Analysis
-
max time kernel
242s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:07
Behavioral task
behavioral1
Sample
fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe
Resource
win7-20221111-en
General
-
Target
fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe
-
Size
29KB
-
MD5
805308c8764c6580933c60d75d82ee5b
-
SHA1
b8c516f232d0e2929414f7de05303fed1e5c1b0f
-
SHA256
fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48
-
SHA512
594f3d646b3aff93554df05c3af41f2f4da3c32cf2fa0740a00d6d32968bb0972226f9789c8925034a65bcd987702d8a2e086a7474274ce120503d9d968e44cf
-
SSDEEP
384:1UHEBl7p3hUw2s7bD55gEKemqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzeZu:p7bUw2C3kEcqNreHBKh0p29SgRIu
Malware Config
Extracted
njrat
0.6.4
HacKed
ahyatezy15.no-ip.biz:1177
7c5ab2d4b3ee0e1b3e9cf876e75dff1f
-
reg_key
7c5ab2d4b3ee0e1b3e9cf876e75dff1f
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 564 memo.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1900 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c5ab2d4b3ee0e1b3e9cf876e75dff1f.exe memo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c5ab2d4b3ee0e1b3e9cf876e75dff1f.exe memo.exe -
Loads dropped DLL 1 IoCs
pid Process 584 fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\7c5ab2d4b3ee0e1b3e9cf876e75dff1f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\memo.exe\" .." memo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7c5ab2d4b3ee0e1b3e9cf876e75dff1f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\memo.exe\" .." memo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe 564 memo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 564 memo.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 584 wrote to memory of 564 584 fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe 28 PID 584 wrote to memory of 564 584 fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe 28 PID 584 wrote to memory of 564 584 fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe 28 PID 584 wrote to memory of 564 584 fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe 28 PID 564 wrote to memory of 1900 564 memo.exe 29 PID 564 wrote to memory of 1900 564 memo.exe 29 PID 564 wrote to memory of 1900 564 memo.exe 29 PID 564 wrote to memory of 1900 564 memo.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe"C:\Users\Admin\AppData\Local\Temp\fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\memo.exe"C:\Users\Admin\AppData\Local\Temp\memo.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\memo.exe" "memo.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1900
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5805308c8764c6580933c60d75d82ee5b
SHA1b8c516f232d0e2929414f7de05303fed1e5c1b0f
SHA256fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48
SHA512594f3d646b3aff93554df05c3af41f2f4da3c32cf2fa0740a00d6d32968bb0972226f9789c8925034a65bcd987702d8a2e086a7474274ce120503d9d968e44cf
-
Filesize
29KB
MD5805308c8764c6580933c60d75d82ee5b
SHA1b8c516f232d0e2929414f7de05303fed1e5c1b0f
SHA256fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48
SHA512594f3d646b3aff93554df05c3af41f2f4da3c32cf2fa0740a00d6d32968bb0972226f9789c8925034a65bcd987702d8a2e086a7474274ce120503d9d968e44cf
-
Filesize
29KB
MD5805308c8764c6580933c60d75d82ee5b
SHA1b8c516f232d0e2929414f7de05303fed1e5c1b0f
SHA256fa51b3f9f7dbd2afa4304c46a4510130cd40a28add2532d722b543bf864f5e48
SHA512594f3d646b3aff93554df05c3af41f2f4da3c32cf2fa0740a00d6d32968bb0972226f9789c8925034a65bcd987702d8a2e086a7474274ce120503d9d968e44cf