Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 23:09
Behavioral task
behavioral1
Sample
1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe
Resource
win7-20220812-en
General
-
Target
1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe
-
Size
29KB
-
MD5
29866996e016e6f2f3c9cc814807b3a8
-
SHA1
606306bae6a956be85c37a9ea22b2475abedb149
-
SHA256
1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b
-
SHA512
fd8c1d8b27952a26e34495ccc7da8be885405cd9caf69ba3be1ee5725325cc76869b3f33d47df593c99cb1dd0cfc5793907194b222a24138d9010de1b057c4f8
-
SSDEEP
384:Ios5l7l7EMrof6oyh75NxrimmqDWD4IePUGBsbh0w4wlAokw9OhgOL1vYRGOZzdL:07GMroyn5prsq04IePBKh0p29SgRZ/
Malware Config
Extracted
njrat
0.6.4
HacKed
youssef-el.no-ip.org:5553
23556fb1360f366337f97c924e76ead3
-
reg_key
23556fb1360f366337f97c924e76ead3
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1628 svchost.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1536 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1788 1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\23556fb1360f366337f97c924e76ead3 = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\23556fb1360f366337f97c924e76ead3 = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\" .." svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1628 1788 1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe 27 PID 1788 wrote to memory of 1628 1788 1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe 27 PID 1788 wrote to memory of 1628 1788 1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe 27 PID 1788 wrote to memory of 1628 1788 1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe 27 PID 1628 wrote to memory of 1536 1628 svchost.exe 28 PID 1628 wrote to memory of 1536 1628 svchost.exe 28 PID 1628 wrote to memory of 1536 1628 svchost.exe 28 PID 1628 wrote to memory of 1536 1628 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe"C:\Users\Admin\AppData\Local\Temp\1196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1536
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD529866996e016e6f2f3c9cc814807b3a8
SHA1606306bae6a956be85c37a9ea22b2475abedb149
SHA2561196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b
SHA512fd8c1d8b27952a26e34495ccc7da8be885405cd9caf69ba3be1ee5725325cc76869b3f33d47df593c99cb1dd0cfc5793907194b222a24138d9010de1b057c4f8
-
Filesize
29KB
MD529866996e016e6f2f3c9cc814807b3a8
SHA1606306bae6a956be85c37a9ea22b2475abedb149
SHA2561196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b
SHA512fd8c1d8b27952a26e34495ccc7da8be885405cd9caf69ba3be1ee5725325cc76869b3f33d47df593c99cb1dd0cfc5793907194b222a24138d9010de1b057c4f8
-
Filesize
29KB
MD529866996e016e6f2f3c9cc814807b3a8
SHA1606306bae6a956be85c37a9ea22b2475abedb149
SHA2561196190fd68b5e363107ec9f6bdb5a3859b6cd315f72392d64db552ead0fb89b
SHA512fd8c1d8b27952a26e34495ccc7da8be885405cd9caf69ba3be1ee5725325cc76869b3f33d47df593c99cb1dd0cfc5793907194b222a24138d9010de1b057c4f8