Analysis

  • max time kernel
    191s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 16:30

General

  • Target

    a4ce06d69cd23436729342c89905819e2a20040e0c661b8a02d4895e45e943c8.exe

  • Size

    156KB

  • MD5

    36c57457c2c40668e92081f2dfbebdd2

  • SHA1

    7413402da144374be19572798e14efe51e72a1cd

  • SHA256

    a4ce06d69cd23436729342c89905819e2a20040e0c661b8a02d4895e45e943c8

  • SHA512

    dab1faf27e8d91b253596d78836bc594a56354af0dbb3530f9fa4cc26194d6f4cfecd16e4911bc4dedf2cee9cf2a9ff38c2ecdc614a08cde7b37fc431fc06b11

  • SSDEEP

    3072:Wp9ei9ELN8n4bS8Zl9QJKiFS+RRHlOHdflkRBmolz4wPG:Xi9v4bfL9QJxk+/kFmRf4

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

new1

C2

yourmain.no-ip.info:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4ce06d69cd23436729342c89905819e2a20040e0c661b8a02d4895e45e943c8.exe
    "C:\Users\Admin\AppData\Local\Temp\a4ce06d69cd23436729342c89905819e2a20040e0c661b8a02d4895e45e943c8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1052
    • C:\Users\Admin\AppData\Local\Temp\sql_support.exe
      "C:\Users\Admin\AppData\Local\Temp\sql_support.exe" -woohoo 516 C:\Users\Admin\AppData\Local\Temp\chrome.exe
      2⤵
      • Executes dropped EXE
      PID:556

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sql_support.exe
    Filesize

    156KB

    MD5

    36c57457c2c40668e92081f2dfbebdd2

    SHA1

    7413402da144374be19572798e14efe51e72a1cd

    SHA256

    a4ce06d69cd23436729342c89905819e2a20040e0c661b8a02d4895e45e943c8

    SHA512

    dab1faf27e8d91b253596d78836bc594a56354af0dbb3530f9fa4cc26194d6f4cfecd16e4911bc4dedf2cee9cf2a9ff38c2ecdc614a08cde7b37fc431fc06b11

  • C:\Users\Admin\AppData\Local\Temp\sql_support.exe
    Filesize

    156KB

    MD5

    36c57457c2c40668e92081f2dfbebdd2

    SHA1

    7413402da144374be19572798e14efe51e72a1cd

    SHA256

    a4ce06d69cd23436729342c89905819e2a20040e0c661b8a02d4895e45e943c8

    SHA512

    dab1faf27e8d91b253596d78836bc594a56354af0dbb3530f9fa4cc26194d6f4cfecd16e4911bc4dedf2cee9cf2a9ff38c2ecdc614a08cde7b37fc431fc06b11

  • \Users\Admin\AppData\Local\Temp\sql_support.exe
    Filesize

    156KB

    MD5

    36c57457c2c40668e92081f2dfbebdd2

    SHA1

    7413402da144374be19572798e14efe51e72a1cd

    SHA256

    a4ce06d69cd23436729342c89905819e2a20040e0c661b8a02d4895e45e943c8

    SHA512

    dab1faf27e8d91b253596d78836bc594a56354af0dbb3530f9fa4cc26194d6f4cfecd16e4911bc4dedf2cee9cf2a9ff38c2ecdc614a08cde7b37fc431fc06b11

  • memory/516-70-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/516-58-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/516-60-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/516-62-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/516-64-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/516-66-0x0000000000408AFE-mapping.dmp
  • memory/516-68-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/516-82-0x0000000074960000-0x0000000074F0B000-memory.dmp
    Filesize

    5.7MB

  • memory/516-57-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/516-79-0x0000000074960000-0x0000000074F0B000-memory.dmp
    Filesize

    5.7MB

  • memory/556-80-0x0000000074960000-0x0000000074F0B000-memory.dmp
    Filesize

    5.7MB

  • memory/556-73-0x0000000000000000-mapping.dmp
  • memory/556-81-0x0000000074960000-0x0000000074F0B000-memory.dmp
    Filesize

    5.7MB

  • memory/1052-77-0x0000000000000000-mapping.dmp
  • memory/1488-55-0x0000000074960000-0x0000000074F0B000-memory.dmp
    Filesize

    5.7MB

  • memory/1488-56-0x0000000074960000-0x0000000074F0B000-memory.dmp
    Filesize

    5.7MB

  • memory/1488-54-0x0000000075F01000-0x0000000075F03000-memory.dmp
    Filesize

    8KB