Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-12-2022 13:19
Behavioral task
behavioral1
Sample
32ecbfcd1b769c857657f0455bfae8de.exe
Resource
win7-20220812-en
General
-
Target
32ecbfcd1b769c857657f0455bfae8de.exe
-
Size
37KB
-
MD5
32ecbfcd1b769c857657f0455bfae8de
-
SHA1
23f3a0fa867d4655d5b60af33494426c1c26980a
-
SHA256
81bd058bdfbfc79e61c1886729fb82f958fec8d935f94a719e42d5cf41282e81
-
SHA512
cb61ee071ed5d47e71100198bf52099005c4af8ab91252212a5fdf5400bc987519d9c4447a09edb9c810961b989791acfffe136a2ade4206c60689b4e22c91ef
-
SSDEEP
384:CkG23hUidkGXR21cGMy8Pqq53tGFlymkirAF+rMRTyN/0L+EcoinblneHQM3epz3:rG23ZLGv8Pqq58imHrM+rMRa8NuImt
Malware Config
Extracted
njrat
im523
HacKed
211.213.183.65:8639
831c90d817bdd09912ba4f08d8a5468b
-
reg_key
831c90d817bdd09912ba4f08d8a5468b
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1972 system.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2040 netsh.exe -
Loads dropped DLL 1 IoCs
pid Process 1088 32ecbfcd1b769c857657f0455bfae8de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe Token: 33 1972 system.exe Token: SeIncBasePriorityPrivilege 1972 system.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1972 1088 32ecbfcd1b769c857657f0455bfae8de.exe 27 PID 1088 wrote to memory of 1972 1088 32ecbfcd1b769c857657f0455bfae8de.exe 27 PID 1088 wrote to memory of 1972 1088 32ecbfcd1b769c857657f0455bfae8de.exe 27 PID 1088 wrote to memory of 1972 1088 32ecbfcd1b769c857657f0455bfae8de.exe 27 PID 1972 wrote to memory of 2040 1972 system.exe 28 PID 1972 wrote to memory of 2040 1972 system.exe 28 PID 1972 wrote to memory of 2040 1972 system.exe 28 PID 1972 wrote to memory of 2040 1972 system.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\32ecbfcd1b769c857657f0455bfae8de.exe"C:\Users\Admin\AppData\Local\Temp\32ecbfcd1b769c857657f0455bfae8de.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\system.exe"C:\Users\Admin\AppData\Local\Temp\system.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\system.exe" "system.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD532ecbfcd1b769c857657f0455bfae8de
SHA123f3a0fa867d4655d5b60af33494426c1c26980a
SHA25681bd058bdfbfc79e61c1886729fb82f958fec8d935f94a719e42d5cf41282e81
SHA512cb61ee071ed5d47e71100198bf52099005c4af8ab91252212a5fdf5400bc987519d9c4447a09edb9c810961b989791acfffe136a2ade4206c60689b4e22c91ef
-
Filesize
37KB
MD532ecbfcd1b769c857657f0455bfae8de
SHA123f3a0fa867d4655d5b60af33494426c1c26980a
SHA25681bd058bdfbfc79e61c1886729fb82f958fec8d935f94a719e42d5cf41282e81
SHA512cb61ee071ed5d47e71100198bf52099005c4af8ab91252212a5fdf5400bc987519d9c4447a09edb9c810961b989791acfffe136a2ade4206c60689b4e22c91ef
-
Filesize
37KB
MD532ecbfcd1b769c857657f0455bfae8de
SHA123f3a0fa867d4655d5b60af33494426c1c26980a
SHA25681bd058bdfbfc79e61c1886729fb82f958fec8d935f94a719e42d5cf41282e81
SHA512cb61ee071ed5d47e71100198bf52099005c4af8ab91252212a5fdf5400bc987519d9c4447a09edb9c810961b989791acfffe136a2ade4206c60689b4e22c91ef