Analysis
-
max time kernel
164s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 20:58
Behavioral task
behavioral1
Sample
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe
Resource
win10v2004-20220812-en
General
-
Target
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe
-
Size
29KB
-
MD5
c126e0f1c902ecc3c38a70201a3ff596
-
SHA1
7f2f7546361464ac039fc7f59a40c2bbe72fe60b
-
SHA256
97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b
-
SHA512
499030cf4ca86ee53304998100133603c940db3e6c40c9b1c31a901cce50d8201ffa283aa27abd645e75405708a308699c102ae48b8998eab0c5825e89199ec1
-
SSDEEP
384:ABgJGJl7tj1Msagab1h5Vh+2CWmrDRbD59ePbGBsbh0w4wlAokw9OhgOL1vYRGO5:AZ7nMsanzR+2crdDveyBKh0p29SgRxR
Malware Config
Extracted
njrat
0.6.4
HacKed
supermorad.no-ip.biz:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2020 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 844 97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe 2036 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 Trojan.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 844 wrote to memory of 2036 844 97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe 27 PID 844 wrote to memory of 2036 844 97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe 27 PID 844 wrote to memory of 2036 844 97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe 27 PID 844 wrote to memory of 2036 844 97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe 27 PID 2036 wrote to memory of 2020 2036 Trojan.exe 28 PID 2036 wrote to memory of 2020 2036 Trojan.exe 28 PID 2036 wrote to memory of 2020 2036 Trojan.exe 28 PID 2036 wrote to memory of 2020 2036 Trojan.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe"C:\Users\Admin\AppData\Local\Temp\97cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2020
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5c126e0f1c902ecc3c38a70201a3ff596
SHA17f2f7546361464ac039fc7f59a40c2bbe72fe60b
SHA25697cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b
SHA512499030cf4ca86ee53304998100133603c940db3e6c40c9b1c31a901cce50d8201ffa283aa27abd645e75405708a308699c102ae48b8998eab0c5825e89199ec1
-
Filesize
29KB
MD5c126e0f1c902ecc3c38a70201a3ff596
SHA17f2f7546361464ac039fc7f59a40c2bbe72fe60b
SHA25697cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b
SHA512499030cf4ca86ee53304998100133603c940db3e6c40c9b1c31a901cce50d8201ffa283aa27abd645e75405708a308699c102ae48b8998eab0c5825e89199ec1
-
Filesize
29KB
MD5c126e0f1c902ecc3c38a70201a3ff596
SHA17f2f7546361464ac039fc7f59a40c2bbe72fe60b
SHA25697cac6f39661b123ad7001774042f62433d3bd5d0fd09682fc32d3acac81984b
SHA512499030cf4ca86ee53304998100133603c940db3e6c40c9b1c31a901cce50d8201ffa283aa27abd645e75405708a308699c102ae48b8998eab0c5825e89199ec1