Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 22:30
Behavioral task
behavioral1
Sample
xDamgerV3/xDamgerV3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
xDamgerV3/xDamgerV3.exe
Resource
win10v2004-20230220-en
General
-
Target
xDamgerV3/xDamgerV3.exe
-
Size
27KB
-
MD5
25da9374ef976e9342b8341002b92448
-
SHA1
a7c8b1d75ecb7d9037b0ca0b75b271b45da95fa2
-
SHA256
280e0d55651d003b8aa2754cd47f84d7f0749e3b43787814c754fb71a357bfc2
-
SHA512
e4ce0f1219f040a1c6dafd44d95240ea7075dcefbc20f3b2ef43c116c8ba7f4258e0f1ce6b8497be17a70defdabe61120d9923a327fe4bd4c89f1b0df40dbaab
-
SSDEEP
384:wLplYHHeIYTzRRcbg8iEPrthZMVAQk93vmhm7UMKmIEecKdbXTzm9bVhca56Br6s:ufZxRm8VA/vMHTi9bD
Malware Config
Extracted
njrat
v2.0
HacKed
paul-positive.at.ply.gg:9693
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation xDamgerV3.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk xDamgerV3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe -
Executes dropped EXE 1 IoCs
pid Process 972 Payload.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" xDamgerV3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4144 wrote to memory of 972 4144 xDamgerV3.exe 91 PID 4144 wrote to memory of 972 4144 xDamgerV3.exe 91 PID 4144 wrote to memory of 972 4144 xDamgerV3.exe 91 PID 4144 wrote to memory of 3040 4144 xDamgerV3.exe 92 PID 4144 wrote to memory of 3040 4144 xDamgerV3.exe 92 PID 4144 wrote to memory of 3040 4144 xDamgerV3.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3040 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xDamgerV3\xDamgerV3.exe"C:\Users\Admin\AppData\Local\Temp\xDamgerV3\xDamgerV3.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Drops startup file
- Executes dropped EXE
PID:972
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Views/modifies file attributes
PID:3040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD525da9374ef976e9342b8341002b92448
SHA1a7c8b1d75ecb7d9037b0ca0b75b271b45da95fa2
SHA256280e0d55651d003b8aa2754cd47f84d7f0749e3b43787814c754fb71a357bfc2
SHA512e4ce0f1219f040a1c6dafd44d95240ea7075dcefbc20f3b2ef43c116c8ba7f4258e0f1ce6b8497be17a70defdabe61120d9923a327fe4bd4c89f1b0df40dbaab
-
Filesize
27KB
MD525da9374ef976e9342b8341002b92448
SHA1a7c8b1d75ecb7d9037b0ca0b75b271b45da95fa2
SHA256280e0d55651d003b8aa2754cd47f84d7f0749e3b43787814c754fb71a357bfc2
SHA512e4ce0f1219f040a1c6dafd44d95240ea7075dcefbc20f3b2ef43c116c8ba7f4258e0f1ce6b8497be17a70defdabe61120d9923a327fe4bd4c89f1b0df40dbaab
-
Filesize
27KB
MD525da9374ef976e9342b8341002b92448
SHA1a7c8b1d75ecb7d9037b0ca0b75b271b45da95fa2
SHA256280e0d55651d003b8aa2754cd47f84d7f0749e3b43787814c754fb71a357bfc2
SHA512e4ce0f1219f040a1c6dafd44d95240ea7075dcefbc20f3b2ef43c116c8ba7f4258e0f1ce6b8497be17a70defdabe61120d9923a327fe4bd4c89f1b0df40dbaab
-
Filesize
1KB
MD5937e7212c4aaf0d9a98c864adeeef338
SHA175fd9e534c45349f34e19003c31eafe22e540ad1
SHA256c24bb82e26e3dcc2045191f22cb85e2a39a3bd6be1d94f4f7610bf7867515a5e
SHA5129927fed448c0086a8da687c57af1da761584b36f6f60098b0d4fdafed3aa79893c43fd6acb3346fe6e738e34e0373fe0b6daf27544b68e3e3938f698967817d5
-
Filesize
1KB
MD53eb88dfe6738d549be5f2909247345c9
SHA16e11c4462eaf06430a621be1ef4461f3a77b7e1b
SHA2563d5c5af4c3ca467fd426d9d2deb0897fcea8a733d0034d97212fbc8644676525
SHA51256d28d19005166106548e024107516818270ee9d9a94ca55004bca3851d88b56082f72db72170ca1e215a106e4476157006652d755f0af3c98653aef76190756