Analysis
-
max time kernel
152s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 11:46
Behavioral task
behavioral1
Sample
ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe
Resource
win10v2004-20221111-en
General
-
Target
ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe
-
Size
29KB
-
MD5
c10f0ddca879cbe5566ec40e3d99da8a
-
SHA1
ed8d73f2d7371f070790c414b586974679135243
-
SHA256
ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029
-
SHA512
f9b2f1111b8f6fc4afae7eb25c8eee497564abe2ef882a316e725946560ecaaf893fcb6032631d4f20965f1da03f40a5d221748dd5a203650cfae4f383ce7d30
-
SSDEEP
768:12u75oa4fu124AqFjXeJBKh0p29SgReq:t75CPkj8KhG29jeq
Malware Config
Extracted
njrat
0.6.4
HacKed
adam1424.ddns.net:1177
301b5fcf8ce2fab8868e80b6c1f912fe
-
reg_key
301b5fcf8ce2fab8868e80b6c1f912fe
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1472 System.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1168 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\301b5fcf8ce2fab8868e80b6c1f912fe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.exe\" .." System.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\301b5fcf8ce2fab8868e80b6c1f912fe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.exe\" .." System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe 1472 System.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1472 System.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1472 1948 ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe 28 PID 1948 wrote to memory of 1472 1948 ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe 28 PID 1948 wrote to memory of 1472 1948 ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe 28 PID 1948 wrote to memory of 1472 1948 ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe 28 PID 1472 wrote to memory of 1168 1472 System.exe 29 PID 1472 wrote to memory of 1168 1472 System.exe 29 PID 1472 wrote to memory of 1168 1472 System.exe 29 PID 1472 wrote to memory of 1168 1472 System.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe"C:\Users\Admin\AppData\Local\Temp\ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\System.exe" "System.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5c10f0ddca879cbe5566ec40e3d99da8a
SHA1ed8d73f2d7371f070790c414b586974679135243
SHA256ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029
SHA512f9b2f1111b8f6fc4afae7eb25c8eee497564abe2ef882a316e725946560ecaaf893fcb6032631d4f20965f1da03f40a5d221748dd5a203650cfae4f383ce7d30
-
Filesize
29KB
MD5c10f0ddca879cbe5566ec40e3d99da8a
SHA1ed8d73f2d7371f070790c414b586974679135243
SHA256ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029
SHA512f9b2f1111b8f6fc4afae7eb25c8eee497564abe2ef882a316e725946560ecaaf893fcb6032631d4f20965f1da03f40a5d221748dd5a203650cfae4f383ce7d30
-
Filesize
29KB
MD5c10f0ddca879cbe5566ec40e3d99da8a
SHA1ed8d73f2d7371f070790c414b586974679135243
SHA256ca0ec790100549b31925f4263827f8a3c5fd6d981af2d30380d2efa65cb28029
SHA512f9b2f1111b8f6fc4afae7eb25c8eee497564abe2ef882a316e725946560ecaaf893fcb6032631d4f20965f1da03f40a5d221748dd5a203650cfae4f383ce7d30