Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2023, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
bc28c34b6ba7a0341e1604509d756afc.exe
Resource
win7-20221111-en
General
-
Target
bc28c34b6ba7a0341e1604509d756afc.exe
-
Size
303KB
-
MD5
bc28c34b6ba7a0341e1604509d756afc
-
SHA1
fc3188751db9814d68861d6930fc05192afb8fe3
-
SHA256
ac2633a4308a31c9a156f564c02c35776627233fdfde5bfc3336f2e8cea65ed0
-
SHA512
55b403a4b4e470df53d7880e4c2409b6819319f7dbfed09c7a8bfc5c1d05448baaa6b9ddc58a14c1a882d310ac5309388db0fc416c15c64a681c880dae0f74f4
-
SSDEEP
6144:FjT5Zh17eWxoG/+ov/2OIQ4wW3OBsCeAWtPNfvbTEY:FRZ+IoG/n9IQxW3OBseclvbTEY
Malware Config
Extracted
njrat
im523
Бебрусик
6.tcp.eu.ngrok.io:10291
34df59c30ceddf261b28ec307d4bd4f7
-
reg_key
34df59c30ceddf261b28ec307d4bd4f7
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1960 UlraBebrus.exe 4704 GigaNige.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 328 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation UlraBebrus.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation bc28c34b6ba7a0341e1604509d756afc.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf GigaNige.exe File opened for modification C:\autorun.inf GigaNige.exe File created D:\autorun.inf GigaNige.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe Token: 33 4704 GigaNige.exe Token: SeIncBasePriorityPrivilege 4704 GigaNige.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3540 wrote to memory of 1960 3540 bc28c34b6ba7a0341e1604509d756afc.exe 83 PID 3540 wrote to memory of 1960 3540 bc28c34b6ba7a0341e1604509d756afc.exe 83 PID 3540 wrote to memory of 1960 3540 bc28c34b6ba7a0341e1604509d756afc.exe 83 PID 1960 wrote to memory of 4704 1960 UlraBebrus.exe 89 PID 1960 wrote to memory of 4704 1960 UlraBebrus.exe 89 PID 1960 wrote to memory of 4704 1960 UlraBebrus.exe 89 PID 4704 wrote to memory of 328 4704 GigaNige.exe 92 PID 4704 wrote to memory of 328 4704 GigaNige.exe 92 PID 4704 wrote to memory of 328 4704 GigaNige.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc28c34b6ba7a0341e1604509d756afc.exe"C:\Users\Admin\AppData\Local\Temp\bc28c34b6ba7a0341e1604509d756afc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\UlraBebrus.exe"C:\Users\Admin\AppData\Local\Temp\UlraBebrus.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\GigaNige.exe"C:\Users\Admin\AppData\Local\Temp\GigaNige.exe"3⤵
- Executes dropped EXE
- Drops autorun.inf file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\GigaNige.exe" "GigaNige.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:328
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD58b1e3959382b8dbca197ed7eced1ba14
SHA178cdca26a61599e2794ce98cf6f3d764905e03da
SHA2563b848bd82542c2212729e544b5dc59cece5c1798cf2a4f76f481570f0e84821e
SHA512722c009a87dc37aa889506f0da6365235529d307c7f175072d4291dea48dd73ebafd997d34cc641c55d0480d7cb02a3f99bfcfa9aa084c3ab468b8d53425b965
-
Filesize
37KB
MD58b1e3959382b8dbca197ed7eced1ba14
SHA178cdca26a61599e2794ce98cf6f3d764905e03da
SHA2563b848bd82542c2212729e544b5dc59cece5c1798cf2a4f76f481570f0e84821e
SHA512722c009a87dc37aa889506f0da6365235529d307c7f175072d4291dea48dd73ebafd997d34cc641c55d0480d7cb02a3f99bfcfa9aa084c3ab468b8d53425b965
-
Filesize
37KB
MD58b1e3959382b8dbca197ed7eced1ba14
SHA178cdca26a61599e2794ce98cf6f3d764905e03da
SHA2563b848bd82542c2212729e544b5dc59cece5c1798cf2a4f76f481570f0e84821e
SHA512722c009a87dc37aa889506f0da6365235529d307c7f175072d4291dea48dd73ebafd997d34cc641c55d0480d7cb02a3f99bfcfa9aa084c3ab468b8d53425b965
-
Filesize
37KB
MD58b1e3959382b8dbca197ed7eced1ba14
SHA178cdca26a61599e2794ce98cf6f3d764905e03da
SHA2563b848bd82542c2212729e544b5dc59cece5c1798cf2a4f76f481570f0e84821e
SHA512722c009a87dc37aa889506f0da6365235529d307c7f175072d4291dea48dd73ebafd997d34cc641c55d0480d7cb02a3f99bfcfa9aa084c3ab468b8d53425b965