Analysis
-
max time kernel
207s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 08:41
Behavioral task
behavioral1
Sample
39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exe
Resource
win7-20220812-en
General
-
Target
39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exe
-
Size
29KB
-
MD5
21dfeafc97d010ac6621bce05fec35a2
-
SHA1
153628124344521d76a63464ae00165e7749007a
-
SHA256
39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec
-
SHA512
099ce2105c184faef54b4d6860c394b00eff8cbb4453d41ac8d96fa38157da4c97d9eb5597529d3548c5d257efac69a5fd6671f386dc27d22417b011a8d1fc0e
-
SSDEEP
768:vQv/27NYsDkfZPoIqlHepBKh0p29SgRF2:4m7N143wEKhG29jF2
Malware Config
Extracted
njrat
0.6.4
shemo
shemo.no-ip.org:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Trojan.exepid process 1972 Trojan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exedescription pid process target process PID 4268 wrote to memory of 1972 4268 39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exe Trojan.exe PID 4268 wrote to memory of 1972 4268 39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exe Trojan.exe PID 4268 wrote to memory of 1972 4268 39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exe Trojan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exe"C:\Users\Admin\AppData\Local\Temp\39678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
PID:1972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD521dfeafc97d010ac6621bce05fec35a2
SHA1153628124344521d76a63464ae00165e7749007a
SHA25639678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec
SHA512099ce2105c184faef54b4d6860c394b00eff8cbb4453d41ac8d96fa38157da4c97d9eb5597529d3548c5d257efac69a5fd6671f386dc27d22417b011a8d1fc0e
-
Filesize
29KB
MD521dfeafc97d010ac6621bce05fec35a2
SHA1153628124344521d76a63464ae00165e7749007a
SHA25639678e8a69e720df9139d2474d78add7f464610ceabfd17b49518427107ab8ec
SHA512099ce2105c184faef54b4d6860c394b00eff8cbb4453d41ac8d96fa38157da4c97d9eb5597529d3548c5d257efac69a5fd6671f386dc27d22417b011a8d1fc0e