Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2023 07:01

General

  • Target

    Office365 Checker.exe

  • Size

    1015KB

  • MD5

    13070b929870d933534ac2169adaffe7

  • SHA1

    4c6a9dedc8b85335e40f67786d025b2005a054f7

  • SHA256

    0bd0e4c5302be6496b439de8c8b86fed3e94eca9d803dce5b0d1ef8d08a14d35

  • SHA512

    732796485f8853b24adfbc7b7d7b58e5d4d95cd92cc20be547ba19ff27f89ac233763f4f370a1719290daf3a94f90a043528ee5f52dbe0b3fba87049f48d4922

  • SSDEEP

    12288:LDCmeZxmoAQhPmeZxmoYTmr4/YO2MoLOA0sU+nCpCBMutsN:fWJIWJbr4/YOroLyB+nCpQDts

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

blog.hackcrack.io:8082

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Office365 Checker.exe
    "C:\Users\Admin\AppData\Local\Temp\Office365 Checker.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:912
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            #cmd
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1488
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              PID:1952
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
        3⤵
        • Executes dropped EXE
        PID:1764
    • C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe
      "C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 540
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:832

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe
    Filesize

    547KB

    MD5

    4b9c5a8a3386819c1974a49c066506e2

    SHA1

    d370f517ff579a17eb02901134db27f17360c4d9

    SHA256

    1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

    SHA512

    93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

  • C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe
    Filesize

    547KB

    MD5

    4b9c5a8a3386819c1974a49c066506e2

    SHA1

    d370f517ff579a17eb02901134db27f17360c4d9

    SHA256

    1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

    SHA512

    93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

  • C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe
    Filesize

    547KB

    MD5

    4b9c5a8a3386819c1974a49c066506e2

    SHA1

    d370f517ff579a17eb02901134db27f17360c4d9

    SHA256

    1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

    SHA512

    93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    Filesize

    451KB

    MD5

    8279b0e5326e13b048dc80d47ce7e86b

    SHA1

    336ff5fbe4cae573d9a5f7092eb53ca879a9b456

    SHA256

    d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6

    SHA512

    71c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    Filesize

    451KB

    MD5

    8279b0e5326e13b048dc80d47ce7e86b

    SHA1

    336ff5fbe4cae573d9a5f7092eb53ca879a9b456

    SHA256

    d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6

    SHA512

    71c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    Filesize

    451KB

    MD5

    8279b0e5326e13b048dc80d47ce7e86b

    SHA1

    336ff5fbe4cae573d9a5f7092eb53ca879a9b456

    SHA256

    d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6

    SHA512

    71c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    Filesize

    451KB

    MD5

    8279b0e5326e13b048dc80d47ce7e86b

    SHA1

    336ff5fbe4cae573d9a5f7092eb53ca879a9b456

    SHA256

    d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6

    SHA512

    71c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    208KB

    MD5

    fdba80a556cada3d7e2b5df86d1948a5

    SHA1

    1b8aaafbebc63f0aa886169eedbead626498efe3

    SHA256

    175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05

    SHA512

    ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    208KB

    MD5

    fdba80a556cada3d7e2b5df86d1948a5

    SHA1

    1b8aaafbebc63f0aa886169eedbead626498efe3

    SHA256

    175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05

    SHA512

    ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
    Filesize

    208KB

    MD5

    fdba80a556cada3d7e2b5df86d1948a5

    SHA1

    1b8aaafbebc63f0aa886169eedbead626498efe3

    SHA256

    175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05

    SHA512

    ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
    Filesize

    318KB

    MD5

    23ce98b7618b4feb3c10bee606d171bd

    SHA1

    3e2359692f447a175610312be6f98f726d9defb3

    SHA256

    520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881

    SHA512

    6db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
    Filesize

    318KB

    MD5

    23ce98b7618b4feb3c10bee606d171bd

    SHA1

    3e2359692f447a175610312be6f98f726d9defb3

    SHA256

    520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881

    SHA512

    6db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
    Filesize

    318KB

    MD5

    23ce98b7618b4feb3c10bee606d171bd

    SHA1

    3e2359692f447a175610312be6f98f726d9defb3

    SHA256

    520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881

    SHA512

    6db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.zip
    Filesize

    268KB

    MD5

    aa593e0f1bcb39782bfb6f4cfaee14b0

    SHA1

    110ed06e0af7fa36016b5d2c5e810f2a070b8f39

    SHA256

    030e3bfc09e0c73dac64c65dbdd59af54350f76125e5ce2163c6e9000fde7099

    SHA512

    a3ae6ccd3bda9a8429667783aad627fe594fa077e5704e21bf95f1ebc5977716c2c9885e3aac3913720a47f5813b5c08d16aee343b2b5ef349bf830c3564dddc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.zip
    Filesize

    268KB

    MD5

    aa593e0f1bcb39782bfb6f4cfaee14b0

    SHA1

    110ed06e0af7fa36016b5d2c5e810f2a070b8f39

    SHA256

    030e3bfc09e0c73dac64c65dbdd59af54350f76125e5ce2163c6e9000fde7099

    SHA512

    a3ae6ccd3bda9a8429667783aad627fe594fa077e5704e21bf95f1ebc5977716c2c9885e3aac3913720a47f5813b5c08d16aee343b2b5ef349bf830c3564dddc

  • \Users\Admin\AppData\Local\Temp\Office365 Checker .exe
    Filesize

    547KB

    MD5

    4b9c5a8a3386819c1974a49c066506e2

    SHA1

    d370f517ff579a17eb02901134db27f17360c4d9

    SHA256

    1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

    SHA512

    93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

  • \Users\Admin\AppData\Local\Temp\Office365 Checker .exe
    Filesize

    547KB

    MD5

    4b9c5a8a3386819c1974a49c066506e2

    SHA1

    d370f517ff579a17eb02901134db27f17360c4d9

    SHA256

    1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

    SHA512

    93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

  • \Users\Admin\AppData\Local\Temp\Office365 Checker .exe
    Filesize

    547KB

    MD5

    4b9c5a8a3386819c1974a49c066506e2

    SHA1

    d370f517ff579a17eb02901134db27f17360c4d9

    SHA256

    1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

    SHA512

    93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

  • \Users\Admin\AppData\Local\Temp\Office365 Checker .exe
    Filesize

    547KB

    MD5

    4b9c5a8a3386819c1974a49c066506e2

    SHA1

    d370f517ff579a17eb02901134db27f17360c4d9

    SHA256

    1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

    SHA512

    93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

  • \Users\Admin\AppData\Local\Temp\Office365 Checker .exe
    Filesize

    547KB

    MD5

    4b9c5a8a3386819c1974a49c066506e2

    SHA1

    d370f517ff579a17eb02901134db27f17360c4d9

    SHA256

    1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

    SHA512

    93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

  • memory/520-73-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/572-68-0x0000000002150000-0x00000000021D0000-memory.dmp
    Filesize

    512KB

  • memory/572-65-0x0000000000A10000-0x0000000000A86000-memory.dmp
    Filesize

    472KB

  • memory/912-108-0x0000000001DC0000-0x0000000001DDA000-memory.dmp
    Filesize

    104KB

  • memory/912-107-0x0000000000750000-0x0000000000772000-memory.dmp
    Filesize

    136KB

  • memory/912-106-0x0000000001DF0000-0x0000000001E70000-memory.dmp
    Filesize

    512KB

  • memory/912-105-0x0000000000020000-0x000000000005A000-memory.dmp
    Filesize

    232KB

  • memory/1152-84-0x0000000000B50000-0x0000000000BDE000-memory.dmp
    Filesize

    568KB

  • memory/1488-114-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1488-118-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1488-122-0x00000000007A0000-0x00000000007E0000-memory.dmp
    Filesize

    256KB

  • memory/1488-121-0x00000000007A0000-0x00000000007E0000-memory.dmp
    Filesize

    256KB

  • memory/1488-120-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1488-116-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1488-115-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/1488-112-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1488-111-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1488-113-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/1732-85-0x0000000000BD0000-0x0000000000C50000-memory.dmp
    Filesize

    512KB

  • memory/1732-83-0x0000000000260000-0x0000000000268000-memory.dmp
    Filesize

    32KB

  • memory/1732-82-0x0000000001340000-0x0000000001396000-memory.dmp
    Filesize

    344KB

  • memory/1732-98-0x0000000000BD0000-0x0000000000C50000-memory.dmp
    Filesize

    512KB

  • memory/1764-86-0x0000000000A70000-0x0000000000AF0000-memory.dmp
    Filesize

    512KB

  • memory/2012-67-0x0000000000B90000-0x0000000000C10000-memory.dmp
    Filesize

    512KB

  • memory/2012-54-0x0000000000C50000-0x0000000000D54000-memory.dmp
    Filesize

    1.0MB