Analysis
-
max time kernel
161s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:49
Behavioral task
behavioral1
Sample
abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exe
Resource
win7-20221111-en
General
-
Target
abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exe
-
Size
23KB
-
MD5
174dbc902fdc8d1b3cf8473015aeae85
-
SHA1
e99d3c3cc51c5987d0f5e1d12d156d0247c1ffec
-
SHA256
abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e
-
SHA512
880f7ad0c6ba91dd4cb100f3b03653d09193f126c8f78b6d7e051611ef04cbd5d2cd0b5006b172dfcef2e3dd4150c41daf707634e1fbbfdfed40737c3258813c
-
SSDEEP
384:2LQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZnf:2s5yBVd7RpcnuQ
Malware Config
Extracted
njrat
0.7d
HacKed
soultaker1.ddns.net:1177
959bf97e0a59564fda4dd890fa915788
-
reg_key
959bf97e0a59564fda4dd890fa915788
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dllhost.exepid process 436 dllhost.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
dllhost.exedescription pid process Token: SeDebugPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe Token: 33 436 dllhost.exe Token: SeIncBasePriorityPrivilege 436 dllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exedllhost.exedescription pid process target process PID 2776 wrote to memory of 436 2776 abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exe dllhost.exe PID 2776 wrote to memory of 436 2776 abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exe dllhost.exe PID 2776 wrote to memory of 436 2776 abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exe dllhost.exe PID 436 wrote to memory of 316 436 dllhost.exe netsh.exe PID 436 wrote to memory of 316 436 dllhost.exe netsh.exe PID 436 wrote to memory of 316 436 dllhost.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exe"C:\Users\Admin\AppData\Local\Temp\abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\dllhost.exe"C:\Users\Admin\AppData\Local\Temp\dllhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\dllhost.exe" "dllhost.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:316
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5174dbc902fdc8d1b3cf8473015aeae85
SHA1e99d3c3cc51c5987d0f5e1d12d156d0247c1ffec
SHA256abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e
SHA512880f7ad0c6ba91dd4cb100f3b03653d09193f126c8f78b6d7e051611ef04cbd5d2cd0b5006b172dfcef2e3dd4150c41daf707634e1fbbfdfed40737c3258813c
-
Filesize
23KB
MD5174dbc902fdc8d1b3cf8473015aeae85
SHA1e99d3c3cc51c5987d0f5e1d12d156d0247c1ffec
SHA256abdd5a9c8d0ebce3064c11608b96b99194ff9d0e53322fcd557f35f832c3d76e
SHA512880f7ad0c6ba91dd4cb100f3b03653d09193f126c8f78b6d7e051611ef04cbd5d2cd0b5006b172dfcef2e3dd4150c41daf707634e1fbbfdfed40737c3258813c