Analysis

  • max time kernel
    157s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2023 07:01

General

  • Target

    Office365 Checker.exe

  • Size

    1015KB

  • MD5

    13070b929870d933534ac2169adaffe7

  • SHA1

    4c6a9dedc8b85335e40f67786d025b2005a054f7

  • SHA256

    0bd0e4c5302be6496b439de8c8b86fed3e94eca9d803dce5b0d1ef8d08a14d35

  • SHA512

    732796485f8853b24adfbc7b7d7b58e5d4d95cd92cc20be547ba19ff27f89ac233763f4f370a1719290daf3a94f90a043528ee5f52dbe0b3fba87049f48d4922

  • SSDEEP

    12288:LDCmeZxmoAQhPmeZxmoYTmr4/YO2MoLOA0sU+nCpCBMutsN:fWJIWJbr4/YOroLyB+nCpQDts

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

blog.hackcrack.io:8082

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Office365 Checker.exe
    "C:\Users\Admin\AppData\Local\Temp\Office365 Checker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      PID:3760
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4584
          • C:\windows\system32\fodhelper.exe
            "C:\windows\system32\fodhelper.exe"
            5⤵
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1848
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /c PowerShell.exe -windowstyle hidden Set-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3640
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                PowerShell.exe -windowstyle hidden Set-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1332
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            #cmd
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4952
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              PID:4916
    • C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe
      "C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe"
      2⤵
      • Executes dropped EXE
      PID:3100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 804
        3⤵
        • Program crash
        PID:4724
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3100 -ip 3100
    1⤵
      PID:3232

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.log
      Filesize

      408B

      MD5

      70f08e6585ed9994d97a4c71472fccd8

      SHA1

      3f44494d4747c87fb8b94bb153c3a3d717f9fd63

      SHA256

      87fbf339c47e259826080aa2dcbdf371ea47a50eec88222c6e64a92906cb37fa

      SHA512

      d381aec2ea869f3b2d06497e934c7fe993df6deac719370bd74310a29e8e48b6497559922d2cb44ace97c4bd7ad00eae8fe92a31081f2119de3ddbb5988af388

    • C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe
      Filesize

      547KB

      MD5

      4b9c5a8a3386819c1974a49c066506e2

      SHA1

      d370f517ff579a17eb02901134db27f17360c4d9

      SHA256

      1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

      SHA512

      93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

    • C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe
      Filesize

      547KB

      MD5

      4b9c5a8a3386819c1974a49c066506e2

      SHA1

      d370f517ff579a17eb02901134db27f17360c4d9

      SHA256

      1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

      SHA512

      93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

    • C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe
      Filesize

      547KB

      MD5

      4b9c5a8a3386819c1974a49c066506e2

      SHA1

      d370f517ff579a17eb02901134db27f17360c4d9

      SHA256

      1e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc

      SHA512

      93f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      Filesize

      451KB

      MD5

      8279b0e5326e13b048dc80d47ce7e86b

      SHA1

      336ff5fbe4cae573d9a5f7092eb53ca879a9b456

      SHA256

      d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6

      SHA512

      71c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      Filesize

      451KB

      MD5

      8279b0e5326e13b048dc80d47ce7e86b

      SHA1

      336ff5fbe4cae573d9a5f7092eb53ca879a9b456

      SHA256

      d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6

      SHA512

      71c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      Filesize

      451KB

      MD5

      8279b0e5326e13b048dc80d47ce7e86b

      SHA1

      336ff5fbe4cae573d9a5f7092eb53ca879a9b456

      SHA256

      d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6

      SHA512

      71c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5

    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      Filesize

      451KB

      MD5

      8279b0e5326e13b048dc80d47ce7e86b

      SHA1

      336ff5fbe4cae573d9a5f7092eb53ca879a9b456

      SHA256

      d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6

      SHA512

      71c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0zey3by1.ugp.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      Filesize

      208KB

      MD5

      fdba80a556cada3d7e2b5df86d1948a5

      SHA1

      1b8aaafbebc63f0aa886169eedbead626498efe3

      SHA256

      175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05

      SHA512

      ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      Filesize

      208KB

      MD5

      fdba80a556cada3d7e2b5df86d1948a5

      SHA1

      1b8aaafbebc63f0aa886169eedbead626498efe3

      SHA256

      175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05

      SHA512

      ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      Filesize

      208KB

      MD5

      fdba80a556cada3d7e2b5df86d1948a5

      SHA1

      1b8aaafbebc63f0aa886169eedbead626498efe3

      SHA256

      175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05

      SHA512

      ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
      Filesize

      318KB

      MD5

      23ce98b7618b4feb3c10bee606d171bd

      SHA1

      3e2359692f447a175610312be6f98f726d9defb3

      SHA256

      520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881

      SHA512

      6db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
      Filesize

      318KB

      MD5

      23ce98b7618b4feb3c10bee606d171bd

      SHA1

      3e2359692f447a175610312be6f98f726d9defb3

      SHA256

      520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881

      SHA512

      6db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
      Filesize

      318KB

      MD5

      23ce98b7618b4feb3c10bee606d171bd

      SHA1

      3e2359692f447a175610312be6f98f726d9defb3

      SHA256

      520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881

      SHA512

      6db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b

    • C:\Windows\assembly\Desktop.ini
      Filesize

      227B

      MD5

      f7f759a5cd40bc52172e83486b6de404

      SHA1

      d74930f354a56cfd03dc91aa96d8ae9657b1ee54

      SHA256

      a709c2551b8818d7849d31a65446dc2f8c4cca2dcbbc5385604286f49cfdaf1c

      SHA512

      a50b7826bfe72506019e4b1148a214c71c6f4743c09e809ef15cd0e0223f3078b683d203200910b07b5e1e34b94f0fe516ac53527311e2943654bfceade53298

    • memory/368-133-0x0000000000750000-0x0000000000854000-memory.dmp
      Filesize

      1.0MB

    • memory/368-137-0x0000000001200000-0x0000000001210000-memory.dmp
      Filesize

      64KB

    • memory/368-136-0x000000001C390000-0x000000001C42C000-memory.dmp
      Filesize

      624KB

    • memory/368-135-0x000000001BEC0000-0x000000001C38E000-memory.dmp
      Filesize

      4.8MB

    • memory/368-134-0x0000000001310000-0x00000000013B6000-memory.dmp
      Filesize

      664KB

    • memory/848-193-0x00000000009D0000-0x00000000009D8000-memory.dmp
      Filesize

      32KB

    • memory/848-192-0x0000000000140000-0x0000000000196000-memory.dmp
      Filesize

      344KB

    • memory/1332-233-0x000001417E5E0000-0x000001417F0A1000-memory.dmp
      Filesize

      10.8MB

    • memory/1332-231-0x000001417F0F0000-0x000001417F100000-memory.dmp
      Filesize

      64KB

    • memory/1332-232-0x000001417F0F0000-0x000001417F100000-memory.dmp
      Filesize

      64KB

    • memory/1332-228-0x000001417F1C0000-0x000001417F1E2000-memory.dmp
      Filesize

      136KB

    • memory/1332-218-0x000001417F0F0000-0x000001417F100000-memory.dmp
      Filesize

      64KB

    • memory/1332-217-0x000001417F0F0000-0x000001417F100000-memory.dmp
      Filesize

      64KB

    • memory/2024-171-0x0000000001640000-0x0000000001650000-memory.dmp
      Filesize

      64KB

    • memory/2024-165-0x0000000001670000-0x000000000169A000-memory.dmp
      Filesize

      168KB

    • memory/3100-172-0x0000000000120000-0x00000000001AE000-memory.dmp
      Filesize

      568KB

    • memory/3760-151-0x0000000000800000-0x0000000000810000-memory.dmp
      Filesize

      64KB

    • memory/3760-149-0x00000000002C0000-0x0000000000336000-memory.dmp
      Filesize

      472KB

    • memory/4584-216-0x0000000000BC0000-0x0000000000BDA000-memory.dmp
      Filesize

      104KB

    • memory/4584-215-0x0000000000960000-0x0000000000982000-memory.dmp
      Filesize

      136KB

    • memory/4584-214-0x00000000009D0000-0x00000000009E0000-memory.dmp
      Filesize

      64KB

    • memory/4584-213-0x00000000001D0000-0x000000000020A000-memory.dmp
      Filesize

      232KB

    • memory/4952-236-0x0000000000400000-0x000000000040C000-memory.dmp
      Filesize

      48KB

    • memory/4952-238-0x0000000000FA0000-0x0000000000FB0000-memory.dmp
      Filesize

      64KB

    • memory/4952-239-0x0000000000FA0000-0x0000000000FB0000-memory.dmp
      Filesize

      64KB