Analysis

  • max time kernel
    188s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/02/2023, 18:40

General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    cb2210ef676090de1d4abdc6abd15daf

  • SHA1

    e9e25de728ab27e0aa9a18caf40b25465a6ef8c1

  • SHA256

    7a384bb74dfe070f5954964c150d6b58c8439f90c7c2e681e662929f87bdc98a

  • SHA512

    b6e9feebf3615c7d7057bc4b8f8800ac7a46e7d76c47dd660ae45407aa6cde804f8be16ee4473ba155ced5424add033d3f5c8a710ad0dcf2651235753eb07ec4

  • SSDEEP

    1536:GT8oDnb4DNA7SSjHDrwsNMDzXExI3pmxm:XoDnEmOWHDrwsNMDzXExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

oxy01.duckdns.org:6522

Mutex

d00ea8c06ab02e78618235c9503b74e8

Attributes
  • reg_key

    d00ea8c06ab02e78618235c9503b74e8

  • splitter

    Y262SUCZ4UJJ

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payload.exe
    "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Windows\SysWOW64\attrib.exe
      attrib +h "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
      2⤵
      • Views/modifies file attributes
      PID:1648
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Set-MpPreference -DisableRealtimeMonitoring $true
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c sc query windefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\sc.exe
        sc query windefend
        3⤵
        • Launches sc.exe
        PID:3964
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c sc stop windefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:228
      • C:\Windows\SysWOW64\sc.exe
        sc stop windefend
        3⤵
        • Launches sc.exe
        PID:2636
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c sc delete windefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3228
      • C:\Windows\SysWOW64\sc.exe
        sc delete windefend
        3⤵
        • Launches sc.exe
        PID:3940
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /delete /tn CleanSweepCheck /f
      2⤵
        PID:4500
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Local\Temp\Payload.exe
        2⤵
        • Creates scheduled task(s)
        PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Windows\SysWOW64\reg.exe
          reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          3⤵
          • UAC bypass
          • Modifies registry key
          PID:4640
      • C:\Users\Admin\AppData\Local\Temp\2539ff8c70584335879a12cdc502d637.exe
        "C:\Users\Admin\AppData\Local\Temp\2539ff8c70584335879a12cdc502d637.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:824
      • C:\Users\Admin\AppData\Local\Temp\468c027c97e44abc8280a627fe55579c.exe
        "C:\Users\Admin\AppData\Local\Temp\468c027c97e44abc8280a627fe55579c.exe"
        2⤵
        • Executes dropped EXE
        PID:4384
      • C:\Users\Admin\AppData\Local\Temp\c2f22696f6f5425ca450fa4e0f37bc87.exe
        "C:\Users\Admin\AppData\Local\Temp\c2f22696f6f5425ca450fa4e0f37bc87.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1896
    • C:\Users\Admin\AppData\Local\Temp\Payload.exe
      C:\Users\Admin\AppData\Local\Temp\Payload.exe
      1⤵
      • Executes dropped EXE
      PID:4412
    • C:\Users\Admin\AppData\Local\Temp\Payload.exe
      C:\Users\Admin\AppData\Local\Temp\Payload.exe
      1⤵
      • Executes dropped EXE
      PID:3628
    • C:\Windows\system32\UserAccountControlSettings.exe
      "C:\Windows\system32\UserAccountControlSettings.exe"
      1⤵
        PID:4904

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Payload.exe.log

        Filesize

        319B

        MD5

        da4fafeffe21b7cb3a8c170ca7911976

        SHA1

        50ef77e2451ab60f93f4db88325b897d215be5ad

        SHA256

        7341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7

        SHA512

        0bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6

      • C:\Users\Admin\AppData\Local\Temp\2539ff8c70584335879a12cdc502d637.exe

        Filesize

        16KB

        MD5

        683bcb1f86f4410931abe39a63eb7057

        SHA1

        d338aac5ff479fc94d3c840e862665de1dac8c8f

        SHA256

        c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12

        SHA512

        60b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2

      • C:\Users\Admin\AppData\Local\Temp\2539ff8c70584335879a12cdc502d637.exe

        Filesize

        16KB

        MD5

        683bcb1f86f4410931abe39a63eb7057

        SHA1

        d338aac5ff479fc94d3c840e862665de1dac8c8f

        SHA256

        c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12

        SHA512

        60b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2

      • C:\Users\Admin\AppData\Local\Temp\468c027c97e44abc8280a627fe55579c.exe

        Filesize

        16KB

        MD5

        683bcb1f86f4410931abe39a63eb7057

        SHA1

        d338aac5ff479fc94d3c840e862665de1dac8c8f

        SHA256

        c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12

        SHA512

        60b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2

      • C:\Users\Admin\AppData\Local\Temp\468c027c97e44abc8280a627fe55579c.exe

        Filesize

        16KB

        MD5

        683bcb1f86f4410931abe39a63eb7057

        SHA1

        d338aac5ff479fc94d3c840e862665de1dac8c8f

        SHA256

        c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12

        SHA512

        60b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2

      • C:\Users\Admin\AppData\Local\Temp\Payload.exe

        Filesize

        55KB

        MD5

        cb2210ef676090de1d4abdc6abd15daf

        SHA1

        e9e25de728ab27e0aa9a18caf40b25465a6ef8c1

        SHA256

        7a384bb74dfe070f5954964c150d6b58c8439f90c7c2e681e662929f87bdc98a

        SHA512

        b6e9feebf3615c7d7057bc4b8f8800ac7a46e7d76c47dd660ae45407aa6cde804f8be16ee4473ba155ced5424add033d3f5c8a710ad0dcf2651235753eb07ec4

      • C:\Users\Admin\AppData\Local\Temp\Payload.exe

        Filesize

        55KB

        MD5

        cb2210ef676090de1d4abdc6abd15daf

        SHA1

        e9e25de728ab27e0aa9a18caf40b25465a6ef8c1

        SHA256

        7a384bb74dfe070f5954964c150d6b58c8439f90c7c2e681e662929f87bdc98a

        SHA512

        b6e9feebf3615c7d7057bc4b8f8800ac7a46e7d76c47dd660ae45407aa6cde804f8be16ee4473ba155ced5424add033d3f5c8a710ad0dcf2651235753eb07ec4

      • C:\Users\Admin\AppData\Local\Temp\c2f22696f6f5425ca450fa4e0f37bc87.exe

        Filesize

        16KB

        MD5

        683bcb1f86f4410931abe39a63eb7057

        SHA1

        d338aac5ff479fc94d3c840e862665de1dac8c8f

        SHA256

        c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12

        SHA512

        60b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2

      • C:\Users\Admin\AppData\Local\Temp\c2f22696f6f5425ca450fa4e0f37bc87.exe

        Filesize

        16KB

        MD5

        683bcb1f86f4410931abe39a63eb7057

        SHA1

        d338aac5ff479fc94d3c840e862665de1dac8c8f

        SHA256

        c9f03a39789f7322ae43604db6ce7da86765ad4b13207091683cf47bdea8de12

        SHA512

        60b596947d93fdb196fcf338af92d26cdd82396283316352ead078ce1a85943bb85264901318f7061e6b0e49058ace521831a9275c025526373d9168c757cdd2

      • memory/824-170-0x00007FFF6E230000-0x00007FFF6EC66000-memory.dmp

        Filesize

        10.2MB

      • memory/1896-178-0x00007FFF6E0A0000-0x00007FFF6EAD6000-memory.dmp

        Filesize

        10.2MB

      • memory/3628-181-0x0000000074870000-0x0000000074E21000-memory.dmp

        Filesize

        5.7MB

      • memory/3628-182-0x0000000074870000-0x0000000074E21000-memory.dmp

        Filesize

        5.7MB

      • memory/3744-132-0x0000000074870000-0x0000000074E21000-memory.dmp

        Filesize

        5.7MB

      • memory/3744-133-0x0000000074870000-0x0000000074E21000-memory.dmp

        Filesize

        5.7MB

      • memory/4280-156-0x0000000007700000-0x0000000007D7A000-memory.dmp

        Filesize

        6.5MB

      • memory/4280-154-0x000000006E700000-0x000000006E74C000-memory.dmp

        Filesize

        304KB

      • memory/4280-162-0x00000000072E0000-0x0000000007376000-memory.dmp

        Filesize

        600KB

      • memory/4280-158-0x00000000070F0000-0x00000000070FA000-memory.dmp

        Filesize

        40KB

      • memory/4280-157-0x0000000007080000-0x000000000709A000-memory.dmp

        Filesize

        104KB

      • memory/4280-155-0x0000000006310000-0x000000000632E000-memory.dmp

        Filesize

        120KB

      • memory/4280-166-0x00000000072C0000-0x00000000072CE000-memory.dmp

        Filesize

        56KB

      • memory/4280-167-0x00000000073C0000-0x00000000073DA000-memory.dmp

        Filesize

        104KB

      • memory/4280-168-0x00000000073A0000-0x00000000073A8000-memory.dmp

        Filesize

        32KB

      • memory/4280-145-0x0000000002350000-0x0000000002386000-memory.dmp

        Filesize

        216KB

      • memory/4280-148-0x0000000005060000-0x0000000005688000-memory.dmp

        Filesize

        6.2MB

      • memory/4280-149-0x0000000004CC0000-0x0000000004CE2000-memory.dmp

        Filesize

        136KB

      • memory/4280-153-0x0000000006330000-0x0000000006362000-memory.dmp

        Filesize

        200KB

      • memory/4280-152-0x00000000049E0000-0x00000000049FE000-memory.dmp

        Filesize

        120KB

      • memory/4280-150-0x0000000005690000-0x00000000056F6000-memory.dmp

        Filesize

        408KB

      • memory/4280-151-0x0000000005700000-0x0000000005766000-memory.dmp

        Filesize

        408KB

      • memory/4384-174-0x00007FFF6E230000-0x00007FFF6EC66000-memory.dmp

        Filesize

        10.2MB

      • memory/4412-160-0x0000000074870000-0x0000000074E21000-memory.dmp

        Filesize

        5.7MB

      • memory/4412-169-0x0000000074870000-0x0000000074E21000-memory.dmp

        Filesize

        5.7MB

      • memory/4412-161-0x0000000074870000-0x0000000074E21000-memory.dmp

        Filesize

        5.7MB