Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/04/2023, 22:11
Behavioral task
behavioral1
Sample
002c9b357b4d75703ef43bfd202e1fdc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
002c9b357b4d75703ef43bfd202e1fdc.exe
Resource
win10v2004-20230220-en
General
-
Target
002c9b357b4d75703ef43bfd202e1fdc.exe
-
Size
37KB
-
MD5
002c9b357b4d75703ef43bfd202e1fdc
-
SHA1
2a094353218f0b5e7ce33929c2b921fa5de2f1a8
-
SHA256
5952410be9024c73511bed6734b10c99e250b9bab5fb09823e75dde6da4384fa
-
SHA512
28b244fc930ca13107789c49a9c1a2dfb0aba949a4a34ad9692253982f43d12c16462e710e5a5483d59bd5310c32a281d5b3949328866f652771b014701e31b2
-
SSDEEP
384:MQ8CT0i99dTe/kCOyU79ePb2DvcpLrAF+rMRTyN/0L+EcoinblneHQM3epzXONr3:Thj1CFU79eqbcVrM+rMRa8Nuo/t
Malware Config
Extracted
njrat
im523
HacKed
0.tcp.eu.ngrok.io:10172
ffabde1a794c3d8f6a71509abf7c07f2
-
reg_key
ffabde1a794c3d8f6a71509abf7c07f2
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 328 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ffabde1a794c3d8f6a71509abf7c07f2.exe chntpw.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ffabde1a794c3d8f6a71509abf7c07f2.exe chntpw.exe -
Executes dropped EXE 1 IoCs
pid Process 888 chntpw.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 002c9b357b4d75703ef43bfd202e1fdc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\ffabde1a794c3d8f6a71509abf7c07f2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\chntpw.exe\" .." chntpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ffabde1a794c3d8f6a71509abf7c07f2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\chntpw.exe\" .." chntpw.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe 888 chntpw.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 888 chntpw.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe Token: 33 888 chntpw.exe Token: SeIncBasePriorityPrivilege 888 chntpw.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2036 wrote to memory of 888 2036 002c9b357b4d75703ef43bfd202e1fdc.exe 28 PID 2036 wrote to memory of 888 2036 002c9b357b4d75703ef43bfd202e1fdc.exe 28 PID 2036 wrote to memory of 888 2036 002c9b357b4d75703ef43bfd202e1fdc.exe 28 PID 2036 wrote to memory of 888 2036 002c9b357b4d75703ef43bfd202e1fdc.exe 28 PID 888 wrote to memory of 328 888 chntpw.exe 29 PID 888 wrote to memory of 328 888 chntpw.exe 29 PID 888 wrote to memory of 328 888 chntpw.exe 29 PID 888 wrote to memory of 328 888 chntpw.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\002c9b357b4d75703ef43bfd202e1fdc.exe"C:\Users\Admin\AppData\Local\Temp\002c9b357b4d75703ef43bfd202e1fdc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\chntpw.exe"C:\Users\Admin\AppData\Local\Temp\chntpw.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\chntpw.exe" "chntpw.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5002c9b357b4d75703ef43bfd202e1fdc
SHA12a094353218f0b5e7ce33929c2b921fa5de2f1a8
SHA2565952410be9024c73511bed6734b10c99e250b9bab5fb09823e75dde6da4384fa
SHA51228b244fc930ca13107789c49a9c1a2dfb0aba949a4a34ad9692253982f43d12c16462e710e5a5483d59bd5310c32a281d5b3949328866f652771b014701e31b2
-
Filesize
37KB
MD5002c9b357b4d75703ef43bfd202e1fdc
SHA12a094353218f0b5e7ce33929c2b921fa5de2f1a8
SHA2565952410be9024c73511bed6734b10c99e250b9bab5fb09823e75dde6da4384fa
SHA51228b244fc930ca13107789c49a9c1a2dfb0aba949a4a34ad9692253982f43d12c16462e710e5a5483d59bd5310c32a281d5b3949328866f652771b014701e31b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ffabde1a794c3d8f6a71509abf7c07f2.exe
Filesize37KB
MD5002c9b357b4d75703ef43bfd202e1fdc
SHA12a094353218f0b5e7ce33929c2b921fa5de2f1a8
SHA2565952410be9024c73511bed6734b10c99e250b9bab5fb09823e75dde6da4384fa
SHA51228b244fc930ca13107789c49a9c1a2dfb0aba949a4a34ad9692253982f43d12c16462e710e5a5483d59bd5310c32a281d5b3949328866f652771b014701e31b2
-
Filesize
37KB
MD5002c9b357b4d75703ef43bfd202e1fdc
SHA12a094353218f0b5e7ce33929c2b921fa5de2f1a8
SHA2565952410be9024c73511bed6734b10c99e250b9bab5fb09823e75dde6da4384fa
SHA51228b244fc930ca13107789c49a9c1a2dfb0aba949a4a34ad9692253982f43d12c16462e710e5a5483d59bd5310c32a281d5b3949328866f652771b014701e31b2