Analysis

  • max time kernel
    115s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 15:18

General

  • Target

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279.exe

  • Size

    873KB

  • MD5

    592d7e07011a75a47ad84b4a0054222a

  • SHA1

    a1e0f2ac27f6e9e749061b7070620c549b3769f2

  • SHA256

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279

  • SHA512

    cc8ae98b0fa0a46c10c71676007738ddd5867f6beb9ba0e748b7907a508b5f719014e4c4855f72ff5f15808f286daf17c5853134a432b5d4715f0502af5de0fc

  • SSDEEP

    12288:Ztb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSga1lSOD6A:Ztb20pkaCqT5TBWgNQ7aXSOD6A

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Em

C2

markben390.no-ip.org:1337

Mutex

9fef715de4fae73de5b4a6c7f69fe158

Attributes
  • reg_key

    9fef715de4fae73de5b4a6c7f69fe158

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279.exe
    "C:\Users\Admin\AppData\Local\Temp\d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279.exe
      C:\Users\Admin\AppData\Local\Temp\d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\b" "C:\Users\Admin\AppData\Local\Temp\d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Users\Admin\AppData\Roaming\sample.exe
        "C:\Users\Admin\AppData\Roaming\sample.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Users\Admin\AppData\Roaming\sample.exe
          C:\Users\Admin\AppData\Roaming\sample.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\b" "C:\Users\Admin\AppData\Roaming\sample.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:848
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\SysWOW64\explorer.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1448
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=explorer.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:552
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:552 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\56.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 0127.0.0.1
          4⤵
          • Runs ping.exe
          PID:1588

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\56.bat
    Filesize

    178B

    MD5

    d0d6d2e2f9c2ff14f7874631fe870dfc

    SHA1

    2d3e7904d580a3ccf21666378e083358e4fe5e75

    SHA256

    fcc206bbfb772dce7713c0332b2eff08f3b9b70b53e981cc2ace5282b3ec72df

    SHA512

    99923f86491e9a8ccc8c3f30c4c84e7d19ef3050b83741cbe19272b12da40ce3d78297ebf806f90b0b939b452fc8344a2a5b29dbd098e08cd3cee9260a35939d

  • C:\Users\Admin\AppData\Local\Temp\a
    Filesize

    18KB

    MD5

    f18121b898e05f564b846a37911bcf6b

    SHA1

    04e0d1b2a0ecb5533f5ca4597fbf9ef606f0cf39

    SHA256

    067d5b113825bc6c093aa4615773d936913030f219d46b3fed1a32e776aac3ee

    SHA512

    bed3cd08229cb909211a9b2b3f94fd9d161718f830dd80a9192d78c76b25533eb9436cc64f218d1bedc31bbb1d8fafcbcbfb60dfb587078be3dffe8b6cef89b0

  • C:\Users\Admin\AppData\Local\Temp\b
    Filesize

    18KB

    MD5

    77d9d3140a39defd71f6986ffe6caf72

    SHA1

    f37f821dfc246db6ed000a1b4860f3b6447b1e49

    SHA256

    6813ccecb375f7885ff2f15ab735c4c1fd73201b2c60f709a2d616e870c8c5b2

    SHA512

    2bec4160fe9fc336c5ea3386942d48a3c3a3f95e39c709a5ff0dbbcf9ad806ad2846fec6060c86120d33228b9530e17860e30425cd8ab581aee6743efaefc154

  • C:\Users\Admin\AppData\Local\Temp\b
    Filesize

    18KB

    MD5

    77d9d3140a39defd71f6986ffe6caf72

    SHA1

    f37f821dfc246db6ed000a1b4860f3b6447b1e49

    SHA256

    6813ccecb375f7885ff2f15ab735c4c1fd73201b2c60f709a2d616e870c8c5b2

    SHA512

    2bec4160fe9fc336c5ea3386942d48a3c3a3f95e39c709a5ff0dbbcf9ad806ad2846fec6060c86120d33228b9530e17860e30425cd8ab581aee6743efaefc154

  • C:\Users\Admin\AppData\Local\Temp\incl1
    Filesize

    12KB

    MD5

    2ca76a6543e1e644d5eec2a8620149d2

    SHA1

    42a03dfd435742c27da9997f71df44f7ab7d3c8d

    SHA256

    4ed7f61d00ca189aa15394ddbbee18afb8196509b23ce736646dbca8a84d9f37

    SHA512

    247d42a210e6c1d5185e96e94942871a76df598f8faf07ee59bd7c40349210a07fe492865d9dbefd27965828d2deed50af0dd6a17e30c93196a43dccc3a01761

  • C:\Users\Admin\AppData\Local\Temp\incl1
    Filesize

    12KB

    MD5

    2ca76a6543e1e644d5eec2a8620149d2

    SHA1

    42a03dfd435742c27da9997f71df44f7ab7d3c8d

    SHA256

    4ed7f61d00ca189aa15394ddbbee18afb8196509b23ce736646dbca8a84d9f37

    SHA512

    247d42a210e6c1d5185e96e94942871a76df598f8faf07ee59bd7c40349210a07fe492865d9dbefd27965828d2deed50af0dd6a17e30c93196a43dccc3a01761

  • C:\Users\Admin\AppData\Local\Temp\incl2
    Filesize

    23KB

    MD5

    c16384325859a47d6ce4e3e1fd4b43da

    SHA1

    7ba02c640a08688568e42dc2e5e7237562b077ea

    SHA256

    f6b3d2320e6e8666accf3637f100b70816275e354acfca56856b559544b02194

    SHA512

    70188378d5082d6427d5dc340ac5ca0c03ceef870b26b8f5a724ba17d14b4ba78c6483ae608da6c2e2d83d92ebc5068c37b206393888ef49f1cf34246a842deb

  • C:\Users\Admin\AppData\Local\Temp\incl2
    Filesize

    23KB

    MD5

    c16384325859a47d6ce4e3e1fd4b43da

    SHA1

    7ba02c640a08688568e42dc2e5e7237562b077ea

    SHA256

    f6b3d2320e6e8666accf3637f100b70816275e354acfca56856b559544b02194

    SHA512

    70188378d5082d6427d5dc340ac5ca0c03ceef870b26b8f5a724ba17d14b4ba78c6483ae608da6c2e2d83d92ebc5068c37b206393888ef49f1cf34246a842deb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\E0PTDS64.txt
    Filesize

    601B

    MD5

    b61208d68ecfa8c8abfcc00dbb925db8

    SHA1

    a659483d6488ac3dce74dfedb587c724a2db2967

    SHA256

    6a9de8ef5ac6190525756f496b235cdd8d05f444620ac19ecd06bd404a32ec27

    SHA512

    81099dd50a48669e7cd8f5cd1897b57ac9ea68264025733f613ef02781a95619adcec8522018f91c18e0b99aaababdcda63f614cc919051d08aa9fa003530dd3

  • C:\Users\Admin\AppData\Roaming\sample.exe
    Filesize

    873KB

    MD5

    592d7e07011a75a47ad84b4a0054222a

    SHA1

    a1e0f2ac27f6e9e749061b7070620c549b3769f2

    SHA256

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279

    SHA512

    cc8ae98b0fa0a46c10c71676007738ddd5867f6beb9ba0e748b7907a508b5f719014e4c4855f72ff5f15808f286daf17c5853134a432b5d4715f0502af5de0fc

  • C:\Users\Admin\AppData\Roaming\sample.exe
    Filesize

    873KB

    MD5

    592d7e07011a75a47ad84b4a0054222a

    SHA1

    a1e0f2ac27f6e9e749061b7070620c549b3769f2

    SHA256

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279

    SHA512

    cc8ae98b0fa0a46c10c71676007738ddd5867f6beb9ba0e748b7907a508b5f719014e4c4855f72ff5f15808f286daf17c5853134a432b5d4715f0502af5de0fc

  • C:\Users\Admin\AppData\Roaming\sample.exe
    Filesize

    873KB

    MD5

    592d7e07011a75a47ad84b4a0054222a

    SHA1

    a1e0f2ac27f6e9e749061b7070620c549b3769f2

    SHA256

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279

    SHA512

    cc8ae98b0fa0a46c10c71676007738ddd5867f6beb9ba0e748b7907a508b5f719014e4c4855f72ff5f15808f286daf17c5853134a432b5d4715f0502af5de0fc

  • \Users\Admin\AppData\Roaming\sample.exe
    Filesize

    873KB

    MD5

    592d7e07011a75a47ad84b4a0054222a

    SHA1

    a1e0f2ac27f6e9e749061b7070620c549b3769f2

    SHA256

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279

    SHA512

    cc8ae98b0fa0a46c10c71676007738ddd5867f6beb9ba0e748b7907a508b5f719014e4c4855f72ff5f15808f286daf17c5853134a432b5d4715f0502af5de0fc

  • \Users\Admin\AppData\Roaming\sample.exe
    Filesize

    873KB

    MD5

    592d7e07011a75a47ad84b4a0054222a

    SHA1

    a1e0f2ac27f6e9e749061b7070620c549b3769f2

    SHA256

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279

    SHA512

    cc8ae98b0fa0a46c10c71676007738ddd5867f6beb9ba0e748b7907a508b5f719014e4c4855f72ff5f15808f286daf17c5853134a432b5d4715f0502af5de0fc

  • \Users\Admin\AppData\Roaming\sample.exe
    Filesize

    873KB

    MD5

    592d7e07011a75a47ad84b4a0054222a

    SHA1

    a1e0f2ac27f6e9e749061b7070620c549b3769f2

    SHA256

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279

    SHA512

    cc8ae98b0fa0a46c10c71676007738ddd5867f6beb9ba0e748b7907a508b5f719014e4c4855f72ff5f15808f286daf17c5853134a432b5d4715f0502af5de0fc

  • \Users\Admin\AppData\Roaming\sample.exe
    Filesize

    873KB

    MD5

    592d7e07011a75a47ad84b4a0054222a

    SHA1

    a1e0f2ac27f6e9e749061b7070620c549b3769f2

    SHA256

    d7bb2d4aa5180fea7d4d83ead4c1b58e7ba57b02166b94c2581391a43b2ba279

    SHA512

    cc8ae98b0fa0a46c10c71676007738ddd5867f6beb9ba0e748b7907a508b5f719014e4c4855f72ff5f15808f286daf17c5853134a432b5d4715f0502af5de0fc

  • memory/608-55-0x0000000000000000-mapping.dmp
  • memory/848-70-0x0000000000000000-mapping.dmp
  • memory/940-62-0x0000000000000000-mapping.dmp
  • memory/1348-54-0x00000000750A1000-0x00000000750A3000-memory.dmp
    Filesize

    8KB

  • memory/1448-78-0x00000000000C0000-0x00000000000CC000-memory.dmp
    Filesize

    48KB

  • memory/1448-80-0x00000000000C0000-0x00000000000CC000-memory.dmp
    Filesize

    48KB

  • memory/1448-81-0x00000000000C747E-mapping.dmp
  • memory/1448-83-0x00000000000C0000-0x00000000000CC000-memory.dmp
    Filesize

    48KB

  • memory/1448-85-0x00000000000C0000-0x00000000000CC000-memory.dmp
    Filesize

    48KB

  • memory/1588-75-0x0000000000000000-mapping.dmp
  • memory/1780-69-0x0000000000000000-mapping.dmp