Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2022 18:48

General

  • Target

    Server.exe

  • Size

    806KB

  • MD5

    c0db2c222008fee946d5b2ba4fb157b2

  • SHA1

    d239a776d1a56423950b05a8dfa48baad49b4806

  • SHA256

    dfd1bee3ed292173e7227059431ec28a4bb3f66eb21bc4553737d71715282669

  • SHA512

    b6c7c9652b62db2fe92e810b71c88a463bd9a59adb4f58980a03ca57e1209f5cd94df278cfc54882ac718b7be0abbc338cc0cfec38c2874e107f37a99c6d4430

  • SSDEEP

    12288:8Jy90Zzik406D2jedlhjpRftS7ibdoQzzIVlFFpmub4IjpRbQMbP6kz3:Oyoin06D2adrjpRocoQHIVjZNFQMbnT

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Pr0xed

C2

FRANSESCOzcuNzcuFRANSESCOjFRANSESCO5LjIzOQStrikStrik:NDI0MjA=

Mutex

30d8b46abd9407809a9e0bb4c05a740d

Attributes
  • reg_key

    30d8b46abd9407809a9e0bb4c05a740d

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    "C:\Users\Admin\AppData\Local\Temp\Server.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\certutil.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\certutil.exe -decode Server.txt server.exe
      2⤵
      • Executes dropped EXE
      PID:2432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:4932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.txt

    Filesize

    127KB

    MD5

    579895661055541b4ae1475641b088ae

    SHA1

    97bf7f9e0e3927991ba82e5a6bf1a997c57245ef

    SHA256

    0e16eac31e4255b5ea78f45dcb3ba1c5c26b309a180e98d4bf65d418a7d859a5

    SHA512

    700e0f9ad6dcf505bfa36c2ef6ce86251da021251a9515f947589eec1c164bc4493c619005aece81fc02a58f5e3b3183a2613441afcfac953c84a7dfe5d92299

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\certutil.exe

    Filesize

    1.6MB

    MD5

    e376b07aa887a6085ceae9be62ac9c37

    SHA1

    0545039e26171b2cdbe6039723b41676e2d3f796

    SHA256

    48922bb6498c432dd248cd337f4dcee0bfe77ee3ecbb1f8020d6db1f135e8e00

    SHA512

    c302584db2ab2593baad9cf52315f2d31407714db659ba1b2743512fe95faadf8325363a2bee2623caf5136c0f4697298f9feed8244ac439958a755121102152

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

    Filesize

    93KB

    MD5

    69686b88086881484710cfd02aeea412

    SHA1

    4b970e642a5778d3d2b1d5dcf6afecd8b5a753a7

    SHA256

    8349e0f5c041462dac6c31045356fbe90842bdbeeea5823b8c32c3c9a9e9003a

    SHA512

    3a9748e1eede226ed8dde30809425df80a7cf82291937c80d82307cf1b456b545cd94d301d526b2508af2db91d59ddeca028640a740e5e2ce2eaddf20566c628

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

    Filesize

    93KB

    MD5

    69686b88086881484710cfd02aeea412

    SHA1

    4b970e642a5778d3d2b1d5dcf6afecd8b5a753a7

    SHA256

    8349e0f5c041462dac6c31045356fbe90842bdbeeea5823b8c32c3c9a9e9003a

    SHA512

    3a9748e1eede226ed8dde30809425df80a7cf82291937c80d82307cf1b456b545cd94d301d526b2508af2db91d59ddeca028640a740e5e2ce2eaddf20566c628

  • memory/2476-138-0x0000000075340000-0x00000000758F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2476-140-0x0000000075340000-0x00000000758F1000-memory.dmp

    Filesize

    5.7MB