Analysis

  • max time kernel
    151s
  • max time network
    80s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 07:43

General

  • Target

    8aa812bb472d92cefbb2bbe22fbfa445e993fa84f8214bb1f6e87dfcdb291bad.exe

  • Size

    947KB

  • MD5

    a63e3e2699a34514ffaa2a4402acaaae

  • SHA1

    b75ca6f5342fcb8456b81189871c3653f91e6dd8

  • SHA256

    8aa812bb472d92cefbb2bbe22fbfa445e993fa84f8214bb1f6e87dfcdb291bad

  • SHA512

    c60dd61f44f2dde816299deee1e02c075df9da37c835da27396a16bf81250ce746edbf5748fbe3178b83c19c867b76f92ed059555ca38511fb19cae88fd3cc9a

  • SSDEEP

    24576:jlDvGPs3MDQTI+Qifw0+IRpdmXw+1Z7axh6iKY:jxvGPs3McTI+QV0R1mxC6iKY

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

fego HacKed

C2

max900.no-ip.org:5552

Mutex

Skype

Attributes
  • reg_key

    Skype

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8aa812bb472d92cefbb2bbe22fbfa445e993fa84f8214bb1f6e87dfcdb291bad.exe
    "C:\Users\Admin\AppData\Local\Temp\8aa812bb472d92cefbb2bbe22fbfa445e993fa84f8214bb1f6e87dfcdb291bad.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\940.exe
      C:\Users\Admin\AppData\Local\Temp\940.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Users\Admin\AppData\Roaming\Microsoft.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft.exe" "Microsoft.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\940.exe

    Filesize

    212KB

    MD5

    e0cc12892edda08fa1c8a47c3b97ea50

    SHA1

    8d45d4c7bb3389360cf7d4bdc896231fc15d2e16

    SHA256

    acd1d88b8608c2fd266a38995a0ca06f4ccef7364c26dad8592e1c81587533ce

    SHA512

    a9055e7cb5a0b8949aaa0615b0e863cb13d56e62bdb0d2451f6bc88bf4a34ca482aa80fc4433270ea41c3242b7271a1348104415793f40a3a4a8a2d87eaa66d2

  • C:\Users\Admin\AppData\Local\Temp\940.exe

    Filesize

    212KB

    MD5

    e0cc12892edda08fa1c8a47c3b97ea50

    SHA1

    8d45d4c7bb3389360cf7d4bdc896231fc15d2e16

    SHA256

    acd1d88b8608c2fd266a38995a0ca06f4ccef7364c26dad8592e1c81587533ce

    SHA512

    a9055e7cb5a0b8949aaa0615b0e863cb13d56e62bdb0d2451f6bc88bf4a34ca482aa80fc4433270ea41c3242b7271a1348104415793f40a3a4a8a2d87eaa66d2

  • C:\Users\Admin\AppData\Roaming\Microsoft.exe

    Filesize

    212KB

    MD5

    e0cc12892edda08fa1c8a47c3b97ea50

    SHA1

    8d45d4c7bb3389360cf7d4bdc896231fc15d2e16

    SHA256

    acd1d88b8608c2fd266a38995a0ca06f4ccef7364c26dad8592e1c81587533ce

    SHA512

    a9055e7cb5a0b8949aaa0615b0e863cb13d56e62bdb0d2451f6bc88bf4a34ca482aa80fc4433270ea41c3242b7271a1348104415793f40a3a4a8a2d87eaa66d2

  • C:\Users\Admin\AppData\Roaming\Microsoft.exe

    Filesize

    212KB

    MD5

    e0cc12892edda08fa1c8a47c3b97ea50

    SHA1

    8d45d4c7bb3389360cf7d4bdc896231fc15d2e16

    SHA256

    acd1d88b8608c2fd266a38995a0ca06f4ccef7364c26dad8592e1c81587533ce

    SHA512

    a9055e7cb5a0b8949aaa0615b0e863cb13d56e62bdb0d2451f6bc88bf4a34ca482aa80fc4433270ea41c3242b7271a1348104415793f40a3a4a8a2d87eaa66d2

  • \Users\Admin\AppData\Roaming\Microsoft.exe

    Filesize

    212KB

    MD5

    e0cc12892edda08fa1c8a47c3b97ea50

    SHA1

    8d45d4c7bb3389360cf7d4bdc896231fc15d2e16

    SHA256

    acd1d88b8608c2fd266a38995a0ca06f4ccef7364c26dad8592e1c81587533ce

    SHA512

    a9055e7cb5a0b8949aaa0615b0e863cb13d56e62bdb0d2451f6bc88bf4a34ca482aa80fc4433270ea41c3242b7271a1348104415793f40a3a4a8a2d87eaa66d2

  • memory/364-68-0x0000000000000000-mapping.dmp

  • memory/568-62-0x0000000000000000-mapping.dmp

  • memory/568-67-0x00000000742C0000-0x000000007486B000-memory.dmp

    Filesize

    5.7MB

  • memory/568-70-0x00000000742C0000-0x000000007486B000-memory.dmp

    Filesize

    5.7MB

  • memory/964-55-0x0000000000000000-mapping.dmp

  • memory/964-58-0x00000000757B1000-0x00000000757B3000-memory.dmp

    Filesize

    8KB

  • memory/964-59-0x00000000742C0000-0x000000007486B000-memory.dmp

    Filesize

    5.7MB

  • memory/964-60-0x00000000742C0000-0x000000007486B000-memory.dmp

    Filesize

    5.7MB

  • memory/964-66-0x00000000742C0000-0x000000007486B000-memory.dmp

    Filesize

    5.7MB

  • memory/1628-54-0x000007FEF2E80000-0x000007FEF38A3000-memory.dmp

    Filesize

    10.1MB