Analysis
-
max time kernel
189s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 15:40
Static task
static1
Behavioral task
behavioral1
Sample
77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe
Resource
win10v2004-20221111-en
General
-
Target
77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe
-
Size
628KB
-
MD5
32618460447cf4a7b52f2f3738701cb6
-
SHA1
edbc1a16e4a5f5f2478f898b6b8a0a9c28e2140a
-
SHA256
77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a
-
SHA512
7ac26eba673f710ac85d2ae133165eb9d68b1a2ccb4709203e08a4159f7eec961e875fef0d61a449830f418f605a19c3bcb4794db36f0cfe3bda7e1323df4000
-
SSDEEP
12288:EK/R+xDNXvwUmBnpSz22rDvH7h5vVws4sL+cer/B+A3Fg2XFnTjW:QdwLFpSzFDvF7w3sFS/B++FT
Malware Config
Extracted
njrat
0.7d
XbOoH
madrid7.zapto.org:1177
be03385064ece2f2ea31c1c1cbb33041
-
reg_key
be03385064ece2f2ea31c1c1cbb33041
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
TempGoogleUpdate.exeTempserver.exeTempserver.exesvhost.exesvhost.exepid process 580 TempGoogleUpdate.exe 1648 Tempserver.exe 1484 Tempserver.exe 1704 svhost.exe 1504 svhost.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 4 IoCs
Processes:
77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exeTempGoogleUpdate.exeTempserver.exesvhost.exepid process 1360 77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe 580 TempGoogleUpdate.exe 1484 Tempserver.exe 1704 svhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\be03385064ece2f2ea31c1c1cbb33041 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svhost.exe\" .." svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\be03385064ece2f2ea31c1c1cbb33041 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svhost.exe\" .." svhost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Tempserver.exesvhost.exedescription pid process target process PID 1648 set thread context of 1484 1648 Tempserver.exe Tempserver.exe PID 1704 set thread context of 1504 1704 svhost.exe svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
Tempserver.exesvhost.exesvhost.exedescription pid process Token: SeDebugPrivilege 1648 Tempserver.exe Token: SeDebugPrivilege 1704 svhost.exe Token: SeDebugPrivilege 1504 svhost.exe Token: 33 1504 svhost.exe Token: SeIncBasePriorityPrivilege 1504 svhost.exe Token: 33 1504 svhost.exe Token: SeIncBasePriorityPrivilege 1504 svhost.exe Token: 33 1504 svhost.exe Token: SeIncBasePriorityPrivilege 1504 svhost.exe Token: 33 1504 svhost.exe Token: SeIncBasePriorityPrivilege 1504 svhost.exe Token: 33 1504 svhost.exe Token: SeIncBasePriorityPrivilege 1504 svhost.exe Token: 33 1504 svhost.exe Token: SeIncBasePriorityPrivilege 1504 svhost.exe Token: 33 1504 svhost.exe Token: SeIncBasePriorityPrivilege 1504 svhost.exe Token: 33 1504 svhost.exe Token: SeIncBasePriorityPrivilege 1504 svhost.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exeTempGoogleUpdate.exeTempserver.exeTempserver.exesvhost.exesvhost.exedescription pid process target process PID 1360 wrote to memory of 580 1360 77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe TempGoogleUpdate.exe PID 1360 wrote to memory of 580 1360 77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe TempGoogleUpdate.exe PID 1360 wrote to memory of 580 1360 77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe TempGoogleUpdate.exe PID 1360 wrote to memory of 580 1360 77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe TempGoogleUpdate.exe PID 1360 wrote to memory of 580 1360 77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe TempGoogleUpdate.exe PID 1360 wrote to memory of 580 1360 77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe TempGoogleUpdate.exe PID 1360 wrote to memory of 580 1360 77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe TempGoogleUpdate.exe PID 580 wrote to memory of 1648 580 TempGoogleUpdate.exe Tempserver.exe PID 580 wrote to memory of 1648 580 TempGoogleUpdate.exe Tempserver.exe PID 580 wrote to memory of 1648 580 TempGoogleUpdate.exe Tempserver.exe PID 580 wrote to memory of 1648 580 TempGoogleUpdate.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1648 wrote to memory of 1484 1648 Tempserver.exe Tempserver.exe PID 1484 wrote to memory of 1704 1484 Tempserver.exe svhost.exe PID 1484 wrote to memory of 1704 1484 Tempserver.exe svhost.exe PID 1484 wrote to memory of 1704 1484 Tempserver.exe svhost.exe PID 1484 wrote to memory of 1704 1484 Tempserver.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1704 wrote to memory of 1504 1704 svhost.exe svhost.exe PID 1504 wrote to memory of 1776 1504 svhost.exe netsh.exe PID 1504 wrote to memory of 1776 1504 svhost.exe netsh.exe PID 1504 wrote to memory of 1776 1504 svhost.exe netsh.exe PID 1504 wrote to memory of 1776 1504 svhost.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe"C:\Users\Admin\AppData\Local\Temp\77d32503cef31dc249996ca85404b56ef6fb97f02f3c21378f2b80b8fab8913a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\TempGoogleUpdate.exe"C:\Users\Admin\AppData\Local\TempGoogleUpdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Tempserver.exe"C:\Users\Admin\AppData\Local\Tempserver.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Tempserver.exeC:\Users\Admin\AppData\Local\Tempserver.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeC:\Users\Admin\AppData\Local\Temp\svhost.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svhost.exe" "svhost.exe" ENABLE7⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\TempGoogleUpdate.exeFilesize
290KB
MD5c80e8284eade9b7e3482c39d881359af
SHA14f6e2a91e80608f0967ea0fd56cc574ea2947573
SHA256d0f6145e4b390237ae1f708d027400fd67c78afde77bd3418688832f4ad11bb3
SHA51277333656590535fcfdbd1e2a8612270387a769126fe29bc93ec1f078a104a5be9450e4f8cb3f87c5496deb745445fa08a947e07742efa33d44c08f57c294bf3f
-
C:\Users\Admin\AppData\Local\TempGoogleUpdate.exeFilesize
290KB
MD5c80e8284eade9b7e3482c39d881359af
SHA14f6e2a91e80608f0967ea0fd56cc574ea2947573
SHA256d0f6145e4b390237ae1f708d027400fd67c78afde77bd3418688832f4ad11bb3
SHA51277333656590535fcfdbd1e2a8612270387a769126fe29bc93ec1f078a104a5be9450e4f8cb3f87c5496deb745445fa08a947e07742efa33d44c08f57c294bf3f
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
C:\Users\Admin\AppData\Local\Tempserver.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
C:\Users\Admin\AppData\Local\Tempserver.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
C:\Users\Admin\AppData\Local\Tempserver.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
\Users\Admin\AppData\Local\TempGoogleUpdate.exeFilesize
290KB
MD5c80e8284eade9b7e3482c39d881359af
SHA14f6e2a91e80608f0967ea0fd56cc574ea2947573
SHA256d0f6145e4b390237ae1f708d027400fd67c78afde77bd3418688832f4ad11bb3
SHA51277333656590535fcfdbd1e2a8612270387a769126fe29bc93ec1f078a104a5be9450e4f8cb3f87c5496deb745445fa08a947e07742efa33d44c08f57c294bf3f
-
\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
\Users\Admin\AppData\Local\Tempserver.exeFilesize
159KB
MD5edf5301fc6cfd9e913bfa6d7084ae3f2
SHA1e1c326b038e89b646ed06484b6b62187c7b277b2
SHA256f67e38ba014ea58fb0c8d38a8e914b04f11adef82bff454c63fedc935c64527e
SHA512ca63415e91ce2a8221aff80b03c72de108893ba73895639360e158cfaf9238ed2fa28733650966255588876d59c6e5299ed64a6e9851d468208b25dff1115674
-
memory/580-57-0x0000000000000000-mapping.dmp
-
memory/580-67-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/580-61-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1360-69-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1360-54-0x0000000076041000-0x0000000076043000-memory.dmpFilesize
8KB
-
memory/1360-55-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1484-71-0x000000000040748E-mapping.dmp
-
memory/1484-79-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1484-75-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1484-70-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1484-85-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1484-77-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1504-88-0x000000000040748E-mapping.dmp
-
memory/1504-99-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1504-96-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1648-63-0x0000000000000000-mapping.dmp
-
memory/1648-68-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1648-74-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1704-91-0x00000000749C0000-0x0000000074F6B000-memory.dmpFilesize
5.7MB
-
memory/1704-81-0x0000000000000000-mapping.dmp
-
memory/1776-97-0x0000000000000000-mapping.dmp