Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 04:20

General

  • Target

    21291467b0ccc071fe21bc4dfb99b466aab187af50c0b0b8999f55f96f5b8bcf.exe

  • Size

    4.3MB

  • MD5

    10365cad027d585cbb35187edadd3de8

  • SHA1

    7f2a44cc811016e2e4655b58c697aff9366dfe2b

  • SHA256

    21291467b0ccc071fe21bc4dfb99b466aab187af50c0b0b8999f55f96f5b8bcf

  • SHA512

    513c9cadf48f4ad2675a52c752f33f339a4f26f5a64b666af3498a23ef775f5b70e5b1f7400e3bb5be94a66599267c07d35dcfabe65481f3974754c9eeae0889

  • SSDEEP

    98304:0sKMWjUBnr7K/QwKFdpx6c0q0H30xy2iwIzSxIejgOYFt:0s+jUB32FYdpV0SihzSxKO4

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Cruzx Pain

C2

eslamdarko.no-ip.org:5552

Mutex

1f54ba241b66e82bbfd9eab0ca5f2691

Attributes
  • reg_key

    1f54ba241b66e82bbfd9eab0ca5f2691

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21291467b0ccc071fe21bc4dfb99b466aab187af50c0b0b8999f55f96f5b8bcf.exe
    "C:\Users\Admin\AppData\Local\Temp\21291467b0ccc071fe21bc4dfb99b466aab187af50c0b0b8999f55f96f5b8bcf.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      PID:1928
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Users\Admin\AppData\Roaming\Chrome.exe
        "C:\Users\Admin\AppData\Roaming\Chrome.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3624
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Chrome.exe" "Chrome.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:3964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.exe

    Filesize

    23KB

    MD5

    f370286655bff7e8b073241768767c37

    SHA1

    929dec5450d3def3c40b05b801fdb749675d6fc0

    SHA256

    ba68b61a6c28b8d536eadb143dd59e988984fe90910db9b1d177b7c7412570c8

    SHA512

    1390ed1e78e171a483df20c331c2bc239bdda7ad98f0887decf218d46ef024d0adca9644bbd4a98c753d92b07a670040e54e183375539e91172a9603324c1f0a

  • C:\Users\Admin\AppData\Local\Temp\1.exe

    Filesize

    23KB

    MD5

    f370286655bff7e8b073241768767c37

    SHA1

    929dec5450d3def3c40b05b801fdb749675d6fc0

    SHA256

    ba68b61a6c28b8d536eadb143dd59e988984fe90910db9b1d177b7c7412570c8

    SHA512

    1390ed1e78e171a483df20c331c2bc239bdda7ad98f0887decf218d46ef024d0adca9644bbd4a98c753d92b07a670040e54e183375539e91172a9603324c1f0a

  • C:\Users\Admin\AppData\Local\Temp\2.exe

    Filesize

    2.7MB

    MD5

    754591b96b9e4dfc5dbf2136f8dfde87

    SHA1

    bd3a91fe450a800dbbc8d070159dc0a599043652

    SHA256

    39f50e9d9b228b8127a7ad9d6eb8659c4e543e1b9a329d03a9fb796498712d07

    SHA512

    ba385b36a5fa47b6dbd72b64f23f10ed120966b702598dd6fe3947696e7caaa3c88887a44142caea28ed132c343fb6d68ce428204ddafc2b700c49e817e22c82

  • C:\Users\Admin\AppData\Local\Temp\2.exe

    Filesize

    2.7MB

    MD5

    754591b96b9e4dfc5dbf2136f8dfde87

    SHA1

    bd3a91fe450a800dbbc8d070159dc0a599043652

    SHA256

    39f50e9d9b228b8127a7ad9d6eb8659c4e543e1b9a329d03a9fb796498712d07

    SHA512

    ba385b36a5fa47b6dbd72b64f23f10ed120966b702598dd6fe3947696e7caaa3c88887a44142caea28ed132c343fb6d68ce428204ddafc2b700c49e817e22c82

  • C:\Users\Admin\AppData\Local\Temp\DA28.tmp

    Filesize

    304KB

    MD5

    4a40ea8b36ea1c0d529f631147403180

    SHA1

    00f49a7e137c35c099f27483648a1867f2dd6a92

    SHA256

    4081976004f161b56920dd957d72edf25d3763bb2424564c8896f80004dab171

    SHA512

    98f78e75c41028dbcc77a6482c4de50cc4a76d67145adc9af85683071cd5bd8c4a618d3e6352cc5ecdf9b661dcb5f487f1539f33a4a1f9297b552db47e6b6cc7

  • C:\Users\Admin\AppData\Local\Temp\DA29.tmp

    Filesize

    227KB

    MD5

    a51d1c449e9ca956f477f9bfbe67a5c8

    SHA1

    5ccc5014f6ec7c026f2d57a92d0bbd706a7128f8

    SHA256

    e7b11df7b54927659930982f8e235666f720255a5f54afaf11a5e62eaaaa821b

    SHA512

    39dc8c3dfb70df7960afb6cc263e8dfcf126962a94da91eabe465eea3b1eb7cfbd3d23e7c3d9ce4fd30fc6daccd4bd1129e79b67f8fe6085d8d0d3412b5d0cbe

  • C:\Users\Admin\AppData\Roaming\Chrome.exe

    Filesize

    23KB

    MD5

    f370286655bff7e8b073241768767c37

    SHA1

    929dec5450d3def3c40b05b801fdb749675d6fc0

    SHA256

    ba68b61a6c28b8d536eadb143dd59e988984fe90910db9b1d177b7c7412570c8

    SHA512

    1390ed1e78e171a483df20c331c2bc239bdda7ad98f0887decf218d46ef024d0adca9644bbd4a98c753d92b07a670040e54e183375539e91172a9603324c1f0a

  • C:\Users\Admin\AppData\Roaming\Chrome.exe

    Filesize

    23KB

    MD5

    f370286655bff7e8b073241768767c37

    SHA1

    929dec5450d3def3c40b05b801fdb749675d6fc0

    SHA256

    ba68b61a6c28b8d536eadb143dd59e988984fe90910db9b1d177b7c7412570c8

    SHA512

    1390ed1e78e171a483df20c331c2bc239bdda7ad98f0887decf218d46ef024d0adca9644bbd4a98c753d92b07a670040e54e183375539e91172a9603324c1f0a

  • memory/1732-136-0x0000000000000000-mapping.dmp

  • memory/1732-141-0x0000000074F50000-0x0000000075501000-memory.dmp

    Filesize

    5.7MB

  • memory/1732-146-0x0000000074F50000-0x0000000075501000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-142-0x0000000074F50000-0x0000000075501000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-132-0x0000000074F50000-0x0000000075501000-memory.dmp

    Filesize

    5.7MB

  • memory/1928-133-0x0000000000000000-mapping.dmp

  • memory/3624-143-0x0000000000000000-mapping.dmp

  • memory/3624-147-0x0000000074F50000-0x0000000075501000-memory.dmp

    Filesize

    5.7MB

  • memory/3624-149-0x0000000074F50000-0x0000000075501000-memory.dmp

    Filesize

    5.7MB

  • memory/3964-148-0x0000000000000000-mapping.dmp