Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 10:12
Behavioral task
behavioral1
Sample
86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe
Resource
win10v2004-20221111-en
General
-
Target
86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe
-
Size
29KB
-
MD5
f7a088b72af4379b1960acb2f724a9a8
-
SHA1
a4a602b3e598c5721c65b713811f962d8a182c5c
-
SHA256
86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635
-
SHA512
3e1b8f327c9fb59f8980bf82e3fcc28b484ebe1b61936063addbdea18ef58b724d7c5b849bffc6822550387d0523a97312fccd160478c58670b53d0f0d092c15
-
SSDEEP
768:/x77Kk4XeP/Fzsq+xre6BKh0p29SgRVe:F7K7W4zx3KhG29jVe
Malware Config
Extracted
njrat
0.6.4
HacKed
zabanahacker.no-ip.org:1021
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Trojan.exepid process 1524 Trojan.exe -
Loads dropped DLL 1 IoCs
Processes:
86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exepid process 2012 86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exedescription pid process target process PID 2012 wrote to memory of 1524 2012 86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe Trojan.exe PID 2012 wrote to memory of 1524 2012 86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe Trojan.exe PID 2012 wrote to memory of 1524 2012 86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe Trojan.exe PID 2012 wrote to memory of 1524 2012 86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe Trojan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe"C:\Users\Admin\AppData\Local\Temp\86435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
PID:1524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5f7a088b72af4379b1960acb2f724a9a8
SHA1a4a602b3e598c5721c65b713811f962d8a182c5c
SHA25686435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635
SHA5123e1b8f327c9fb59f8980bf82e3fcc28b484ebe1b61936063addbdea18ef58b724d7c5b849bffc6822550387d0523a97312fccd160478c58670b53d0f0d092c15
-
Filesize
29KB
MD5f7a088b72af4379b1960acb2f724a9a8
SHA1a4a602b3e598c5721c65b713811f962d8a182c5c
SHA25686435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635
SHA5123e1b8f327c9fb59f8980bf82e3fcc28b484ebe1b61936063addbdea18ef58b724d7c5b849bffc6822550387d0523a97312fccd160478c58670b53d0f0d092c15
-
Filesize
29KB
MD5f7a088b72af4379b1960acb2f724a9a8
SHA1a4a602b3e598c5721c65b713811f962d8a182c5c
SHA25686435ff31a1376cb8fc9291f60f5511e2cb50b1388822aee1bf86d178640a635
SHA5123e1b8f327c9fb59f8980bf82e3fcc28b484ebe1b61936063addbdea18ef58b724d7c5b849bffc6822550387d0523a97312fccd160478c58670b53d0f0d092c15