Analysis
-
max time kernel
189s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe
Resource
win10v2004-20221111-en
General
-
Target
0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe
-
Size
366KB
-
MD5
a14b4405f4f6bbdecd95dfe12f6a8fc3
-
SHA1
e05fa32c6b856ce97a6c72c522e3c344fdd387c3
-
SHA256
0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60
-
SHA512
9f2af3a349ca33fd2f68476fa87cc50ce7143c653daee55e41fe9deb980d208b320c8baa1248a2af037a2d826a6e5d6e648d87110c51f7c0159dd52e991dfa90
-
SSDEEP
6144:CuNUGc+PIaSgm56pWiifTdy0v50Cb6Vku0XiPClM7NNnpy1NqX07rA7b:hJc+P6r5CWinMHCZgWNNnw1NqE7rC
Malware Config
Extracted
njrat
0.6.4
XxxRIEZOaaXXX
hasvan212.ddns.net:81
5f805e177fa7c673482c92c255460b67
-
reg_key
5f805e177fa7c673482c92c255460b67
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
tMDpNGrjCCImVvEL6KWU.exeSystem.exepid process 1508 tMDpNGrjCCImVvEL6KWU.exe 580 System.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 2 IoCs
Processes:
System.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5f805e177fa7c673482c92c255460b67.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5f805e177fa7c673482c92c255460b67.exe System.exe -
Loads dropped DLL 2 IoCs
Processes:
0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exetMDpNGrjCCImVvEL6KWU.exepid process 1412 0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe 1508 tMDpNGrjCCImVvEL6KWU.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
System.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5f805e177fa7c673482c92c255460b67 = "\"C:\\Users\\Admin\\AppData\\Roaming\\System.exe\" .." System.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\5f805e177fa7c673482c92c255460b67 = "\"C:\\Users\\Admin\\AppData\\Roaming\\System.exe\" .." System.exe -
Drops file in Windows directory 2 IoCs
Processes:
0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new 0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new 0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
System.exepid process 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe 580 System.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
System.exedescription pid process Token: SeDebugPrivilege 580 System.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exetMDpNGrjCCImVvEL6KWU.exeSystem.exedescription pid process target process PID 1412 wrote to memory of 1508 1412 0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe tMDpNGrjCCImVvEL6KWU.exe PID 1412 wrote to memory of 1508 1412 0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe tMDpNGrjCCImVvEL6KWU.exe PID 1412 wrote to memory of 1508 1412 0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe tMDpNGrjCCImVvEL6KWU.exe PID 1412 wrote to memory of 1508 1412 0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe tMDpNGrjCCImVvEL6KWU.exe PID 1508 wrote to memory of 580 1508 tMDpNGrjCCImVvEL6KWU.exe System.exe PID 1508 wrote to memory of 580 1508 tMDpNGrjCCImVvEL6KWU.exe System.exe PID 1508 wrote to memory of 580 1508 tMDpNGrjCCImVvEL6KWU.exe System.exe PID 1508 wrote to memory of 580 1508 tMDpNGrjCCImVvEL6KWU.exe System.exe PID 580 wrote to memory of 1652 580 System.exe netsh.exe PID 580 wrote to memory of 1652 580 System.exe netsh.exe PID 580 wrote to memory of 1652 580 System.exe netsh.exe PID 580 wrote to memory of 1652 580 System.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe"C:\Users\Admin\AppData\Local\Temp\0ce8e23976298201accb8f85d6283730b86c53b23e597f8a81809eccf7b5aa60.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tMDpNGrjCCImVvEL6KWU.exe"C:\Users\Admin\AppData\Local\Temp\tMDpNGrjCCImVvEL6KWU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\System.exe" "System.exe" ENABLE4⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tMDpNGrjCCImVvEL6KWU.exeFilesize
60KB
MD51de56f2dea95b4bc492237c826f48797
SHA1e055599b87286ecd686611b711bbe27227795aa6
SHA25636b37310012809b7dc90ebed7c016060c90069630c93297ed293dc24f876baf5
SHA512b764a92275a757e006a6c1166124666f571762611e3f703c231ba0d3e5ab813f954481912ceb35ecfd9e3e1f672f176e34915c4f7c88cfe3117f7502d3c50ee2
-
C:\Users\Admin\AppData\Local\Temp\tMDpNGrjCCImVvEL6KWU.exeFilesize
60KB
MD51de56f2dea95b4bc492237c826f48797
SHA1e055599b87286ecd686611b711bbe27227795aa6
SHA25636b37310012809b7dc90ebed7c016060c90069630c93297ed293dc24f876baf5
SHA512b764a92275a757e006a6c1166124666f571762611e3f703c231ba0d3e5ab813f954481912ceb35ecfd9e3e1f672f176e34915c4f7c88cfe3117f7502d3c50ee2
-
C:\Users\Admin\AppData\Roaming\System.exeFilesize
60KB
MD51de56f2dea95b4bc492237c826f48797
SHA1e055599b87286ecd686611b711bbe27227795aa6
SHA25636b37310012809b7dc90ebed7c016060c90069630c93297ed293dc24f876baf5
SHA512b764a92275a757e006a6c1166124666f571762611e3f703c231ba0d3e5ab813f954481912ceb35ecfd9e3e1f672f176e34915c4f7c88cfe3117f7502d3c50ee2
-
C:\Users\Admin\AppData\Roaming\System.exeFilesize
60KB
MD51de56f2dea95b4bc492237c826f48797
SHA1e055599b87286ecd686611b711bbe27227795aa6
SHA25636b37310012809b7dc90ebed7c016060c90069630c93297ed293dc24f876baf5
SHA512b764a92275a757e006a6c1166124666f571762611e3f703c231ba0d3e5ab813f954481912ceb35ecfd9e3e1f672f176e34915c4f7c88cfe3117f7502d3c50ee2
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cchFilesize
514B
MD50a53071e97c95ae1ae3a1be17a8a34fd
SHA1e88a36b828a5b69526165ed452aaf454ab2261a3
SHA25684984e8d2acd039020759528c7d8b5328564ffe25f4ceb6ca278419b66cb715b
SHA51249b956192005d395c7ee317571f7808bc406f11d22866bbb7cd2520350ab69d6387ec91f2cf91e39316d19a2e1cc0f6bb8ba997fe238a22041232eacc652fd42
-
\Users\Admin\AppData\Local\Temp\tMDpNGrjCCImVvEL6KWU.exeFilesize
60KB
MD51de56f2dea95b4bc492237c826f48797
SHA1e055599b87286ecd686611b711bbe27227795aa6
SHA25636b37310012809b7dc90ebed7c016060c90069630c93297ed293dc24f876baf5
SHA512b764a92275a757e006a6c1166124666f571762611e3f703c231ba0d3e5ab813f954481912ceb35ecfd9e3e1f672f176e34915c4f7c88cfe3117f7502d3c50ee2
-
\Users\Admin\AppData\Roaming\System.exeFilesize
60KB
MD51de56f2dea95b4bc492237c826f48797
SHA1e055599b87286ecd686611b711bbe27227795aa6
SHA25636b37310012809b7dc90ebed7c016060c90069630c93297ed293dc24f876baf5
SHA512b764a92275a757e006a6c1166124666f571762611e3f703c231ba0d3e5ab813f954481912ceb35ecfd9e3e1f672f176e34915c4f7c88cfe3117f7502d3c50ee2
-
memory/580-64-0x0000000000000000-mapping.dmp
-
memory/580-69-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/580-74-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1412-54-0x0000000075091000-0x0000000075093000-memory.dmpFilesize
8KB
-
memory/1412-56-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1412-55-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1412-71-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1508-62-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1508-58-0x0000000000000000-mapping.dmp
-
memory/1508-70-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1652-72-0x0000000000000000-mapping.dmp