Analysis
-
max time kernel
202s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 04:18
Behavioral task
behavioral1
Sample
1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe
Resource
win10v2004-20220812-en
General
-
Target
1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe
-
Size
565KB
-
MD5
2dd799f19beed0c4ca1fe6890072ed49
-
SHA1
1ab76b72bb1de7284c4e980444867876ce90bc0b
-
SHA256
1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e
-
SHA512
1cd011696cf22598c76733d51feec134aa665bd3ab12f4c04e94db8cd672395d904822a1f1f6dfe039c99400f7a428ed7e6c759f4da883a60e2269478f39aa51
-
SSDEEP
12288:f5MhBkgAFOgCCCOsvFYCCCCfCOVBIs1gFheDiwlln/mg6eZA/+x/joyMEq:fFFOgCCCkCCCCfCqBRSFkZ1/mgF1WyML
Malware Config
Extracted
njrat
0.6.4
تنم
asel1996.no-ip.biz:1177
d5a38e9b5f206c41f8851bf04a251d26
-
reg_key
d5a38e9b5f206c41f8851bf04a251d26
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
chrome.exepid process 564 chrome.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 2 IoCs
Processes:
chrome.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d5a38e9b5f206c41f8851bf04a251d26.exe chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d5a38e9b5f206c41f8851bf04a251d26.exe chrome.exe -
Loads dropped DLL 1 IoCs
Processes:
1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exepid process 2040 1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
chrome.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\d5a38e9b5f206c41f8851bf04a251d26 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\chrome.exe\" .." chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\d5a38e9b5f206c41f8851bf04a251d26 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\chrome.exe\" .." chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
chrome.exepid process 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
chrome.exedescription pid process Token: SeDebugPrivilege 564 chrome.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exechrome.exedescription pid process target process PID 2040 wrote to memory of 564 2040 1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe chrome.exe PID 2040 wrote to memory of 564 2040 1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe chrome.exe PID 2040 wrote to memory of 564 2040 1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe chrome.exe PID 2040 wrote to memory of 564 2040 1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe chrome.exe PID 564 wrote to memory of 320 564 chrome.exe netsh.exe PID 564 wrote to memory of 320 564 chrome.exe netsh.exe PID 564 wrote to memory of 320 564 chrome.exe netsh.exe PID 564 wrote to memory of 320 564 chrome.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe"C:\Users\Admin\AppData\Local\Temp\1bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\chrome.exe" "chrome.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\chrome.exeFilesize
565KB
MD52dd799f19beed0c4ca1fe6890072ed49
SHA11ab76b72bb1de7284c4e980444867876ce90bc0b
SHA2561bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e
SHA5121cd011696cf22598c76733d51feec134aa665bd3ab12f4c04e94db8cd672395d904822a1f1f6dfe039c99400f7a428ed7e6c759f4da883a60e2269478f39aa51
-
C:\Users\Admin\AppData\Local\Temp\chrome.exeFilesize
565KB
MD52dd799f19beed0c4ca1fe6890072ed49
SHA11ab76b72bb1de7284c4e980444867876ce90bc0b
SHA2561bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e
SHA5121cd011696cf22598c76733d51feec134aa665bd3ab12f4c04e94db8cd672395d904822a1f1f6dfe039c99400f7a428ed7e6c759f4da883a60e2269478f39aa51
-
\Users\Admin\AppData\Local\Temp\chrome.exeFilesize
565KB
MD52dd799f19beed0c4ca1fe6890072ed49
SHA11ab76b72bb1de7284c4e980444867876ce90bc0b
SHA2561bbdff5a19a1e5d6b99e614c3ac5e91d865437553c255758a63eb48047e8d05e
SHA5121cd011696cf22598c76733d51feec134aa665bd3ab12f4c04e94db8cd672395d904822a1f1f6dfe039c99400f7a428ed7e6c759f4da883a60e2269478f39aa51
-
memory/320-62-0x0000000000000000-mapping.dmp
-
memory/564-57-0x0000000000000000-mapping.dmp
-
memory/564-64-0x00000000747D0000-0x0000000074D7B000-memory.dmpFilesize
5.7MB
-
memory/564-65-0x00000000747D0000-0x0000000074D7B000-memory.dmpFilesize
5.7MB
-
memory/2040-54-0x0000000076381000-0x0000000076383000-memory.dmpFilesize
8KB
-
memory/2040-55-0x00000000747D0000-0x0000000074D7B000-memory.dmpFilesize
5.7MB
-
memory/2040-61-0x00000000747D0000-0x0000000074D7B000-memory.dmpFilesize
5.7MB