Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe
Resource
win10v2004-20221111-en
General
-
Target
2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe
-
Size
256KB
-
MD5
a1063dfcb0fa9b60444d487bd0b99c41
-
SHA1
e026766de06cde67ae5f2340f0adf55075705d1e
-
SHA256
2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a
-
SHA512
d0edb45fac2a3362ede118f232ba091eef65f49019e7045a04299912c2332c3b36adc03d0a5c0e1430a25b2fc56988bd7cd879f6ebd597d1ecf5ff58f612dd97
-
SSDEEP
6144:FPqjOgYeDhxncphQ2Amb/P3JTQYKeobc5AKx:UlYQhxnKSoqDKx
Malware Config
Extracted
njrat
0.7d
HacKed by solo
soport-587.zapto.org:1177
f37bb6f8d08374d7119032823a62e813
-
reg_key
f37bb6f8d08374d7119032823a62e813
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1988 LocalLAtmIYAllW.exe 332 server.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1692 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f37bb6f8d08374d7119032823a62e813.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f37bb6f8d08374d7119032823a62e813.exe server.exe -
Loads dropped DLL 1 IoCs
pid Process 1988 LocalLAtmIYAllW.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\f37bb6f8d08374d7119032823a62e813 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f37bb6f8d08374d7119032823a62e813 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 332 server.exe Token: 33 332 server.exe Token: SeIncBasePriorityPrivilege 332 server.exe Token: 33 332 server.exe Token: SeIncBasePriorityPrivilege 332 server.exe Token: 33 332 server.exe Token: SeIncBasePriorityPrivilege 332 server.exe Token: 33 332 server.exe Token: SeIncBasePriorityPrivilege 332 server.exe Token: 33 332 server.exe Token: SeIncBasePriorityPrivilege 332 server.exe Token: 33 332 server.exe Token: SeIncBasePriorityPrivilege 332 server.exe Token: 33 332 server.exe Token: SeIncBasePriorityPrivilege 332 server.exe Token: 33 332 server.exe Token: SeIncBasePriorityPrivilege 332 server.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1988 1932 2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe 27 PID 1932 wrote to memory of 1988 1932 2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe 27 PID 1932 wrote to memory of 1988 1932 2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe 27 PID 1932 wrote to memory of 1988 1932 2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe 27 PID 1988 wrote to memory of 332 1988 LocalLAtmIYAllW.exe 29 PID 1988 wrote to memory of 332 1988 LocalLAtmIYAllW.exe 29 PID 1988 wrote to memory of 332 1988 LocalLAtmIYAllW.exe 29 PID 1988 wrote to memory of 332 1988 LocalLAtmIYAllW.exe 29 PID 332 wrote to memory of 1692 332 server.exe 31 PID 332 wrote to memory of 1692 332 server.exe 31 PID 332 wrote to memory of 1692 332 server.exe 31 PID 332 wrote to memory of 1692 332 server.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe"C:\Users\Admin\AppData\Local\Temp\2c3aba28dd226f7a429379dcde769bd7d80f27608da1da53ce5c71e4a2b7db7a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\LocalLAtmIYAllW.exe"C:\Users\Admin\AppData\LocalLAtmIYAllW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:1692
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5ce4e338c9593ac2b72af24345d5dfdde
SHA1a385ecc8a2cc5ad96993d23071211860db663d55
SHA2563029140534aa098c3dd8c92b93892310b4923453e18db87f571068ce0373878d
SHA51224b441b2633e50d9da48042d28dd6a7b02a4b0e6ee87b6c112388f4a085046729bad875d6220ce6fc9fa6477f15228650cf7865a0c4594d4092d2c90149ced57
-
Filesize
57KB
MD5ce4e338c9593ac2b72af24345d5dfdde
SHA1a385ecc8a2cc5ad96993d23071211860db663d55
SHA2563029140534aa098c3dd8c92b93892310b4923453e18db87f571068ce0373878d
SHA51224b441b2633e50d9da48042d28dd6a7b02a4b0e6ee87b6c112388f4a085046729bad875d6220ce6fc9fa6477f15228650cf7865a0c4594d4092d2c90149ced57
-
Filesize
57KB
MD5ce4e338c9593ac2b72af24345d5dfdde
SHA1a385ecc8a2cc5ad96993d23071211860db663d55
SHA2563029140534aa098c3dd8c92b93892310b4923453e18db87f571068ce0373878d
SHA51224b441b2633e50d9da48042d28dd6a7b02a4b0e6ee87b6c112388f4a085046729bad875d6220ce6fc9fa6477f15228650cf7865a0c4594d4092d2c90149ced57
-
Filesize
57KB
MD5ce4e338c9593ac2b72af24345d5dfdde
SHA1a385ecc8a2cc5ad96993d23071211860db663d55
SHA2563029140534aa098c3dd8c92b93892310b4923453e18db87f571068ce0373878d
SHA51224b441b2633e50d9da48042d28dd6a7b02a4b0e6ee87b6c112388f4a085046729bad875d6220ce6fc9fa6477f15228650cf7865a0c4594d4092d2c90149ced57
-
Filesize
57KB
MD5ce4e338c9593ac2b72af24345d5dfdde
SHA1a385ecc8a2cc5ad96993d23071211860db663d55
SHA2563029140534aa098c3dd8c92b93892310b4923453e18db87f571068ce0373878d
SHA51224b441b2633e50d9da48042d28dd6a7b02a4b0e6ee87b6c112388f4a085046729bad875d6220ce6fc9fa6477f15228650cf7865a0c4594d4092d2c90149ced57