Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-03-2023 00:31

General

  • Target

    4c2d57d34e69887b905ac39fbb58d736.exe

  • Size

    199KB

  • MD5

    4c2d57d34e69887b905ac39fbb58d736

  • SHA1

    a35b9371a42a87a814dd68ff9db30f6e1e95a008

  • SHA256

    75e794dd1ddfe6d2585dc9031c32fa1c27515d08476d7d2dd52dd650bfbb934d

  • SHA512

    42690607f291369b3231d9fcf2e885670eb34d81fc8e8b20236c1f5fa80f30dbefc3f4cfae9481c71cd04c89952131b521e57aad46e2eef3cfb90e75464a84f3

  • SSDEEP

    3072:VRs0YSY6FGHBu/84ozP1a4HjQPp4UgcaaeN3AxB3qRrvCG2KSWFPQ4pn1iqZyt:L4HY/8aOj44UVD0Qx5qX2KxFPQsn1NZO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

Zm9ycnV4eC5kZG5zLm5ldAStrikStrik:OTA5MA==

Mutex

30bf20a7c4c21398efee41949036ac7b

Attributes
  • reg_key

    30bf20a7c4c21398efee41949036ac7b

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c2d57d34e69887b905ac39fbb58d736.exe
    "C:\Users\Admin\AppData\Local\Temp\4c2d57d34e69887b905ac39fbb58d736.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops autorun.inf file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\system32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1476
      • C:\Windows\system32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1744
      • C:\Windows\system32\netsh.exe
        netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Modifies Windows Firewall
        PID:1064

Network

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Discovery

System Information Discovery

1
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\server.exe
    Filesize

    199KB

    MD5

    4c2d57d34e69887b905ac39fbb58d736

    SHA1

    a35b9371a42a87a814dd68ff9db30f6e1e95a008

    SHA256

    75e794dd1ddfe6d2585dc9031c32fa1c27515d08476d7d2dd52dd650bfbb934d

    SHA512

    42690607f291369b3231d9fcf2e885670eb34d81fc8e8b20236c1f5fa80f30dbefc3f4cfae9481c71cd04c89952131b521e57aad46e2eef3cfb90e75464a84f3

  • C:\Users\Admin\AppData\Local\Temp\server.exe
    Filesize

    199KB

    MD5

    4c2d57d34e69887b905ac39fbb58d736

    SHA1

    a35b9371a42a87a814dd68ff9db30f6e1e95a008

    SHA256

    75e794dd1ddfe6d2585dc9031c32fa1c27515d08476d7d2dd52dd650bfbb934d

    SHA512

    42690607f291369b3231d9fcf2e885670eb34d81fc8e8b20236c1f5fa80f30dbefc3f4cfae9481c71cd04c89952131b521e57aad46e2eef3cfb90e75464a84f3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\30bf20a7c4c21398efee41949036ac7bWindows Update.exe
    Filesize

    199KB

    MD5

    4c2d57d34e69887b905ac39fbb58d736

    SHA1

    a35b9371a42a87a814dd68ff9db30f6e1e95a008

    SHA256

    75e794dd1ddfe6d2585dc9031c32fa1c27515d08476d7d2dd52dd650bfbb934d

    SHA512

    42690607f291369b3231d9fcf2e885670eb34d81fc8e8b20236c1f5fa80f30dbefc3f4cfae9481c71cd04c89952131b521e57aad46e2eef3cfb90e75464a84f3

  • C:\Users\Admin\AppData\Roaming\app
    Filesize

    5B

    MD5

    69cf10399d0d1350c3698099796624cb

    SHA1

    d0b58b76ff065f51172971853a7da414286d9ea7

    SHA256

    a7bff94c7cdef50b67a3bab142ebcec4d360491e339581c41f433fec6d002f48

    SHA512

    5e1c9745b2b529c026e51fbff7fd4e1e0bd208c705b7da830459758d28c01b32b9bc93caa7ad60228d3e785784023d8a739fda0dab62d3c76770ea84c257f1f7

  • memory/868-63-0x00000000002A0000-0x00000000002AC000-memory.dmp
    Filesize

    48KB

  • memory/868-64-0x000000001B330000-0x000000001B3B0000-memory.dmp
    Filesize

    512KB

  • memory/868-78-0x000000001B330000-0x000000001B3B0000-memory.dmp
    Filesize

    512KB

  • memory/920-54-0x0000000001030000-0x000000000103C000-memory.dmp
    Filesize

    48KB

  • memory/920-55-0x0000000000150000-0x000000000016C000-memory.dmp
    Filesize

    112KB

  • memory/920-57-0x0000000000F30000-0x0000000000FB0000-memory.dmp
    Filesize

    512KB