Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 17:39

General

  • Target

    beb8d9619b3b016900226e8c797123b2710c82c9d8f1d20baecb0ffa089eb74c.exe

  • Size

    276KB

  • MD5

    2c6e1a9de503a7d08d02b6370501531b

  • SHA1

    9e33bb585aa23045fb834c4023029c9ab4a28e99

  • SHA256

    beb8d9619b3b016900226e8c797123b2710c82c9d8f1d20baecb0ffa089eb74c

  • SHA512

    dad86e43844dbc0831886908d8e5bb30b1380c8733e4386671900409e73219b98988e40a04f0a90105e3e69f1e725794a26fe56436b4f40abd82b3b64f3d6ba3

  • SSDEEP

    6144:6OBe0K5uUYVbcuKTlbGbpshywoul5K9x4FNADPETTEeLN:zbguGuwlbPhVlQINqVeLN

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

hunar83

C2

farman33.no-ip.biz:5552

Mutex

934765b6ad06834b303835a4e1d1d5a2

Attributes
  • reg_key

    934765b6ad06834b303835a4e1d1d5a2

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beb8d9619b3b016900226e8c797123b2710c82c9d8f1d20baecb0ffa089eb74c.exe
    "C:\Users\Admin\AppData\Local\Temp\beb8d9619b3b016900226e8c797123b2710c82c9d8f1d20baecb0ffa089eb74c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\icon disk top.exe
        "C:\Users\Admin\AppData\Local\Temp\icon disk top.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:392
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\icon disk top.exe" "icon disk top.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:624
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Barcelona%2525252Bv%2525252.gif
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Barcelona%2525252Bv%2525252.gif

    Filesize

    109KB

    MD5

    fa80ec857b5a262bf80a869c8ee6412c

    SHA1

    082d3bda5dca464a5c1c80b66ea5087c6ceb92a1

    SHA256

    6eacf4d1230ee097103b2deb54e94ff8a66f3693ddedf514e6b674f9e1944075

    SHA512

    5658c0720f6982f4cd28510a787a4bd5e484de5822b0b84066e67ee1bcc6cd2521f9650aa119dc090f3b5fda142384fa65d4f4fedeea9fa75d34b1ca75268e88

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    23KB

    MD5

    ff427e7e5834822a0448d35950c6f1e7

    SHA1

    bf4fcd87c6a37fd058d6b48115a508325d9cef6a

    SHA256

    7210ff1920b071c8595803241d874db80bb72f0e6524c6a97dff6e372f96d646

    SHA512

    1c8edd1618cea4839e0284a4ef01561e1b2e013048ddf24f7a8dce6feac9943fdaba4c4fd2244d8f615be58e10fad0412cfc75409c43a02382c15686769d4f3f

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    23KB

    MD5

    ff427e7e5834822a0448d35950c6f1e7

    SHA1

    bf4fcd87c6a37fd058d6b48115a508325d9cef6a

    SHA256

    7210ff1920b071c8595803241d874db80bb72f0e6524c6a97dff6e372f96d646

    SHA512

    1c8edd1618cea4839e0284a4ef01561e1b2e013048ddf24f7a8dce6feac9943fdaba4c4fd2244d8f615be58e10fad0412cfc75409c43a02382c15686769d4f3f

  • C:\Users\Admin\AppData\Local\Temp\icon disk top.exe

    Filesize

    23KB

    MD5

    ff427e7e5834822a0448d35950c6f1e7

    SHA1

    bf4fcd87c6a37fd058d6b48115a508325d9cef6a

    SHA256

    7210ff1920b071c8595803241d874db80bb72f0e6524c6a97dff6e372f96d646

    SHA512

    1c8edd1618cea4839e0284a4ef01561e1b2e013048ddf24f7a8dce6feac9943fdaba4c4fd2244d8f615be58e10fad0412cfc75409c43a02382c15686769d4f3f

  • C:\Users\Admin\AppData\Local\Temp\icon disk top.exe

    Filesize

    23KB

    MD5

    ff427e7e5834822a0448d35950c6f1e7

    SHA1

    bf4fcd87c6a37fd058d6b48115a508325d9cef6a

    SHA256

    7210ff1920b071c8595803241d874db80bb72f0e6524c6a97dff6e372f96d646

    SHA512

    1c8edd1618cea4839e0284a4ef01561e1b2e013048ddf24f7a8dce6feac9943fdaba4c4fd2244d8f615be58e10fad0412cfc75409c43a02382c15686769d4f3f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DB8DS05R.txt

    Filesize

    603B

    MD5

    9babc8af2aad2830caa1100683e3384e

    SHA1

    3ed5558c7cf12a32cc23180241a819d3fce879bf

    SHA256

    c8171a4320d0bce208e221a09dcd82c5ad450dec015e440bbf6ab742edbb15d4

    SHA512

    00248c1c85113c81832cacfbc6c39f3f40cb716189ccd85868591a9fde6dd5441b2162ad9d58a96e6ae1a529bb8dffe8a468df34cbdcf05c977e610397add140

  • \Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    23KB

    MD5

    ff427e7e5834822a0448d35950c6f1e7

    SHA1

    bf4fcd87c6a37fd058d6b48115a508325d9cef6a

    SHA256

    7210ff1920b071c8595803241d874db80bb72f0e6524c6a97dff6e372f96d646

    SHA512

    1c8edd1618cea4839e0284a4ef01561e1b2e013048ddf24f7a8dce6feac9943fdaba4c4fd2244d8f615be58e10fad0412cfc75409c43a02382c15686769d4f3f

  • \Users\Admin\AppData\Local\Temp\icon disk top.exe

    Filesize

    23KB

    MD5

    ff427e7e5834822a0448d35950c6f1e7

    SHA1

    bf4fcd87c6a37fd058d6b48115a508325d9cef6a

    SHA256

    7210ff1920b071c8595803241d874db80bb72f0e6524c6a97dff6e372f96d646

    SHA512

    1c8edd1618cea4839e0284a4ef01561e1b2e013048ddf24f7a8dce6feac9943fdaba4c4fd2244d8f615be58e10fad0412cfc75409c43a02382c15686769d4f3f

  • memory/392-63-0x0000000000000000-mapping.dmp

  • memory/392-68-0x0000000074BB0000-0x000000007515B000-memory.dmp

    Filesize

    5.7MB

  • memory/392-71-0x0000000074BB0000-0x000000007515B000-memory.dmp

    Filesize

    5.7MB

  • memory/624-69-0x0000000000000000-mapping.dmp

  • memory/1264-56-0x0000000000000000-mapping.dmp

  • memory/1264-61-0x0000000074BB0000-0x000000007515B000-memory.dmp

    Filesize

    5.7MB

  • memory/1264-67-0x0000000074BB0000-0x000000007515B000-memory.dmp

    Filesize

    5.7MB

  • memory/1632-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB