Analysis
-
max time kernel
154s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe
Resource
win7-20221111-en
General
-
Target
089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe
-
Size
2.3MB
-
MD5
686df444b5aba01a73b427ce6e1457ae
-
SHA1
0c8fbdfa9f81585f0a7752ad0175ddb317bb24d7
-
SHA256
089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1
-
SHA512
159e766a9f8a673f5964c9f27654c0833d2a9162bc53e070351e932206c3a962937b12835efa556e06de48e43924da2903ff83dca6514fe3df2fe0db121e9ec0
-
SSDEEP
24576:pwYZ4kGOYTnTDolUaNcTkkD9iSe87AAFmHs205LvLTV:uYpYTTDoXNcVoSe87FFmHB05Lv
Malware Config
Extracted
njrat
0.7d
victime
achiille1607b.no-ip.biz:1177
4d8f1dc021f465efab135a3c3a22d781
-
reg_key
4d8f1dc021f465efab135a3c3a22d781
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
taskhost.exetaskhost.exepid process 4796 taskhost.exe 1644 taskhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exetaskhost.exedescription pid process target process PID 4916 set thread context of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4796 set thread context of 1644 4796 taskhost.exe taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4408 1644 WerFault.exe taskhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exetaskhost.exedescription pid process Token: SeDebugPrivilege 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe Token: SeDebugPrivilege 4796 taskhost.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
taskhost.exepid process 1644 taskhost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exetaskhost.exedescription pid process target process PID 4916 wrote to memory of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4916 wrote to memory of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4916 wrote to memory of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4916 wrote to memory of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4916 wrote to memory of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4916 wrote to memory of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4916 wrote to memory of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4916 wrote to memory of 4532 4916 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe PID 4532 wrote to memory of 4796 4532 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe taskhost.exe PID 4532 wrote to memory of 4796 4532 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe taskhost.exe PID 4532 wrote to memory of 4796 4532 089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe taskhost.exe PID 4796 wrote to memory of 1644 4796 taskhost.exe taskhost.exe PID 4796 wrote to memory of 1644 4796 taskhost.exe taskhost.exe PID 4796 wrote to memory of 1644 4796 taskhost.exe taskhost.exe PID 4796 wrote to memory of 1644 4796 taskhost.exe taskhost.exe PID 4796 wrote to memory of 1644 4796 taskhost.exe taskhost.exe PID 4796 wrote to memory of 1644 4796 taskhost.exe taskhost.exe PID 4796 wrote to memory of 1644 4796 taskhost.exe taskhost.exe PID 4796 wrote to memory of 1644 4796 taskhost.exe taskhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe"C:\Users\Admin\AppData\Local\Temp\089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exeC:\Users\Admin\AppData\Local\Temp\089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exeC:\Users\Admin\AppData\Local\Temp\taskhost.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1644 -ip 16441⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1.exe.logFilesize
522B
MD50f39d6b9afc039d81ff31f65cbf76826
SHA18356d04fe7bba2695d59b6caf5c59f58f3e1a6d8
SHA256ea16b63ffd431ebf658b903710b6b3a9b8a2eb6814eee3a53b707a342780315d
SHA5125bad54adb2e32717ef6275f49e2f101dd7e2011c9be14a32e5c29051e8a3f608cbd0b44ac4855ab21e790cb7a5d84c5f69de087074fd01b35259d34d07f5aaf9
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exeFilesize
2.3MB
MD5686df444b5aba01a73b427ce6e1457ae
SHA10c8fbdfa9f81585f0a7752ad0175ddb317bb24d7
SHA256089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1
SHA512159e766a9f8a673f5964c9f27654c0833d2a9162bc53e070351e932206c3a962937b12835efa556e06de48e43924da2903ff83dca6514fe3df2fe0db121e9ec0
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exeFilesize
2.3MB
MD5686df444b5aba01a73b427ce6e1457ae
SHA10c8fbdfa9f81585f0a7752ad0175ddb317bb24d7
SHA256089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1
SHA512159e766a9f8a673f5964c9f27654c0833d2a9162bc53e070351e932206c3a962937b12835efa556e06de48e43924da2903ff83dca6514fe3df2fe0db121e9ec0
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exeFilesize
2.3MB
MD5686df444b5aba01a73b427ce6e1457ae
SHA10c8fbdfa9f81585f0a7752ad0175ddb317bb24d7
SHA256089591f99c69e6171f1cdf225fbf69c7fd35eea67cf6a6e7c87651484378f5d1
SHA512159e766a9f8a673f5964c9f27654c0833d2a9162bc53e070351e932206c3a962937b12835efa556e06de48e43924da2903ff83dca6514fe3df2fe0db121e9ec0
-
memory/1644-141-0x0000000000000000-mapping.dmp
-
memory/4532-134-0x0000000000000000-mapping.dmp
-
memory/4532-135-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4532-137-0x0000000006020000-0x00000000065C4000-memory.dmpFilesize
5.6MB
-
memory/4796-138-0x0000000000000000-mapping.dmp
-
memory/4916-132-0x0000000000010000-0x000000000025A000-memory.dmpFilesize
2.3MB
-
memory/4916-133-0x0000000004BF0000-0x0000000004C8C000-memory.dmpFilesize
624KB