Analysis
-
max time kernel
152s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 20:59
Behavioral task
behavioral1
Sample
97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe
Resource
win10v2004-20220901-en
General
-
Target
97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe
-
Size
29KB
-
MD5
e60917239623e9b7b6e0f5b879c88ff0
-
SHA1
71a3c06515241b14227ca3a0131134da1c4dc747
-
SHA256
97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1
-
SHA512
446ce1d1e69f7cfb15505aa5dceba3d8a099cade946935f05cd507080bc41e325e27963267f7c3f0a22821e6b2121df914ad058c55549a0de1ae8c4c8d36ae83
-
SSDEEP
384:mYs5l7VL9skVQ42BkSv5dAsCGmqDm+jeI7GBsbh0w4wlAokw9OhgOL1vYRGOZzj:a7/skCXkQossqtje3BKh0p29SgR1i
Malware Config
Extracted
njrat
0.6.4
HacKed
aziza12.no-ip.biz:1177
f26884cbd1211af8a3cd7b57fffc2aad
-
reg_key
f26884cbd1211af8a3cd7b57fffc2aad
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1924 croom.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1820 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1776 97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\f26884cbd1211af8a3cd7b57fffc2aad = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\croom.exe\" .." croom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f26884cbd1211af8a3cd7b57fffc2aad = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\croom.exe\" .." croom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe 1924 croom.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1924 croom.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1924 1776 97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe 28 PID 1776 wrote to memory of 1924 1776 97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe 28 PID 1776 wrote to memory of 1924 1776 97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe 28 PID 1776 wrote to memory of 1924 1776 97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe 28 PID 1924 wrote to memory of 1820 1924 croom.exe 29 PID 1924 wrote to memory of 1820 1924 croom.exe 29 PID 1924 wrote to memory of 1820 1924 croom.exe 29 PID 1924 wrote to memory of 1820 1924 croom.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe"C:\Users\Admin\AppData\Local\Temp\97d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\croom.exe"C:\Users\Admin\AppData\Local\Temp\croom.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\croom.exe" "croom.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5e60917239623e9b7b6e0f5b879c88ff0
SHA171a3c06515241b14227ca3a0131134da1c4dc747
SHA25697d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1
SHA512446ce1d1e69f7cfb15505aa5dceba3d8a099cade946935f05cd507080bc41e325e27963267f7c3f0a22821e6b2121df914ad058c55549a0de1ae8c4c8d36ae83
-
Filesize
29KB
MD5e60917239623e9b7b6e0f5b879c88ff0
SHA171a3c06515241b14227ca3a0131134da1c4dc747
SHA25697d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1
SHA512446ce1d1e69f7cfb15505aa5dceba3d8a099cade946935f05cd507080bc41e325e27963267f7c3f0a22821e6b2121df914ad058c55549a0de1ae8c4c8d36ae83
-
Filesize
29KB
MD5e60917239623e9b7b6e0f5b879c88ff0
SHA171a3c06515241b14227ca3a0131134da1c4dc747
SHA25697d710673f7ede7e94bfd78383f76dc13db96b7f0997bf267a4ca40a9edaf6c1
SHA512446ce1d1e69f7cfb15505aa5dceba3d8a099cade946935f05cd507080bc41e325e27963267f7c3f0a22821e6b2121df914ad058c55549a0de1ae8c4c8d36ae83