Analysis
-
max time kernel
278s -
max time network
353s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:40
Behavioral task
behavioral1
Sample
8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exe
Resource
win7-20221111-en
General
-
Target
8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exe
-
Size
29KB
-
MD5
dd3ff94e88a68a723445e3ddbce330e2
-
SHA1
766f72207fc755e28897dc4c5534b59efd4b80d7
-
SHA256
8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f
-
SHA512
d992e3fa02d0e2be12ed0715ae92a55418de510a75423c5a9d40c2cab9c2f3e85cfc3207bb7bc1d805b6265edcbf942ecac61fdff1ada9b246369a48183d74db
-
SSDEEP
768:0rD71oGc1FRVp74q8HesBKh0p29SgRde:WD71IPkpZKhG29jde
Malware Config
Extracted
njrat
0.6.4
HacKed
wesam2014.no-ip.biz:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Trojan.exepid process 2160 Trojan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exedescription pid process target process PID 1768 wrote to memory of 2160 1768 8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exe Trojan.exe PID 1768 wrote to memory of 2160 1768 8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exe Trojan.exe PID 1768 wrote to memory of 2160 1768 8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exe Trojan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exe"C:\Users\Admin\AppData\Local\Temp\8fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
PID:2160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5dd3ff94e88a68a723445e3ddbce330e2
SHA1766f72207fc755e28897dc4c5534b59efd4b80d7
SHA2568fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f
SHA512d992e3fa02d0e2be12ed0715ae92a55418de510a75423c5a9d40c2cab9c2f3e85cfc3207bb7bc1d805b6265edcbf942ecac61fdff1ada9b246369a48183d74db
-
Filesize
29KB
MD5dd3ff94e88a68a723445e3ddbce330e2
SHA1766f72207fc755e28897dc4c5534b59efd4b80d7
SHA2568fe3efc9fa68a21e130159f668026f0c9588a08e09f09a2f330066e8fc84f07f
SHA512d992e3fa02d0e2be12ed0715ae92a55418de510a75423c5a9d40c2cab9c2f3e85cfc3207bb7bc1d805b6265edcbf942ecac61fdff1ada9b246369a48183d74db