Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 23:52
Behavioral task
behavioral1
Sample
cfcee11e3100662568f6dc68a1058a7e.exe
Resource
win7-20230220-en
General
-
Target
cfcee11e3100662568f6dc68a1058a7e.exe
-
Size
93KB
-
MD5
cfcee11e3100662568f6dc68a1058a7e
-
SHA1
c8662a4be2b73a1e45f54a55bf0c627b9f4965c7
-
SHA256
3b0dd3f9dfc4302b9965dbed206dbd381aef984f1302cfeb9f1709a0fec7f3fc
-
SHA512
daecdf1bd0e4e1d43b64d36c094c9bed135a54aec847510c6b34d8deb4752db9e3a8e8456445b88de3ee0dc354f94f8f3cea9d74bcf73c48d4f9351229e76abe
-
SSDEEP
1536:Hm0YeVBvb5Lncb1AG8jEwzGi1dD+DQgS:Hm8Bvb57cBbdi1dY5
Malware Config
Extracted
njrat
0.7d
LOX
NC50Y3AuZXUubmdyb2suaW8Strik:MTc1Mzg=
84211ece177abd5f84de6311a704f29d
-
reg_key
84211ece177abd5f84de6311a704f29d
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 3 IoCs
pid Process 448 netsh.exe 3596 netsh.exe 1408 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation cfcee11e3100662568f6dc68a1058a7e.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 3996 server.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe 3996 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3996 server.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe Token: 33 3996 server.exe Token: SeIncBasePriorityPrivilege 3996 server.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 676 wrote to memory of 3996 676 cfcee11e3100662568f6dc68a1058a7e.exe 85 PID 676 wrote to memory of 3996 676 cfcee11e3100662568f6dc68a1058a7e.exe 85 PID 676 wrote to memory of 3996 676 cfcee11e3100662568f6dc68a1058a7e.exe 85 PID 3996 wrote to memory of 3596 3996 server.exe 88 PID 3996 wrote to memory of 3596 3996 server.exe 88 PID 3996 wrote to memory of 3596 3996 server.exe 88 PID 3996 wrote to memory of 448 3996 server.exe 92 PID 3996 wrote to memory of 448 3996 server.exe 92 PID 3996 wrote to memory of 448 3996 server.exe 92 PID 3996 wrote to memory of 1408 3996 server.exe 91 PID 3996 wrote to memory of 1408 3996 server.exe 91 PID 3996 wrote to memory of 1408 3996 server.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfcee11e3100662568f6dc68a1058a7e.exe"C:\Users\Admin\AppData\Local\Temp\cfcee11e3100662568f6dc68a1058a7e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:3596
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1408
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe"3⤵
- Modifies Windows Firewall
PID:448
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD5c2844bc9e1bd64168a727b0680ae4d90
SHA17bb263540de557f5a4e09c6c78b7dbb314a0df9a
SHA2569c9701ab918368b615fc6a0dbeb5efa286a232d751982ae70b48ad6914bf01e5
SHA512360953bb20d91539022fcb1becf4638970c4452816797a8dca65e3ae4a542302e6e89f0828087caaa63a0750aa78605f8034da7c8663fa4fc677c8f3e53655ed
-
Filesize
93KB
MD5cfcee11e3100662568f6dc68a1058a7e
SHA1c8662a4be2b73a1e45f54a55bf0c627b9f4965c7
SHA2563b0dd3f9dfc4302b9965dbed206dbd381aef984f1302cfeb9f1709a0fec7f3fc
SHA512daecdf1bd0e4e1d43b64d36c094c9bed135a54aec847510c6b34d8deb4752db9e3a8e8456445b88de3ee0dc354f94f8f3cea9d74bcf73c48d4f9351229e76abe
-
Filesize
93KB
MD5cfcee11e3100662568f6dc68a1058a7e
SHA1c8662a4be2b73a1e45f54a55bf0c627b9f4965c7
SHA2563b0dd3f9dfc4302b9965dbed206dbd381aef984f1302cfeb9f1709a0fec7f3fc
SHA512daecdf1bd0e4e1d43b64d36c094c9bed135a54aec847510c6b34d8deb4752db9e3a8e8456445b88de3ee0dc354f94f8f3cea9d74bcf73c48d4f9351229e76abe
-
Filesize
93KB
MD5cfcee11e3100662568f6dc68a1058a7e
SHA1c8662a4be2b73a1e45f54a55bf0c627b9f4965c7
SHA2563b0dd3f9dfc4302b9965dbed206dbd381aef984f1302cfeb9f1709a0fec7f3fc
SHA512daecdf1bd0e4e1d43b64d36c094c9bed135a54aec847510c6b34d8deb4752db9e3a8e8456445b88de3ee0dc354f94f8f3cea9d74bcf73c48d4f9351229e76abe