Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe
Resource
win10v2004-20221111-en
General
-
Target
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe
-
Size
356KB
-
MD5
779f561dc93adbf2b40e92ac374f7cf5
-
SHA1
562ca1be06ff75f55893fa5472abbf7bb9fa6625
-
SHA256
2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
-
SHA512
d1a3f889c6f60b49d07519ddc73f9108012c8e4b81a01328ac75400bd10888428fed84c81a32da3ff00644e3149ba8ad4fd9720d2bb4c0819619e9f9f2069501
-
SSDEEP
6144:9LM3L6hWtnvqI6vzkGTxapOEBqa5tXc8s:hMbaWtn6vzkYmVjC8s
Malware Config
Extracted
njrat
0.7d
FBautoliker103
182.191.88.102:5555
246bc91174535f2c90a8931dec64f396
-
reg_key
246bc91174535f2c90a8931dec64f396
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1524 server.exe 632 server.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 836 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\246bc91174535f2c90a8931dec64f396.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\246bc91174535f2c90a8931dec64f396.exe server.exe -
Loads dropped DLL 2 IoCs
pid Process 112 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 1524 server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\246bc91174535f2c90a8931dec64f396 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\246bc91174535f2c90a8931dec64f396 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2044 set thread context of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 1524 set thread context of 632 1524 server.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe Token: SeDebugPrivilege 1524 server.exe Token: SeDebugPrivilege 632 server.exe Token: 33 632 server.exe Token: SeIncBasePriorityPrivilege 632 server.exe Token: 33 632 server.exe Token: SeIncBasePriorityPrivilege 632 server.exe Token: 33 632 server.exe Token: SeIncBasePriorityPrivilege 632 server.exe Token: 33 632 server.exe Token: SeIncBasePriorityPrivilege 632 server.exe Token: 33 632 server.exe Token: SeIncBasePriorityPrivilege 632 server.exe Token: 33 632 server.exe Token: SeIncBasePriorityPrivilege 632 server.exe Token: 33 632 server.exe Token: SeIncBasePriorityPrivilege 632 server.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 2044 wrote to memory of 112 2044 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 26 PID 112 wrote to memory of 1524 112 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 27 PID 112 wrote to memory of 1524 112 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 27 PID 112 wrote to memory of 1524 112 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 27 PID 112 wrote to memory of 1524 112 2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe 27 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 1524 wrote to memory of 632 1524 server.exe 28 PID 632 wrote to memory of 836 632 server.exe 29 PID 632 wrote to memory of 836 632 server.exe 29 PID 632 wrote to memory of 836 632 server.exe 29 PID 632 wrote to memory of 836 632 server.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe"C:\Users\Admin\AppData\Local\Temp\2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exeC:\Users\Admin\AppData\Local\Temp\2df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp\server.exe4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:836
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5779f561dc93adbf2b40e92ac374f7cf5
SHA1562ca1be06ff75f55893fa5472abbf7bb9fa6625
SHA2562df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
SHA512d1a3f889c6f60b49d07519ddc73f9108012c8e4b81a01328ac75400bd10888428fed84c81a32da3ff00644e3149ba8ad4fd9720d2bb4c0819619e9f9f2069501
-
Filesize
356KB
MD5779f561dc93adbf2b40e92ac374f7cf5
SHA1562ca1be06ff75f55893fa5472abbf7bb9fa6625
SHA2562df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
SHA512d1a3f889c6f60b49d07519ddc73f9108012c8e4b81a01328ac75400bd10888428fed84c81a32da3ff00644e3149ba8ad4fd9720d2bb4c0819619e9f9f2069501
-
Filesize
356KB
MD5779f561dc93adbf2b40e92ac374f7cf5
SHA1562ca1be06ff75f55893fa5472abbf7bb9fa6625
SHA2562df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
SHA512d1a3f889c6f60b49d07519ddc73f9108012c8e4b81a01328ac75400bd10888428fed84c81a32da3ff00644e3149ba8ad4fd9720d2bb4c0819619e9f9f2069501
-
Filesize
356KB
MD5779f561dc93adbf2b40e92ac374f7cf5
SHA1562ca1be06ff75f55893fa5472abbf7bb9fa6625
SHA2562df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
SHA512d1a3f889c6f60b49d07519ddc73f9108012c8e4b81a01328ac75400bd10888428fed84c81a32da3ff00644e3149ba8ad4fd9720d2bb4c0819619e9f9f2069501
-
Filesize
356KB
MD5779f561dc93adbf2b40e92ac374f7cf5
SHA1562ca1be06ff75f55893fa5472abbf7bb9fa6625
SHA2562df351f2e7e6f1340f81c6431e88fb2b78f2eaefce58763e7bfd5214985aeaaa
SHA512d1a3f889c6f60b49d07519ddc73f9108012c8e4b81a01328ac75400bd10888428fed84c81a32da3ff00644e3149ba8ad4fd9720d2bb4c0819619e9f9f2069501