b7147a95f773c67f188e6f655b0a168d38a8b16b1f5894cc71
SHA512d2b7020fd4d6715452d20fe72652bae67669346862b8fd198f147598571fcf081d97ea68849e5ff69d41a58ee22372914ac4d07ef097ea9db760351b3e0eaaf0
-
\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
\Users\Admin\AppData\Roaming\dcdsp\xjgdw.pifFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
memory/432-74-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/432-88-0x0000000074130000-0x00000000746DB000-memory.dmpFilesize
5.7MB
-
memory/432-75-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/432-77-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/432-78-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/432-79-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/432-80-0x000000000040747E-mapping.dmp
-
memory/432-91-0x0000000074130000-0x00000000746DB000-memory.dmpFilesize
5.7MB
-
memory/432-83-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/432-85-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/780-59-0x0000000000000000-mapping.dmp
-
memory/1716-89-0x0000000000000000-mapping.dmp
-
memory/1976-67-0x0000000000000000-mapping.dmp
-
memory/2000-54-0x0000000075501000-0x0000000075503000-memory.dmpFilesize
8KB