Analysis
-
max time kernel
152s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 01:36
Behavioral task
behavioral1
Sample
53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe
Resource
win10v2004-20220812-en
General
-
Target
53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe
-
Size
23KB
-
MD5
da9a6053b0c21356a12cb86001190bd4
-
SHA1
3682233a01539815dbe30aec1b44cfc5e9fe6281
-
SHA256
53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6
-
SHA512
642d95db01ed9c064abf942c397d8fed95e05b9fd70ddec853113690924b48e2906428360a35eb2da99c8cfcadbeaac53a4d14264a25cc58514ca514c0e4005a
-
SSDEEP
384:w3gexUw/L+JrgUon5b9uSDMwT9Pfg6NgrWoBYi51mRvR6JZlbw8hqIusZzZIV8:WIAKG91DP1hPRpcnuI
Malware Config
Extracted
njrat
0.7d
Brave Hacker
danamuhammad12.no-ip.org:5445
633b9b049c9c827e222f5f2505e9c87a
-
reg_key
633b9b049c9c827e222f5f2505e9c87a
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1768 dwm.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1780 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1396 53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\633b9b049c9c827e222f5f2505e9c87a = "\"C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe\" .." dwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\633b9b049c9c827e222f5f2505e9c87a = "\"C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe\" .." dwm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1768 dwm.exe Token: 33 1768 dwm.exe Token: SeIncBasePriorityPrivilege 1768 dwm.exe Token: 33 1768 dwm.exe Token: SeIncBasePriorityPrivilege 1768 dwm.exe Token: 33 1768 dwm.exe Token: SeIncBasePriorityPrivilege 1768 dwm.exe Token: 33 1768 dwm.exe Token: SeIncBasePriorityPrivilege 1768 dwm.exe Token: 33 1768 dwm.exe Token: SeIncBasePriorityPrivilege 1768 dwm.exe Token: 33 1768 dwm.exe Token: SeIncBasePriorityPrivilege 1768 dwm.exe Token: 33 1768 dwm.exe Token: SeIncBasePriorityPrivilege 1768 dwm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1768 1396 53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe 27 PID 1396 wrote to memory of 1768 1396 53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe 27 PID 1396 wrote to memory of 1768 1396 53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe 27 PID 1396 wrote to memory of 1768 1396 53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe 27 PID 1768 wrote to memory of 1780 1768 dwm.exe 28 PID 1768 wrote to memory of 1780 1768 dwm.exe 28 PID 1768 wrote to memory of 1780 1768 dwm.exe 28 PID 1768 wrote to memory of 1780 1768 dwm.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe"C:\Users\Admin\AppData\Local\Temp\53d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\dwm.exe"C:\Users\Admin\AppData\Roaming\dwm.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\dwm.exe" "dwm.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5da9a6053b0c21356a12cb86001190bd4
SHA13682233a01539815dbe30aec1b44cfc5e9fe6281
SHA25653d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6
SHA512642d95db01ed9c064abf942c397d8fed95e05b9fd70ddec853113690924b48e2906428360a35eb2da99c8cfcadbeaac53a4d14264a25cc58514ca514c0e4005a
-
Filesize
23KB
MD5da9a6053b0c21356a12cb86001190bd4
SHA13682233a01539815dbe30aec1b44cfc5e9fe6281
SHA25653d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6
SHA512642d95db01ed9c064abf942c397d8fed95e05b9fd70ddec853113690924b48e2906428360a35eb2da99c8cfcadbeaac53a4d14264a25cc58514ca514c0e4005a
-
Filesize
23KB
MD5da9a6053b0c21356a12cb86001190bd4
SHA13682233a01539815dbe30aec1b44cfc5e9fe6281
SHA25653d0648c30649884788e71df7dcae60ff57c72707e5716402212a85f9aecf8b6
SHA512642d95db01ed9c064abf942c397d8fed95e05b9fd70ddec853113690924b48e2906428360a35eb2da99c8cfcadbeaac53a4d14264a25cc58514ca514c0e4005a