Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2023, 13:32

General

  • Target

    24710356d2b88a67d0107cddc467cdc9.exe

  • Size

    26KB

  • MD5

    24710356d2b88a67d0107cddc467cdc9

  • SHA1

    4e6f3384adfccf76198d00a03987781e3524105b

  • SHA256

    3ad32746894dc3406c5a2b9bd3627c75e56887d2b92f0100e883d1cadbdad57b

  • SHA512

    7abcc225cf02827801744d98f05816e0dd18602cbe567a6acb74ac9d49893a9eecbc67504847f24be6c62008c8482f72b3bb63eb0e694fb638d67e0df4c43e76

  • SSDEEP

    384:r1LaRuc+oYiKJ0pjRB7Puth5M6ve1jCKsuatydbZN8Cr9131ctP1um7M84Sr6es8:rV+4foR6W1AJtIb4iEPg

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24710356d2b88a67d0107cddc467cdc9.exe
    "C:\Users\Admin\AppData\Local\Temp\24710356d2b88a67d0107cddc467cdc9.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Roaming\sihost.exe
      "C:\Users\Admin\AppData\Roaming\sihost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4904
    • C:\Windows\SysWOW64\attrib.exe
      attrib +h +r +s "C:\Users\Admin\AppData\Roaming\sihost.exe"
      2⤵
      • Views/modifies file attributes
      PID:3696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.lnk

    Filesize

    1KB

    MD5

    508a237605dfae8e1a3542015ad10336

    SHA1

    97a1df7577526c6f7294558258328cfa013563ac

    SHA256

    4349e7126a1e6ff205d9bc8dc65262ce60bd1f376292b1f660e4c26c64596a75

    SHA512

    42ccd46ce8f672ff7185e27fa813fe257e4b9b000717165cbd329979ad98144a6ad9fdbf5d903992e94b741b9e20369a258405699c518c914a95a6fc5183b3ac

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\.lnk

    Filesize

    1020B

    MD5

    405f13712e7504f837e4594b4cfb8e92

    SHA1

    da176c45f57e123b76a0bb730ada862492a8cf82

    SHA256

    0d73ba4a7dff41d64d8524e487216e33025325f231949ee04597ee75a589e2a6

    SHA512

    f65ba065c52f5753166512c2c1b0c6fb55f012f6cd168b97362ce8db781dcc04a425df92c398521b7840368e421bd01671667e7f64678699d05f6bc20dcf0ad0

  • C:\Users\Admin\AppData\Roaming\sihost.exe

    Filesize

    26KB

    MD5

    24710356d2b88a67d0107cddc467cdc9

    SHA1

    4e6f3384adfccf76198d00a03987781e3524105b

    SHA256

    3ad32746894dc3406c5a2b9bd3627c75e56887d2b92f0100e883d1cadbdad57b

    SHA512

    7abcc225cf02827801744d98f05816e0dd18602cbe567a6acb74ac9d49893a9eecbc67504847f24be6c62008c8482f72b3bb63eb0e694fb638d67e0df4c43e76

  • C:\Users\Admin\AppData\Roaming\sihost.exe

    Filesize

    26KB

    MD5

    24710356d2b88a67d0107cddc467cdc9

    SHA1

    4e6f3384adfccf76198d00a03987781e3524105b

    SHA256

    3ad32746894dc3406c5a2b9bd3627c75e56887d2b92f0100e883d1cadbdad57b

    SHA512

    7abcc225cf02827801744d98f05816e0dd18602cbe567a6acb74ac9d49893a9eecbc67504847f24be6c62008c8482f72b3bb63eb0e694fb638d67e0df4c43e76

  • C:\Users\Admin\AppData\Roaming\sihost.exe

    Filesize

    26KB

    MD5

    24710356d2b88a67d0107cddc467cdc9

    SHA1

    4e6f3384adfccf76198d00a03987781e3524105b

    SHA256

    3ad32746894dc3406c5a2b9bd3627c75e56887d2b92f0100e883d1cadbdad57b

    SHA512

    7abcc225cf02827801744d98f05816e0dd18602cbe567a6acb74ac9d49893a9eecbc67504847f24be6c62008c8482f72b3bb63eb0e694fb638d67e0df4c43e76

  • memory/3176-133-0x0000000001590000-0x00000000015A0000-memory.dmp

    Filesize

    64KB

  • memory/3176-141-0x0000000001590000-0x00000000015A0000-memory.dmp

    Filesize

    64KB

  • memory/4904-150-0x0000000000FD0000-0x0000000000FE0000-memory.dmp

    Filesize

    64KB

  • memory/4904-151-0x0000000000FD0000-0x0000000000FE0000-memory.dmp

    Filesize

    64KB