Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/03/2023, 01:01
Behavioral task
behavioral1
Sample
TEST BANK ACCOUNT.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TEST BANK ACCOUNT.exe
Resource
win10v2004-20230220-en
General
-
Target
TEST BANK ACCOUNT.exe
-
Size
37KB
-
MD5
d292e38ae9448135ff757d8023d2c10b
-
SHA1
a5590dcdcf4bab86ac15234bf83957c7d828bcfb
-
SHA256
5453d518a08515c4f08ebb09601a925f6164e22db494ce1785e70f00d61f8589
-
SHA512
f85b3b303a9ecb84106d193d4650c8fedda92bde368fb96dae860b7be7b6b4509e1acac1a59b67d6210363c1b2a91fd0b21f97496e24bfdbbd93dc5c7696b93a
-
SSDEEP
384:8wS6yikt2zIuMXY1uyZD71qwkfFoseyHDrAF+rMRTyN/0L+EcoinblneHQM3epzP:zoY1lN7Qwk21yjrM+rMRa8NuTrt
Malware Config
Extracted
njrat
im523
L indian scammer ezezezez
chapter-julia.at.ply.gg:17779
763f08aadc5f1dde3c553edc3d069fec
-
reg_key
763f08aadc5f1dde3c553edc3d069fec
-
splitter
|'|'|
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 848 AcroRd32.exe 848 AcroRd32.exe 848 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1332 1920 TEST BANK ACCOUNT.exe 27 PID 1920 wrote to memory of 1332 1920 TEST BANK ACCOUNT.exe 27 PID 1920 wrote to memory of 1332 1920 TEST BANK ACCOUNT.exe 27 PID 1920 wrote to memory of 1332 1920 TEST BANK ACCOUNT.exe 27 PID 1920 wrote to memory of 1332 1920 TEST BANK ACCOUNT.exe 27 PID 1920 wrote to memory of 1332 1920 TEST BANK ACCOUNT.exe 27 PID 1920 wrote to memory of 1332 1920 TEST BANK ACCOUNT.exe 27 PID 1332 wrote to memory of 848 1332 rundll32.exe 28 PID 1332 wrote to memory of 848 1332 rundll32.exe 28 PID 1332 wrote to memory of 848 1332 rundll32.exe 28 PID 1332 wrote to memory of 848 1332 rundll32.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\TEST BANK ACCOUNT.exe"C:\Users\Admin\AppData\Local\Temp\TEST BANK ACCOUNT.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\bank_account2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\bank_account"3⤵
- Suspicious use of SetWindowsHookEx
PID:848
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5d292e38ae9448135ff757d8023d2c10b
SHA1a5590dcdcf4bab86ac15234bf83957c7d828bcfb
SHA2565453d518a08515c4f08ebb09601a925f6164e22db494ce1785e70f00d61f8589
SHA512f85b3b303a9ecb84106d193d4650c8fedda92bde368fb96dae860b7be7b6b4509e1acac1a59b67d6210363c1b2a91fd0b21f97496e24bfdbbd93dc5c7696b93a