Analysis
-
max time kernel
10s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:00
Behavioral task
behavioral1
Sample
65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe
Resource
win7-20220812-en
General
-
Target
65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe
-
Size
29KB
-
MD5
0a704142b5eefeb3f5880bdce31a5668
-
SHA1
6890b1d90b26b3a32c1f5cf93bd91d916aa40db4
-
SHA256
65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5
-
SHA512
e4b8f7bf4a311c5a3f025249c346cc0890d74d60d3765d71546cef4a490380de72e7ddca714b0cc4304ad91e621fc7ef0f8cb0b31bf6b967586e1769f573335d
-
SSDEEP
384:taFCtl7Dh+oqIqEXV5HEQTGumqDgN3eH6GBsbh0w4wlAokw9OhgOL1vYRGOZzSZG:j74oqIjlLTAqM3eFBKh0p29SgRkG
Malware Config
Extracted
njrat
0.6.4
HacKed
www-avira1.sytes.net:1993
93f19dda2412c86ad7520ba4198f39a0
-
reg_key
93f19dda2412c86ad7520ba4198f39a0
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
explorer.exepid process 1784 explorer.exe -
Loads dropped DLL 1 IoCs
Processes:
65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exepid process 960 65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exedescription pid process target process PID 960 wrote to memory of 1784 960 65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe explorer.exe PID 960 wrote to memory of 1784 960 65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe explorer.exe PID 960 wrote to memory of 1784 960 65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe explorer.exe PID 960 wrote to memory of 1784 960 65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe"C:\Users\Admin\AppData\Local\Temp\65d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\explorer.exe"C:\Users\Admin\AppData\Roaming\explorer.exe"2⤵
- Executes dropped EXE
PID:1784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD50a704142b5eefeb3f5880bdce31a5668
SHA16890b1d90b26b3a32c1f5cf93bd91d916aa40db4
SHA25665d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5
SHA512e4b8f7bf4a311c5a3f025249c346cc0890d74d60d3765d71546cef4a490380de72e7ddca714b0cc4304ad91e621fc7ef0f8cb0b31bf6b967586e1769f573335d
-
Filesize
29KB
MD50a704142b5eefeb3f5880bdce31a5668
SHA16890b1d90b26b3a32c1f5cf93bd91d916aa40db4
SHA25665d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5
SHA512e4b8f7bf4a311c5a3f025249c346cc0890d74d60d3765d71546cef4a490380de72e7ddca714b0cc4304ad91e621fc7ef0f8cb0b31bf6b967586e1769f573335d
-
Filesize
29KB
MD50a704142b5eefeb3f5880bdce31a5668
SHA16890b1d90b26b3a32c1f5cf93bd91d916aa40db4
SHA25665d846eb83a58df36caae2ee98fdadcc6963736dbad3be9d4fa55cf3b362b3c5
SHA512e4b8f7bf4a311c5a3f025249c346cc0890d74d60d3765d71546cef4a490380de72e7ddca714b0cc4304ad91e621fc7ef0f8cb0b31bf6b967586e1769f573335d