Analysis
-
max time kernel
164s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe
Resource
win10v2004-20220812-en
General
-
Target
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe
-
Size
1.2MB
-
MD5
2aa9a6fedcd536a0863a2040772cf11d
-
SHA1
2b8e4757d46aa38e5cbafe0cd64cbb4409f09507
-
SHA256
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004
-
SHA512
3fef57b72dfeafba37a1ab78aad232315fca4f078fdd3ef2f84e20f9e9cb99e84ac522a47704ba041f6fcc1d06bd96f41f2c19c61c6fe9b15de6a173a5dfbbd9
-
SSDEEP
12288:MgadJfTztJr15d2swcOekReZWml4R8cov2tSUJnS9Yss40HQ3TBqqvrLrZTP57l:Yd98+0vAUJnAjBHvr/ZTP57
Malware Config
Extracted
njrat
0.6.4
HacKed
joker1787.no-ip.biz:1984
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Trojan.exeTrojan.exepid process 4124 Trojan.exe 220 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Trojan.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exeTrojan.exedescription pid process target process PID 2620 set thread context of 660 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe PID 4124 set thread context of 220 4124 Trojan.exe Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exeTrojan.exeTrojan.exepid process 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 4124 Trojan.exe 4124 Trojan.exe 4124 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe 220 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exeTrojan.exeTrojan.exedescription pid process Token: SeDebugPrivilege 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe Token: SeDebugPrivilege 4124 Trojan.exe Token: SeDebugPrivilege 220 Trojan.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exeTrojan.exeTrojan.exedescription pid process target process PID 2620 wrote to memory of 660 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe PID 2620 wrote to memory of 660 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe PID 2620 wrote to memory of 660 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe PID 2620 wrote to memory of 660 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe PID 2620 wrote to memory of 660 2620 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe PID 660 wrote to memory of 4124 660 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe Trojan.exe PID 660 wrote to memory of 4124 660 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe Trojan.exe PID 660 wrote to memory of 4124 660 7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe Trojan.exe PID 4124 wrote to memory of 220 4124 Trojan.exe Trojan.exe PID 4124 wrote to memory of 220 4124 Trojan.exe Trojan.exe PID 4124 wrote to memory of 220 4124 Trojan.exe Trojan.exe PID 4124 wrote to memory of 220 4124 Trojan.exe Trojan.exe PID 4124 wrote to memory of 220 4124 Trojan.exe Trojan.exe PID 220 wrote to memory of 2224 220 Trojan.exe netsh.exe PID 220 wrote to memory of 2224 220 Trojan.exe netsh.exe PID 220 wrote to memory of 2224 220 Trojan.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe"C:\Users\Admin\AppData\Local\Temp\7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exeC:\Users\Admin\AppData\Local\Temp\7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exeC:\Users\Admin\AppData\Local\Temp\Trojan.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:2224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\7b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004.exe.log
Filesize418B
MD589c8a5340eb284f551067d44e27ae8dd
SHA1d2431ae25a1ab67762a5125574f046f4c951d297
SHA25673ca1f27b1c153e3405856ebe8b3c6cdd23424d2ab09c0fe1eb0e2075513057b
SHA512b101ac2e008bd3cc6f97fedb97b8253fb07fed1c334629ecbebe0f4942ccc1070491cddc4daea521164543b6f97ba9b99d2be1c50cc5a013f04e697fea9dbdac
-
Filesize
1.2MB
MD52aa9a6fedcd536a0863a2040772cf11d
SHA12b8e4757d46aa38e5cbafe0cd64cbb4409f09507
SHA2567b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004
SHA5123fef57b72dfeafba37a1ab78aad232315fca4f078fdd3ef2f84e20f9e9cb99e84ac522a47704ba041f6fcc1d06bd96f41f2c19c61c6fe9b15de6a173a5dfbbd9
-
Filesize
1.2MB
MD52aa9a6fedcd536a0863a2040772cf11d
SHA12b8e4757d46aa38e5cbafe0cd64cbb4409f09507
SHA2567b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004
SHA5123fef57b72dfeafba37a1ab78aad232315fca4f078fdd3ef2f84e20f9e9cb99e84ac522a47704ba041f6fcc1d06bd96f41f2c19c61c6fe9b15de6a173a5dfbbd9
-
Filesize
1.2MB
MD52aa9a6fedcd536a0863a2040772cf11d
SHA12b8e4757d46aa38e5cbafe0cd64cbb4409f09507
SHA2567b3a9805d9948328077b9b66734dfac230e631a969f9f0df9a91d6568c094004
SHA5123fef57b72dfeafba37a1ab78aad232315fca4f078fdd3ef2f84e20f9e9cb99e84ac522a47704ba041f6fcc1d06bd96f41f2c19c61c6fe9b15de6a173a5dfbbd9