Malware Analysis Report

2024-08-06 19:34

Sample ID 221123-s9d2magd9z
Target 45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715
SHA256 45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715
Tags
njrat billy evasion trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715

Threat Level: Known bad

The file 45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715 was found to be: Known bad.

Malicious Activity Summary

njrat billy evasion trojan

njRAT/Bladabindi

Modifies Windows Firewall

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Drops desktop.ini file(s)

Suspicious use of SetThreadContext

Drops file in Windows directory

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V6

Analysis: static1

Detonation Overview

Reported

2022-11-23 15:49

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-23 15:49

Reported

2022-11-23 17:05

Platform

win10v2004-20221111-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe"

Signatures

njRAT/Bladabindi

trojan njrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 5008 set thread context of 1296 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\assembly C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4940 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 4940 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 4940 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 5008 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 5008 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 5008 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 5008 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 5008 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 5008 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 5008 wrote to memory of 1296 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1296 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Windows\SysWOW64\netsh.exe
PID 1296 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Windows\SysWOW64\netsh.exe
PID 1296 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Windows\SysWOW64\netsh.exe

Processes

C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe

"C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe"

C:\Users\Admin\AppData\Roaming\mpack\1.exe

"C:\Users\Admin\AppData\Roaming\mpack\1.exe"

C:\Users\Admin\AppData\Roaming\mpack\1.exe

"C:\Users\Admin\AppData\Roaming\mpack\1.exe"

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\mpack\1.exe" "1.exe" ENABLE

Network

Country Destination Domain Proto
N/A 93.184.220.29:80 tcp
N/A 8.238.21.126:80 tcp
N/A 8.238.21.126:80 tcp
N/A 8.238.21.126:80 tcp
N/A 40.125.122.176:443 tcp
N/A 104.208.16.88:443 tcp
N/A 40.125.122.176:443 tcp
N/A 8.238.21.126:80 tcp
N/A 104.80.225.205:443 tcp
N/A 8.8.8.8:53 withgod.hopper.pw udp
N/A 72.52.215.31:770 withgod.hopper.pw tcp

Files

memory/4940-132-0x0000000075180000-0x0000000075731000-memory.dmp

memory/5008-133-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\mpack\1.exe

MD5 d4fa7bd15aecc2749c171f5d97426a41
SHA1 0bda5e4cbe7ecec339d411cc5705800ef2e5f181
SHA256 4a18bd3ea519399cf10546a69f1feb7a3b59f8688f7e6fc3c323e7971fab85f6
SHA512 508f95802c686f08634a56a8dfc97293de57e4aaa68f179d9201ad4b7c167f63a4d76ef07d6e419c90ced7741cb8cc000c780b813a32334d90af3d9cc104186f

C:\Users\Admin\AppData\Roaming\mpack\1.exe

MD5 d4fa7bd15aecc2749c171f5d97426a41
SHA1 0bda5e4cbe7ecec339d411cc5705800ef2e5f181
SHA256 4a18bd3ea519399cf10546a69f1feb7a3b59f8688f7e6fc3c323e7971fab85f6
SHA512 508f95802c686f08634a56a8dfc97293de57e4aaa68f179d9201ad4b7c167f63a4d76ef07d6e419c90ced7741cb8cc000c780b813a32334d90af3d9cc104186f

memory/5008-136-0x0000000075180000-0x0000000075731000-memory.dmp

memory/4940-137-0x0000000075180000-0x0000000075731000-memory.dmp

memory/5008-138-0x0000000075180000-0x0000000075731000-memory.dmp

memory/1296-139-0x0000000000000000-mapping.dmp

memory/1296-140-0x0000000000400000-0x000000000040A000-memory.dmp

C:\Users\Admin\AppData\Roaming\mpack\1.exe

MD5 d4fa7bd15aecc2749c171f5d97426a41
SHA1 0bda5e4cbe7ecec339d411cc5705800ef2e5f181
SHA256 4a18bd3ea519399cf10546a69f1feb7a3b59f8688f7e6fc3c323e7971fab85f6
SHA512 508f95802c686f08634a56a8dfc97293de57e4aaa68f179d9201ad4b7c167f63a4d76ef07d6e419c90ced7741cb8cc000c780b813a32334d90af3d9cc104186f

memory/5008-142-0x0000000075180000-0x0000000075731000-memory.dmp

memory/1296-143-0x0000000075180000-0x0000000075731000-memory.dmp

memory/1652-144-0x0000000000000000-mapping.dmp

memory/1296-145-0x0000000075180000-0x0000000075731000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-23 15:49

Reported

2022-11-23 17:06

Platform

win7-20221111-en

Max time kernel

146s

Max time network

163s

Command Line

"C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe"

Signatures

njRAT/Bladabindi

trojan njrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1984 set thread context of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2040 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 2040 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 2040 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 2040 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1984 wrote to memory of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1984 wrote to memory of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1984 wrote to memory of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1984 wrote to memory of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1984 wrote to memory of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1984 wrote to memory of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1984 wrote to memory of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 1984 wrote to memory of 520 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Users\Admin\AppData\Roaming\mpack\1.exe
PID 520 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Windows\SysWOW64\netsh.exe
PID 520 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Windows\SysWOW64\netsh.exe
PID 520 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Windows\SysWOW64\netsh.exe
PID 520 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Roaming\mpack\1.exe C:\Windows\SysWOW64\netsh.exe

Processes

C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe

"C:\Users\Admin\AppData\Local\Temp\45420f1150a00fc1b74db78200c2d0e593e20a732586de6db59af7ba2a718715.exe"

C:\Users\Admin\AppData\Roaming\mpack\1.exe

"C:\Users\Admin\AppData\Roaming\mpack\1.exe"

C:\Users\Admin\AppData\Roaming\mpack\1.exe

"C:\Users\Admin\AppData\Roaming\mpack\1.exe"

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\mpack\1.exe" "1.exe" ENABLE

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 withgod.hopper.pw udp
N/A 72.52.215.31:770 withgod.hopper.pw tcp
N/A 72.52.215.31:770 withgod.hopper.pw tcp

Files

memory/2040-54-0x0000000075C21000-0x0000000075C23000-memory.dmp

memory/2040-55-0x00000000745F0000-0x0000000074B9B000-memory.dmp

\Users\Admin\AppData\Roaming\mpack\1.exe

MD5 d4fa7bd15aecc2749c171f5d97426a41
SHA1 0bda5e4cbe7ecec339d411cc5705800ef2e5f181
SHA256 4a18bd3ea519399cf10546a69f1feb7a3b59f8688f7e6fc3c323e7971fab85f6
SHA512 508f95802c686f08634a56a8dfc97293de57e4aaa68f179d9201ad4b7c167f63a4d76ef07d6e419c90ced7741cb8cc000c780b813a32334d90af3d9cc104186f

\Users\Admin\AppData\Roaming\mpack\1.exe

MD5 d4fa7bd15aecc2749c171f5d97426a41
SHA1 0bda5e4cbe7ecec339d411cc5705800ef2e5f181
SHA256 4a18bd3ea519399cf10546a69f1feb7a3b59f8688f7e6fc3c323e7971fab85f6
SHA512 508f95802c686f08634a56a8dfc97293de57e4aaa68f179d9201ad4b7c167f63a4d76ef07d6e419c90ced7741cb8cc000c780b813a32334d90af3d9cc104186f

memory/1984-58-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\mpack\1.exe

MD5 d4fa7bd15aecc2749c171f5d97426a41
SHA1 0bda5e4cbe7ecec339d411cc5705800ef2e5f181
SHA256 4a18bd3ea519399cf10546a69f1feb7a3b59f8688f7e6fc3c323e7971fab85f6
SHA512 508f95802c686f08634a56a8dfc97293de57e4aaa68f179d9201ad4b7c167f63a4d76ef07d6e419c90ced7741cb8cc000c780b813a32334d90af3d9cc104186f

C:\Users\Admin\AppData\Roaming\mpack\1.exe

MD5 d4fa7bd15aecc2749c171f5d97426a41
SHA1 0bda5e4cbe7ecec339d411cc5705800ef2e5f181
SHA256 4a18bd3ea519399cf10546a69f1feb7a3b59f8688f7e6fc3c323e7971fab85f6
SHA512 508f95802c686f08634a56a8dfc97293de57e4aaa68f179d9201ad4b7c167f63a4d76ef07d6e419c90ced7741cb8cc000c780b813a32334d90af3d9cc104186f

memory/2040-62-0x00000000745F0000-0x0000000074B9B000-memory.dmp

memory/1984-63-0x00000000745F0000-0x0000000074B9B000-memory.dmp

memory/1984-64-0x00000000745F0000-0x0000000074B9B000-memory.dmp

memory/520-68-0x0000000000400000-0x000000000040A000-memory.dmp

memory/520-69-0x0000000000400000-0x000000000040A000-memory.dmp

memory/520-66-0x0000000000400000-0x000000000040A000-memory.dmp

C:\Users\Admin\AppData\Roaming\mpack\1.exe

MD5 d4fa7bd15aecc2749c171f5d97426a41
SHA1 0bda5e4cbe7ecec339d411cc5705800ef2e5f181
SHA256 4a18bd3ea519399cf10546a69f1feb7a3b59f8688f7e6fc3c323e7971fab85f6
SHA512 508f95802c686f08634a56a8dfc97293de57e4aaa68f179d9201ad4b7c167f63a4d76ef07d6e419c90ced7741cb8cc000c780b813a32334d90af3d9cc104186f

memory/520-70-0x000000000040747E-mapping.dmp

memory/520-65-0x0000000000400000-0x000000000040A000-memory.dmp

memory/520-73-0x0000000000400000-0x000000000040A000-memory.dmp

memory/520-75-0x0000000000400000-0x000000000040A000-memory.dmp

memory/1984-77-0x00000000745F0000-0x0000000074B9B000-memory.dmp

memory/520-78-0x00000000745F0000-0x0000000074B9B000-memory.dmp

memory/1800-79-0x0000000000000000-mapping.dmp

memory/520-81-0x00000000745F0000-0x0000000074B9B000-memory.dmp