Analysis
-
max time kernel
152s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:44
Static task
static1
Behavioral task
behavioral1
Sample
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe
Resource
win10v2004-20220901-en
General
-
Target
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe
-
Size
638KB
-
MD5
d9f6bff1ee2812647e534b793b8a5b3e
-
SHA1
a6215720497667a69cc9a2f58eb826131ca05068
-
SHA256
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09
-
SHA512
cbe3c7ba9db6ad1509a4bb62b8cb9234874943ba23fbdb0d220c2c84b6ed95d0748c7216aadab9036a2b2dfe3d6b57d8648423cff74ed25211dbfd881001cd37
-
SSDEEP
12288:psTri9uod71pwGuB7DNnu5I1jhxgmZw1lb4K1ebqdpCAq/r1zhrWFumg2:psTrikod71pwGuB7DNnui1jbx051ebqm
Malware Config
Extracted
njrat
0.7d
HacKed
mehdimoro.ddns.net:5555
4aeed655f342a0295abb3112731f878a
-
reg_key
4aeed655f342a0295abb3112731f878a
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 1956 svchost.exe 868 svchost.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4aeed655f342a0295abb3112731f878a.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4aeed655f342a0295abb3112731f878a.exe svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exesvchost.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aYQwA0zYJ87p8B = "C:\\Windows\\system32\\Server.exe" 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aYQwA0zYJ87p8B = "C:\\Windows\\system32\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\4aeed655f342a0295abb3112731f878a = "\"C:\\Windows\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\4aeed655f342a0295abb3112731f878a = "\"C:\\Windows\\svchost.exe\" .." svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Server.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe File created C:\Windows\SysWOW64\Server.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exesvchost.exedescription pid process target process PID 1772 set thread context of 316 1772 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe PID 1956 set thread context of 868 1956 svchost.exe svchost.exe -
Drops file in Windows directory 1 IoCs
Processes:
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exedescription ioc process File created C:\Windows\svchost.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 1772 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe Token: SeDebugPrivilege 1956 svchost.exe Token: SeDebugPrivilege 868 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exesvchost.exesvchost.exedescription pid process target process PID 1772 wrote to memory of 316 1772 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe PID 1772 wrote to memory of 316 1772 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe PID 1772 wrote to memory of 316 1772 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe PID 1772 wrote to memory of 316 1772 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe PID 1772 wrote to memory of 316 1772 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe PID 1772 wrote to memory of 316 1772 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe PID 316 wrote to memory of 1956 316 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe svchost.exe PID 316 wrote to memory of 1956 316 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe svchost.exe PID 316 wrote to memory of 1956 316 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe svchost.exe PID 316 wrote to memory of 1956 316 67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe svchost.exe PID 1956 wrote to memory of 868 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 868 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 868 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 868 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 868 1956 svchost.exe svchost.exe PID 1956 wrote to memory of 868 1956 svchost.exe svchost.exe PID 868 wrote to memory of 1756 868 svchost.exe netsh.exe PID 868 wrote to memory of 1756 868 svchost.exe netsh.exe PID 868 wrote to memory of 1756 868 svchost.exe netsh.exe PID 868 wrote to memory of 1756 868 svchost.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe"C:\Users\Admin\AppData\Local\Temp\67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exeC:\Users\Admin\AppData\Local\Temp\67eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09.exe2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.exeC:\Windows\svchost.exe4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\svchost.exe" "svchost.exe" ENABLE5⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\svchost.exeFilesize
638KB
MD5d9f6bff1ee2812647e534b793b8a5b3e
SHA1a6215720497667a69cc9a2f58eb826131ca05068
SHA25667eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09
SHA512cbe3c7ba9db6ad1509a4bb62b8cb9234874943ba23fbdb0d220c2c84b6ed95d0748c7216aadab9036a2b2dfe3d6b57d8648423cff74ed25211dbfd881001cd37
-
C:\Windows\svchost.exeFilesize
638KB
MD5d9f6bff1ee2812647e534b793b8a5b3e
SHA1a6215720497667a69cc9a2f58eb826131ca05068
SHA25667eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09
SHA512cbe3c7ba9db6ad1509a4bb62b8cb9234874943ba23fbdb0d220c2c84b6ed95d0748c7216aadab9036a2b2dfe3d6b57d8648423cff74ed25211dbfd881001cd37
-
C:\Windows\svchost.exeFilesize
638KB
MD5d9f6bff1ee2812647e534b793b8a5b3e
SHA1a6215720497667a69cc9a2f58eb826131ca05068
SHA25667eda2e2df252d8e8da71cbc0aca21e42b082d54d662b934775e478ec378bb09
SHA512cbe3c7ba9db6ad1509a4bb62b8cb9234874943ba23fbdb0d220c2c84b6ed95d0748c7216aadab9036a2b2dfe3d6b57d8648423cff74ed25211dbfd881001cd37
-
memory/316-64-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/316-59-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/316-60-0x000000000040747E-mapping.dmp
-
memory/316-62-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/868-74-0x000000000040747E-mapping.dmp
-
memory/1756-81-0x0000000000000000-mapping.dmp
-
memory/1772-54-0x0000000000A40000-0x0000000000AE6000-memory.dmpFilesize
664KB
-
memory/1772-65-0x00000000008F5000-0x0000000000906000-memory.dmpFilesize
68KB
-
memory/1772-58-0x00000000007C0000-0x00000000007CA000-memory.dmpFilesize
40KB
-
memory/1772-57-0x0000000000820000-0x0000000000864000-memory.dmpFilesize
272KB
-
memory/1772-56-0x0000000004C20000-0x0000000004C92000-memory.dmpFilesize
456KB
-
memory/1772-55-0x0000000075651000-0x0000000075653000-memory.dmpFilesize
8KB
-
memory/1956-67-0x0000000000000000-mapping.dmp
-
memory/1956-72-0x00000000005D0000-0x0000000000642000-memory.dmpFilesize
456KB
-
memory/1956-80-0x0000000004935000-0x0000000004946000-memory.dmpFilesize
68KB
-
memory/1956-70-0x0000000000A90000-0x0000000000B36000-memory.dmpFilesize
664KB