Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 20:09

General

  • Target

    Extreme.Injector.v2.4.5.-.by.master131.exe

  • Size

    164KB

  • MD5

    2fd45c4572749ca9537fde2dadf1b8dd

  • SHA1

    77fce1f2295d640962321c15e628f374525f6689

  • SHA256

    f370694edebc6fea374b0ff45057d3d81d697422972c51ec9a27ab531cd39b3b

  • SHA512

    7bfae6a212ddd96f58253960d5ddfdb217a1a39674e4927c43637a90466a841229303f080fbbce97e6dc30eb4b1b47909fa965072219ab6b35e7fd86e763a31f

  • SSDEEP

    3072:hodc4/cHmSPrcerD+fR6DBBLzy7zRJZGuQkIJ4gRqE2uIE28uEwBZSZbM1hePf:mdHeDtUZabmO

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Extreme.Injector.v2.4.5.-.by.master131.exe
    "C:\Users\Admin\AppData\Local\Temp\Extreme.Injector.v2.4.5.-.by.master131.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /Delete /tn NYANP /F
      2⤵
        PID:1136
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Extreme.Injector.v2.4.5.-.by.master131.exe" /sc minute /mo 5
        2⤵
        • Creates scheduled task(s)
        PID:4880
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Delete /tn NYAN /F
        2⤵
          PID:5008
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Extreme.Injector.v2.4.5.-.by.master131.exe" /sc minute /mo 1
          2⤵
          • Creates scheduled task(s)
          PID:1652
        • C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe
          "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe"
          2⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2252
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Delete /tn NYANP /F
            3⤵
              PID:4512
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe" /sc minute /mo 5
              3⤵
              • Creates scheduled task(s)
              PID:4676
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Delete /tn NYAN /F
              3⤵
                PID:4384
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe" /sc minute /mo 1
                3⤵
                • Creates scheduled task(s)
                PID:4336
              • C:\Users\Admin\AppData\Local\Temp\tmp7DE5.tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\tmp7DE5.tmp.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4460
                • C:\Users\Admin\AppData\Local\Temp\dump456\browser.exe
                  C:\Users\Admin\AppData\Local\Temp\\dump456\browser.exe -f C:\Users\Admin\AppData\Local\Temp\\dump456\pass1.txt
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4400
                • C:\Users\Admin\AppData\Local\Temp\dump456\email.exe
                  C:\Users\Admin\AppData\Local\Temp\\dump456\email.exe -f C:\Users\Admin\AppData\Local\Temp\\dump456\pass2.txt
                  4⤵
                  • Executes dropped EXE
                  • Accesses Microsoft Outlook accounts
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1400
          • C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe
            "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1160
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Delete /tn NYANP /F
              2⤵
                PID:4232
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe" /sc minute /mo 5
                2⤵
                • Creates scheduled task(s)
                PID:5088
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /Delete /tn NYAN /F
                2⤵
                  PID:3724
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe" /sc minute /mo 1
                  2⤵
                  • Creates scheduled task(s)
                  PID:3360
              • C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe
                "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:628
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Delete /tn NYANP /F
                  2⤵
                    PID:4972
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe" /sc minute /mo 5
                    2⤵
                    • Creates scheduled task(s)
                    PID:2336
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /Delete /tn NYAN /F
                    2⤵
                      PID:3324
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe" /sc minute /mo 1
                      2⤵
                      • Creates scheduled task(s)
                      PID:1652

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  3
                  T1081

                  Discovery

                  Query Registry

                  1
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Collection

                  Data from Local System

                  3
                  T1005

                  Email Collection

                  1
                  T1114

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Google Crash Handler.exe.log
                    Filesize

                    588B

                    MD5

                    e293216bc892a819986fbe64a0f8d0b4

                    SHA1

                    5152f6fec6914c0b0561d444837f79b8436f403c

                    SHA256

                    5185c5bb61a3163e462585f5016cafb6b957948cf1fdd72e700a8d437e84b787

                    SHA512

                    f78cb3635a06c7f94f11c60fac8b962df34784f166529db81022dc18b5e233449ae04e62ae0e9298d87646eedcb4e52c09d3ac2754ffaf98a277ce8916a953be

                  • C:\Users\Admin\AppData\Local\Temp\dump456\browser.exe
                    Filesize

                    439KB

                    MD5

                    10ae9f2eb3e7e79590493c47e39eb04b

                    SHA1

                    87490001bce150fd684e6ffe9343aa8f62dac963

                    SHA256

                    2a403b01727b1f8d2a7079427946f178c3c66dc17a00e6d1ab7547b11680d012

                    SHA512

                    764cd1f5f5466dbb55ec8ee1360ec8a8671468c761d3f70e2e9bc4f548e1d4bb920254abf68eb6c3c2a44bad7e9d7e7c205d4e316d3d0fdab2f2f55e398f9ea2

                  • C:\Users\Admin\AppData\Local\Temp\dump456\email.exe
                    Filesize

                    464KB

                    MD5

                    9b222f92f7c7da9287e5daa968638638

                    SHA1

                    99b8f6deaa13d04e9ec49a23eadbc9736209df26

                    SHA256

                    941d0b28c048462fcaad246d6c0721d261a18d233732bef9a900adfb29ad7364

                    SHA512

                    8ff915bda99d0ea3a5426c2f92c9f583af8a4aa162c3fddfe0734d7617135a1fa5f6a85ec5eae80a1f0b9f95e595e53998e3da262aa5bdc4489a0876010472e5

                  • C:\Users\Admin\AppData\Local\Temp\tmp7DE5.tmp.exe
                    Filesize

                    915KB

                    MD5

                    2e17223a079a3957be8009ebed5548fd

                    SHA1

                    63c6378d766db9b0a4a5cd960d9f5b6184d867e1

                    SHA256

                    eff6d9f2f2609be04c69339c21b69b77c6b2f9575ff1b8ea3218426032f28a29

                    SHA512

                    2b31424278b60708045e8ce4e3c7519fcf409aa755ccd8e942cdfee4e127112dbbf2f34e7e161cd511c21594b2679fd7c926848d7591f3283d4d9cb71f40a60f

                  • C:\Users\Admin\AppData\Local\Temp\tmp7DE5.tmp.exe
                    Filesize

                    915KB

                    MD5

                    2e17223a079a3957be8009ebed5548fd

                    SHA1

                    63c6378d766db9b0a4a5cd960d9f5b6184d867e1

                    SHA256

                    eff6d9f2f2609be04c69339c21b69b77c6b2f9575ff1b8ea3218426032f28a29

                    SHA512

                    2b31424278b60708045e8ce4e3c7519fcf409aa755ccd8e942cdfee4e127112dbbf2f34e7e161cd511c21594b2679fd7c926848d7591f3283d4d9cb71f40a60f

                  • C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe
                    Filesize

                    164KB

                    MD5

                    2fd45c4572749ca9537fde2dadf1b8dd

                    SHA1

                    77fce1f2295d640962321c15e628f374525f6689

                    SHA256

                    f370694edebc6fea374b0ff45057d3d81d697422972c51ec9a27ab531cd39b3b

                    SHA512

                    7bfae6a212ddd96f58253960d5ddfdb217a1a39674e4927c43637a90466a841229303f080fbbce97e6dc30eb4b1b47909fa965072219ab6b35e7fd86e763a31f

                  • C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe
                    Filesize

                    164KB

                    MD5

                    2fd45c4572749ca9537fde2dadf1b8dd

                    SHA1

                    77fce1f2295d640962321c15e628f374525f6689

                    SHA256

                    f370694edebc6fea374b0ff45057d3d81d697422972c51ec9a27ab531cd39b3b

                    SHA512

                    7bfae6a212ddd96f58253960d5ddfdb217a1a39674e4927c43637a90466a841229303f080fbbce97e6dc30eb4b1b47909fa965072219ab6b35e7fd86e763a31f

                  • C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe
                    Filesize

                    164KB

                    MD5

                    2fd45c4572749ca9537fde2dadf1b8dd

                    SHA1

                    77fce1f2295d640962321c15e628f374525f6689

                    SHA256

                    f370694edebc6fea374b0ff45057d3d81d697422972c51ec9a27ab531cd39b3b

                    SHA512

                    7bfae6a212ddd96f58253960d5ddfdb217a1a39674e4927c43637a90466a841229303f080fbbce97e6dc30eb4b1b47909fa965072219ab6b35e7fd86e763a31f

                  • C:\Users\Admin\AppData\Roaming\Google Crash Handler.exe
                    Filesize

                    164KB

                    MD5

                    2fd45c4572749ca9537fde2dadf1b8dd

                    SHA1

                    77fce1f2295d640962321c15e628f374525f6689

                    SHA256

                    f370694edebc6fea374b0ff45057d3d81d697422972c51ec9a27ab531cd39b3b

                    SHA512

                    7bfae6a212ddd96f58253960d5ddfdb217a1a39674e4927c43637a90466a841229303f080fbbce97e6dc30eb4b1b47909fa965072219ab6b35e7fd86e763a31f

                  • memory/628-172-0x0000000075470000-0x0000000075A21000-memory.dmp
                    Filesize

                    5.7MB

                  • memory/628-162-0x0000000075470000-0x0000000075A21000-memory.dmp
                    Filesize

                    5.7MB

                  • memory/1136-133-0x0000000000000000-mapping.dmp
                  • memory/1160-153-0x0000000075470000-0x0000000075A21000-memory.dmp
                    Filesize

                    5.7MB

                  • memory/1160-148-0x0000000075470000-0x0000000075A21000-memory.dmp
                    Filesize

                    5.7MB

                  • memory/1400-167-0x0000000000000000-mapping.dmp
                  • memory/1400-171-0x0000000000400000-0x00000000004EC000-memory.dmp
                    Filesize

                    944KB

                  • memory/1400-170-0x0000000000400000-0x00000000004EC000-memory.dmp
                    Filesize

                    944KB

                  • memory/1652-163-0x0000000000000000-mapping.dmp
                  • memory/1652-136-0x0000000000000000-mapping.dmp
                  • memory/2252-146-0x0000000075470000-0x0000000075A21000-memory.dmp
                    Filesize

                    5.7MB

                  • memory/2252-137-0x0000000000000000-mapping.dmp
                  • memory/2252-140-0x0000000075470000-0x0000000075A21000-memory.dmp
                    Filesize

                    5.7MB

                  • memory/2336-160-0x0000000000000000-mapping.dmp
                  • memory/3324-161-0x0000000000000000-mapping.dmp
                  • memory/3360-152-0x0000000000000000-mapping.dmp
                  • memory/3404-132-0x0000000075470000-0x0000000075A21000-memory.dmp
                    Filesize

                    5.7MB

                  • memory/3404-141-0x0000000075470000-0x0000000075A21000-memory.dmp
                    Filesize

                    5.7MB

                  • memory/3724-151-0x0000000000000000-mapping.dmp
                  • memory/4232-149-0x0000000000000000-mapping.dmp
                  • memory/4336-145-0x0000000000000000-mapping.dmp
                  • memory/4384-144-0x0000000000000000-mapping.dmp
                  • memory/4400-169-0x0000000000400000-0x00000000004FA000-memory.dmp
                    Filesize

                    1000KB

                  • memory/4400-165-0x0000000000000000-mapping.dmp
                  • memory/4400-173-0x0000000000400000-0x00000000004FA000-memory.dmp
                    Filesize

                    1000KB

                  • memory/4460-164-0x00007FFFEC080000-0x00007FFFECAB6000-memory.dmp
                    Filesize

                    10.2MB

                  • memory/4460-154-0x0000000000000000-mapping.dmp
                  • memory/4512-142-0x0000000000000000-mapping.dmp
                  • memory/4676-143-0x0000000000000000-mapping.dmp
                  • memory/4880-134-0x0000000000000000-mapping.dmp
                  • memory/4972-159-0x0000000000000000-mapping.dmp
                  • memory/5008-135-0x0000000000000000-mapping.dmp
                  • memory/5088-150-0x0000000000000000-mapping.dmp