Analysis

  • max time kernel
    202s
  • max time network
    249s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:45

General

  • Target

    528e851829bc704e72399308a139291053468a53d2ca3a0fe4335f6a51fb8e0e.exe

  • Size

    1.7MB

  • MD5

    3252406fbbe1a7a883ad6935b5ff7b44

  • SHA1

    04a855b176cce65a5d8f5c5962cb071eb2829b12

  • SHA256

    528e851829bc704e72399308a139291053468a53d2ca3a0fe4335f6a51fb8e0e

  • SHA512

    86cea605369b07b01b5bbaf507e13091e5b21518c68f5b7e429f0390ed7202da370503f33ff6537ae165999c940587eda552522091769b36c1dc616868e47773

  • SSDEEP

    49152:xjrGFvecsO1VyuA1zRUMjcXYzC5T2Ocjpm:4phDVy71zRtjodT2XjU

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\528e851829bc704e72399308a139291053468a53d2ca3a0fe4335f6a51fb8e0e.exe
    "C:\Users\Admin\AppData\Local\Temp\528e851829bc704e72399308a139291053468a53d2ca3a0fe4335f6a51fb8e0e.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Program Files (x86)\NJax\nfregdrv.exe
      nfregdrv.exe C:\Windows\system32\drivers\mosfilterdrv.sys
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:628
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\NJax\SSL\import.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Users\Admin\AppData\Local\Temp\NJax\SSL\import_root_cert.exe
        C:\Users\Admin\AppData\Local\Temp\NJax\SSL\import_root_cert.exe "C:\Users\Admin\AppData\Local\Temp\NJax\SSL\NJaxSSL.cer"
        3⤵
        • Executes dropped EXE
        PID:1184
    • C:\Program Files (x86)\NJax\NJax.exe
      "C:\Program Files (x86)\NJax\NJax.exe" /install /SILENT
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2328

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\NJax\NJax.exe
    Filesize

    433KB

    MD5

    4b20907ce23537d3cac5901ea3a236d2

    SHA1

    9becf6a793563693bcd98b22d863db55e43abdb0

    SHA256

    051f18a0bba6530d56913c78fb8442098ff77e17a7b36cf1bc728cc9da9ea6a5

    SHA512

    5eb33f9824296e06ebd7a645367f9c9a842aeb9b96012e036023f799a03e3f4f551a90236d9a53b31b3cdf6d8c0f259b82d9550b4363efc9b33329af6e5764f4

  • C:\Program Files (x86)\NJax\NJax.exe
    Filesize

    433KB

    MD5

    4b20907ce23537d3cac5901ea3a236d2

    SHA1

    9becf6a793563693bcd98b22d863db55e43abdb0

    SHA256

    051f18a0bba6530d56913c78fb8442098ff77e17a7b36cf1bc728cc9da9ea6a5

    SHA512

    5eb33f9824296e06ebd7a645367f9c9a842aeb9b96012e036023f799a03e3f4f551a90236d9a53b31b3cdf6d8c0f259b82d9550b4363efc9b33329af6e5764f4

  • C:\Program Files (x86)\NJax\ProtocolFilters.dll
    Filesize

    332KB

    MD5

    9c9694225679c7c577d72ea1537544cc

    SHA1

    8342872c5ef4d8c265eace1903a5ca2c7a38905c

    SHA256

    615f0ab9ecdef7834a6943623752cae5814b06d2f4894e9da074a7e3b68ea86e

    SHA512

    0c0558484cbbd12d5401b3a58b4ebf494d4740f4764491acc0e30a35c9a202c89e9ab7590675b5c729cd200025af2658dd723335f049cbaf44cdfb068312a74a

  • C:\Program Files (x86)\NJax\nfapi.dll
    Filesize

    116KB

    MD5

    d8305b5c2810e2e135f87bb32d62810e

    SHA1

    e78991c4d920b61f068c27071253ab5e825572bc

    SHA256

    a035dde03f95ad199a74e141089ea94d24abb42f56a9cc14c86c76c6ce6932ec

    SHA512

    c01145ec54a3e2010d777625b65660f4d88a6488de171a97fdfe29b7da15c45aaa88b49a54046d42d199d5685560670ef2ccc6df3c915fda77a02796069123ab

  • C:\Program Files (x86)\NJax\nfapi.dll
    Filesize

    116KB

    MD5

    d8305b5c2810e2e135f87bb32d62810e

    SHA1

    e78991c4d920b61f068c27071253ab5e825572bc

    SHA256

    a035dde03f95ad199a74e141089ea94d24abb42f56a9cc14c86c76c6ce6932ec

    SHA512

    c01145ec54a3e2010d777625b65660f4d88a6488de171a97fdfe29b7da15c45aaa88b49a54046d42d199d5685560670ef2ccc6df3c915fda77a02796069123ab

  • C:\Program Files (x86)\NJax\nfapi.dll
    Filesize

    116KB

    MD5

    d8305b5c2810e2e135f87bb32d62810e

    SHA1

    e78991c4d920b61f068c27071253ab5e825572bc

    SHA256

    a035dde03f95ad199a74e141089ea94d24abb42f56a9cc14c86c76c6ce6932ec

    SHA512

    c01145ec54a3e2010d777625b65660f4d88a6488de171a97fdfe29b7da15c45aaa88b49a54046d42d199d5685560670ef2ccc6df3c915fda77a02796069123ab

  • C:\Program Files (x86)\NJax\nfregdrv.exe
    Filesize

    48KB

    MD5

    01b5780505301ada6dc102fb77b2298c

    SHA1

    328c3931a54af2d7adb88ba4c4c18ce1af8d5a72

    SHA256

    aad2d85472448abe8250cf3180c3d0373540f46e8a8e76d8ef2f78db62be0812

    SHA512

    bc5bd91c46f452a76ae0595287622256e8c79e90158171bedf6b68d4439dfefceb06948bd49deb0aeb1344ce89a312bb87b01e2daf3880729fff642951c33947

  • C:\Program Files (x86)\NJax\nfregdrv.exe
    Filesize

    48KB

    MD5

    01b5780505301ada6dc102fb77b2298c

    SHA1

    328c3931a54af2d7adb88ba4c4c18ce1af8d5a72

    SHA256

    aad2d85472448abe8250cf3180c3d0373540f46e8a8e76d8ef2f78db62be0812

    SHA512

    bc5bd91c46f452a76ae0595287622256e8c79e90158171bedf6b68d4439dfefceb06948bd49deb0aeb1344ce89a312bb87b01e2daf3880729fff642951c33947

  • C:\Users\Admin\AppData\Local\Temp\NJax\SSL\import.bat
    Filesize

    66B

    MD5

    0b1777825d2b22502042da74398ea2ae

    SHA1

    e1f96e5ff8dfade89e5517711e9e9aa4b90a305f

    SHA256

    e1a81e904b5ebeabf2a4f791d29299b2d681f56c164f71c8d29de44c4c4ab492

    SHA512

    e8473d28bc61d33d8afe43c8f2cb547d6a4e8d55d2f37858e3c118432fb7da97511709acf9466a1a2f828050bbed259021982603c9b2fcfb91fae60d89853f3d

  • C:\Users\Admin\AppData\Local\Temp\NJax\SSL\import_root_cert.exe
    Filesize

    92KB

    MD5

    1c76d7defa116a328f47036b54126e6c

    SHA1

    8a0e534388b552a57da85b2fe015168fc1164d08

    SHA256

    0cf513ba175e46c598be4f7272fbe03a30ba65b1221e45b36cf5945853b9e39e

    SHA512

    2aefa82b7bde1d219aa0cf81b91a5caff82d7df695e95b0c14ec04056601411e10e245efa25ced309136611d6ce426cb187d867c39ef1d5d6b1b57827e942674

  • C:\Users\Admin\AppData\Local\Temp\NJax\SSL\import_root_cert.exe
    Filesize

    92KB

    MD5

    1c76d7defa116a328f47036b54126e6c

    SHA1

    8a0e534388b552a57da85b2fe015168fc1164d08

    SHA256

    0cf513ba175e46c598be4f7272fbe03a30ba65b1221e45b36cf5945853b9e39e

    SHA512

    2aefa82b7bde1d219aa0cf81b91a5caff82d7df695e95b0c14ec04056601411e10e245efa25ced309136611d6ce426cb187d867c39ef1d5d6b1b57827e942674

  • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\SelfDel.dll
    Filesize

    5KB

    MD5

    e5786e8703d651bc8bd4bfecf46d3844

    SHA1

    fee5aa4b325deecbf69ccb6eadd89bd5ae59723f

    SHA256

    d115bce0a787b4f895e700efe943695c8f1087782807d91d831f6015b0f98774

    SHA512

    d14ad43a01db19428cd8ccd2fe101750860933409b5be2eb85a3e400efcd37b1b6425ce84e87a7fe46ecabc7b91c4b450259e624c178b86e194ba7da97957ba3

  • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\SimpleSC.dll
    Filesize

    61KB

    MD5

    d63975ce28f801f236c4aca5af726961

    SHA1

    3d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9

    SHA256

    e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43

    SHA512

    8357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810

  • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\SimpleSC.dll
    Filesize

    61KB

    MD5

    d63975ce28f801f236c4aca5af726961

    SHA1

    3d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9

    SHA256

    e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43

    SHA512

    8357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810

  • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\System.dll
    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\nsExec.dll
    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\nsExec.dll
    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • memory/628-133-0x0000000000000000-mapping.dmp
  • memory/1184-142-0x0000000000000000-mapping.dmp
  • memory/1604-140-0x0000000000000000-mapping.dmp
  • memory/2328-148-0x0000000000000000-mapping.dmp
  • memory/3808-151-0x00000000737B0000-0x00000000737B9000-memory.dmp
    Filesize

    36KB

  • memory/3808-147-0x0000000000631000-0x000000000063D000-memory.dmp
    Filesize

    48KB