Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 18:40
General
-
Target
Payload.exe
-
Size
55KB
-
MD5
cb2210ef676090de1d4abdc6abd15daf
-
SHA1
e9e25de728ab27e0aa9a18caf40b25465a6ef8c1
-
SHA256
7a384bb74dfe070f5954964c150d6b58c8439f90c7c2e681e662929f87bdc98a
-
SHA512
b6e9feebf3615c7d7057bc4b8f8800ac7a46e7d76c47dd660ae45407aa6cde804f8be16ee4473ba155ced5424add033d3f5c8a710ad0dcf2651235753eb07ec4
-
SSDEEP
1536:GT8oDnb4DNA7SSjHDrwsNMDzXExI3pmxm:XoDnEmOWHDrwsNMDzXExI3pm
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
oxy01.duckdns.org:6522
d00ea8c06ab02e78618235c9503b74e8
-
reg_key
d00ea8c06ab02e78618235c9503b74e8
-
splitter
Y262SUCZ4UJJ
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Payload.exe -
Executes dropped EXE 5 IoCs
pid Process 4412 Payload.exe 824 2539ff8c70584335879a12cdc502d637.exe 4384 468c027c97e44abc8280a627fe55579c.exe 1896 c2f22696f6f5425ca450fa4e0f37bc87.exe 3628 Payload.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3964 sc.exe 2636 sc.exe 3940 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3276 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4640 reg.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 4280 powershell.exe 4280 powershell.exe 824 2539ff8c70584335879a12cdc502d637.exe 1896 c2f22696f6f5425ca450fa4e0f37bc87.exe 1896 c2f22696f6f5425ca450fa4e0f37bc87.exe 1896 c2f22696f6f5425ca450fa4e0f37bc87.exe 1896 c2f22696f6f5425ca450fa4e0f37bc87.exe 1896 c2f22696f6f5425ca450fa4e0f37bc87.exe 1896 c2f22696f6f5425ca450fa4e0f37bc87.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe 3744 Payload.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 3744 Payload.exe Token: SeDebugPrivilege 4280 powershell.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: SeDebugPrivilege 824 2539ff8c70584335879a12cdc502d637.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: SeDebugPrivilege 1896 c2f22696f6f5425ca450fa4e0f37bc87.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe Token: 33 3744 Payload.exe Token: SeIncBasePriorityPrivilege 3744 Payload.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3744 wrote to memory of 1648 3744 Payload.exe 82 PID 3744 wrote to memory of 1648 3744 Payload.exe 82 PID 3744 wrote to memory of 1648 3744 Payload.exe 82 PID 3744 wrote to memory of 668 3744 Payload.exe 84 PID 3744 wrote to memory of 668 3744 Payload.exe 84 PID 3744 wrote to memory of 668 3744 Payload.exe 84 PID 668 wrote to memory of 4280 668 cmd.exe 86 PID 668 wrote to memory of 4280 668 cmd.exe 86 PID 668 wrote to memory of 4280 668 cmd.exe 86 PID 3744 wrote to memory of 1660 3744 Payload.exe 87 PID 3744 wrote to memory of 1660 3744 Payload.exe 87 PID 3744 wrote to memory of 1660 3744 Payload.exe 87 PID 1660 wrote to memory of 3964 1660 cmd.exe 89 PID 1660 wrote to memory of 3964 1660 cmd.exe 89 PID 1660 wrote to memory of 3964 1660 cmd.exe 89 PID 3744 wrote to memory of 228 3744 Payload.exe 90 PID 3744 wrote to memory of 228 3744 Payload.exe 90 PID 3744 wrote to memory of 228 3744 Payload.exe 90 PID 228 wrote to memory of 2636 228 cmd.exe 92 PID 228 wrote to memory of 2636 228 cmd.exe 92 PID 228 wrote to memory of 2636 228 cmd.exe 92 PID 3744 wrote to memory of 3228 3744 Payload.exe 93 PID 3744 wrote to memory of 3228 3744 Payload.exe 93 PID 3744 wrote to memory of 3228 3744 Payload.exe 93 PID 3228 wrote to memory of 3940 3228 cmd.exe 95 PID 3228 wrote to memory of 3940 3228 cmd.exe 95 PID 3228 wrote to memory of 3940 3228 cmd.exe 95 PID 3744 wrote to memory of 4500 3744 Payload.exe 96 PID 3744 wrote to memory of 4500 3744 Payload.exe 96 PID 3744 wrote to memory of 4500 3744 Payload.exe 96 PID 3744 wrote to memory of 3276 3744 Payload.exe 98 PID 3744 wrote to memory of 3276 3744 Payload.exe 98 PID 3744 wrote to memory of 3276 3744 Payload.exe 98 PID 3744 wrote to memory of 2248 3744 Payload.exe 100 PID 3744 wrote to memory of 2248 3744 Payload.exe 100 PID 3744 wrote to memory of 2248 3744 Payload.exe 100 PID 2248 wrote to memory of 4640 2248 cmd.exe 102 PID 2248 wrote to memory of 4640 2248 cmd.exe 102 PID 2248 wrote to memory of 4640 2248 cmd.exe 102 PID 3744 wrote to memory of 824 3744 Payload.exe 104 PID 3744 wrote to memory of 824 3744 Payload.exe 104 PID 3744 wrote to memory of 4384 3744 Payload.exe 105 PID 3744 wrote to memory of 4384 3744 Payload.exe 105 PID 3744 wrote to memory of 1896 3744 Payload.exe 107 PID 3744 wrote to memory of 1896 3744 Payload.exe 107 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1648 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Views/modifies file attributes
PID:1648
-
-
C:\Windows\SysWOW64\cmd.execmd /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc query windefend2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\sc.exesc query windefend3⤵
- Launches sc.exe
PID:3964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop windefend2⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\sc.exesc stop windefend3⤵
- Launches sc.exe
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete windefend2⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\sc.exesc delete windefend3⤵
- Launches sc.exe
PID:3940
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn CleanSweepCheck /f2⤵PID:4500
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Local\Temp\Payload.exe2⤵
- Creates scheduled task(s)
PID:3276
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\reg.exereg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:4640
-
-
-
C:\Users\Admin\AppData\Local\Temp\2539ff8c70584335879a12cdc502d637.exe"C:\Users\Admin\AppData\Local\Temp\2539ff8c70584335879a12cdc502d637.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\468c027c97e44abc8280a627fe55579c.exe"C:\Users\Admin\AppData\Local\Temp\468c027c97e44abc8280a627fe55579c.exe"2⤵
- Executes dropped EXE
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\c2f22696f6f5425ca450fa4e0f37bc87.exe"C:\Users\Admin\AppData\Local\Temp\c2f22696f6f5425ca450fa4e0f37bc87.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\Payload.exeC:\Users\Admin\AppData\Local\Temp\Payload.exe1⤵
- Executes dropped EXE
PID:4412
-
C:\Users\Admin\AppData\Local\Temp\Payload.exeC:\Users\Admin\AppData\Local\Temp\Payload.exe1⤵
- Executes dropped EXE
PID:3628
-
C:\Windows\system32\UserAccountControlSettings.exe"C:\Windows\system32\UserAccountControlSettings.exe"1⤵PID:4904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319B
MD5da4fafeffe21b7cb3a8c170ca7911976
SHA150ef77e2451ab60f93f4db88325b897d215be5ad
SHA2567341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA5120bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6
-
Filesize
16KB
MD5683bcb1f86f4410931abe39a63eb7057
SHA1d338aac5ff479fc94d3c840e862665de1dac8c8f
SHA256c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12
SHA51260b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2
-
Filesize
16KB
MD5683bcb1f86f4410931abe39a63eb7057
SHA1d338aac5ff479fc94d3c840e862665de1dac8c8f
SHA256c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12
SHA51260b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2
-
Filesize
16KB
MD5683bcb1f86f4410931abe39a63eb7057
SHA1d338aac5ff479fc94d3c840e862665de1dac8c8f
SHA256c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12
SHA51260b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2
-
Filesize
16KB
MD5683bcb1f86f4410931abe39a63eb7057
SHA1d338aac5ff479fc94d3c840e862665de1dac8c8f
SHA256c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12
SHA51260b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2
-
Filesize
55KB
MD5cb2210ef676090de1d4abdc6abd15daf
SHA1e9e25de728ab27e0aa9a18caf40b25465a6ef8c1
SHA2567a384bb74dfe070f5954964c150d6b58c8439f90c7c2e681e662929f87bdc98a
SHA512b6e9feebf3615c7d7057bc4b8f8800ac7a46e7d76c47dd660ae45407aa6cde804f8be16ee4473ba155ced5424add033d3f5c8a710ad0dcf2651235753eb07ec4
-
Filesize
55KB
MD5cb2210ef676090de1d4abdc6abd15daf
SHA1e9e25de728ab27e0aa9a18caf40b25465a6ef8c1
SHA2567a384bb74dfe070f5954964c150d6b58c8439f90c7c2e681e662929f87bdc98a
SHA512b6e9feebf3615c7d7057bc4b8f8800ac7a46e7d76c47dd660ae45407aa6cde804f8be16ee4473ba155ced5424add033d3f5c8a710ad0dcf2651235753eb07ec4
-
Filesize
16KB
MD5683bcb1f86f4410931abe39a63eb7057
SHA1d338aac5ff479fc94d3c840e862665de1dac8c8f
SHA256c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12
SHA51260b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2
-
Filesize
16KB
MD5683bcb1f86f4410931abe39a63eb7057
SHA1d338aac5ff479fc94d3c840e862665de1dac8c8f
SHA256c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12
SHA51260b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2