Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2023 08:39
Static task
static1
Behavioral task
behavioral1
Sample
Respalo.exe
Resource
win7-20230220-en
General
-
Target
Respalo.exe
-
Size
101KB
-
MD5
964c11b64832dfc0228228dc3041ad30
-
SHA1
44340a21dd37096807675f8ca68a111031480d01
-
SHA256
c015c0871db838b7225f72b293fdb88dbcea09aa258cfb5fe18e986072e9f793
-
SHA512
c0e843952d423335491f68169d67575a67952b5b7efeb98632f6d66453b1cae1440232f7c5fa8e7cf92cc8a9f5c8fa22ca522264968affff3aedb2997045fb9b
-
SSDEEP
1536:Q+CwHaUlNvEH6vBZkZcv9y5aD3BbOOzfso5fQT/inO3163BEDa:Q+voEBe35aD3BbOWso5fQDinQ63B+a
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
respaldo2424.duckdns.org:9090
c959d74c7c9745cb
-
reg_key
c959d74c7c9745cb
-
splitter
@!#&^%$
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ploksdfgh.exeploksdfgh.exepid process 2844 ploksdfgh.exe 2640 ploksdfgh.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
Respalo.exeploksdfgh.exeploksdfgh.exedescription pid process target process PID 4212 set thread context of 4232 4212 Respalo.exe vbc.exe PID 2844 set thread context of 2040 2844 ploksdfgh.exe vbc.exe PID 2640 set thread context of 532 2640 ploksdfgh.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 5000 schtasks.exe 4296 schtasks.exe 1548 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe Token: 33 4232 vbc.exe Token: SeIncBasePriorityPrivilege 4232 vbc.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
Respalo.execmd.exeploksdfgh.execmd.exeploksdfgh.execmd.exedescription pid process target process PID 4212 wrote to memory of 4232 4212 Respalo.exe vbc.exe PID 4212 wrote to memory of 4232 4212 Respalo.exe vbc.exe PID 4212 wrote to memory of 4232 4212 Respalo.exe vbc.exe PID 4212 wrote to memory of 4232 4212 Respalo.exe vbc.exe PID 4212 wrote to memory of 4232 4212 Respalo.exe vbc.exe PID 4212 wrote to memory of 4232 4212 Respalo.exe vbc.exe PID 4212 wrote to memory of 4232 4212 Respalo.exe vbc.exe PID 4212 wrote to memory of 4232 4212 Respalo.exe vbc.exe PID 4212 wrote to memory of 1532 4212 Respalo.exe cmd.exe PID 4212 wrote to memory of 1532 4212 Respalo.exe cmd.exe PID 4212 wrote to memory of 1532 4212 Respalo.exe cmd.exe PID 4212 wrote to memory of 3736 4212 Respalo.exe cmd.exe PID 4212 wrote to memory of 3736 4212 Respalo.exe cmd.exe PID 4212 wrote to memory of 3736 4212 Respalo.exe cmd.exe PID 3736 wrote to memory of 5000 3736 cmd.exe schtasks.exe PID 3736 wrote to memory of 5000 3736 cmd.exe schtasks.exe PID 3736 wrote to memory of 5000 3736 cmd.exe schtasks.exe PID 4212 wrote to memory of 1156 4212 Respalo.exe cmd.exe PID 4212 wrote to memory of 1156 4212 Respalo.exe cmd.exe PID 4212 wrote to memory of 1156 4212 Respalo.exe cmd.exe PID 2844 wrote to memory of 2040 2844 ploksdfgh.exe vbc.exe PID 2844 wrote to memory of 2040 2844 ploksdfgh.exe vbc.exe PID 2844 wrote to memory of 2040 2844 ploksdfgh.exe vbc.exe PID 2844 wrote to memory of 2040 2844 ploksdfgh.exe vbc.exe PID 2844 wrote to memory of 2040 2844 ploksdfgh.exe vbc.exe PID 2844 wrote to memory of 2040 2844 ploksdfgh.exe vbc.exe PID 2844 wrote to memory of 2040 2844 ploksdfgh.exe vbc.exe PID 2844 wrote to memory of 2040 2844 ploksdfgh.exe vbc.exe PID 2844 wrote to memory of 1824 2844 ploksdfgh.exe cmd.exe PID 2844 wrote to memory of 1824 2844 ploksdfgh.exe cmd.exe PID 2844 wrote to memory of 1824 2844 ploksdfgh.exe cmd.exe PID 2844 wrote to memory of 2536 2844 ploksdfgh.exe cmd.exe PID 2844 wrote to memory of 2536 2844 ploksdfgh.exe cmd.exe PID 2844 wrote to memory of 2536 2844 ploksdfgh.exe cmd.exe PID 2536 wrote to memory of 4296 2536 cmd.exe schtasks.exe PID 2536 wrote to memory of 4296 2536 cmd.exe schtasks.exe PID 2536 wrote to memory of 4296 2536 cmd.exe schtasks.exe PID 2844 wrote to memory of 1652 2844 ploksdfgh.exe cmd.exe PID 2844 wrote to memory of 1652 2844 ploksdfgh.exe cmd.exe PID 2844 wrote to memory of 1652 2844 ploksdfgh.exe cmd.exe PID 2640 wrote to memory of 532 2640 ploksdfgh.exe vbc.exe PID 2640 wrote to memory of 532 2640 ploksdfgh.exe vbc.exe PID 2640 wrote to memory of 532 2640 ploksdfgh.exe vbc.exe PID 2640 wrote to memory of 532 2640 ploksdfgh.exe vbc.exe PID 2640 wrote to memory of 532 2640 ploksdfgh.exe vbc.exe PID 2640 wrote to memory of 532 2640 ploksdfgh.exe vbc.exe PID 2640 wrote to memory of 532 2640 ploksdfgh.exe vbc.exe PID 2640 wrote to memory of 532 2640 ploksdfgh.exe vbc.exe PID 2640 wrote to memory of 1940 2640 ploksdfgh.exe cmd.exe PID 2640 wrote to memory of 1940 2640 ploksdfgh.exe cmd.exe PID 2640 wrote to memory of 1940 2640 ploksdfgh.exe cmd.exe PID 2640 wrote to memory of 3552 2640 ploksdfgh.exe cmd.exe PID 2640 wrote to memory of 3552 2640 ploksdfgh.exe cmd.exe PID 2640 wrote to memory of 3552 2640 ploksdfgh.exe cmd.exe PID 3552 wrote to memory of 1548 3552 cmd.exe schtasks.exe PID 3552 wrote to memory of 1548 3552 cmd.exe schtasks.exe PID 3552 wrote to memory of 1548 3552 cmd.exe schtasks.exe PID 2640 wrote to memory of 1596 2640 ploksdfgh.exe cmd.exe PID 2640 wrote to memory of 1596 2640 ploksdfgh.exe cmd.exe PID 2640 wrote to memory of 1596 2640 ploksdfgh.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Respalo.exe"C:\Users\Admin\AppData\Local\Temp\Respalo.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\ploksdfgh"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Respalo.exe" "C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exeC:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\ploksdfgh"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe" "C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exeC:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\ploksdfgh"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe" "C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ploksdfgh.exe.logFilesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vbc.exe.logFilesize
418B
MD589c8a5340eb284f551067d44e27ae8dd
SHA1d2431ae25a1ab67762a5125574f046f4c951d297
SHA25673ca1f27b1c153e3405856ebe8b3c6cdd23424d2ab09c0fe1eb0e2075513057b
SHA512b101ac2e008bd3cc6f97fedb97b8253fb07fed1c334629ecbebe0f4942ccc1070491cddc4daea521164543b6f97ba9b99d2be1c50cc5a013f04e697fea9dbdac
-
C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exeFilesize
101KB
MD5964c11b64832dfc0228228dc3041ad30
SHA144340a21dd37096807675f8ca68a111031480d01
SHA256c015c0871db838b7225f72b293fdb88dbcea09aa258cfb5fe18e986072e9f793
SHA512c0e843952d423335491f68169d67575a67952b5b7efeb98632f6d66453b1cae1440232f7c5fa8e7cf92cc8a9f5c8fa22ca522264968affff3aedb2997045fb9b
-
C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exeFilesize
101KB
MD5964c11b64832dfc0228228dc3041ad30
SHA144340a21dd37096807675f8ca68a111031480d01
SHA256c015c0871db838b7225f72b293fdb88dbcea09aa258cfb5fe18e986072e9f793
SHA512c0e843952d423335491f68169d67575a67952b5b7efeb98632f6d66453b1cae1440232f7c5fa8e7cf92cc8a9f5c8fa22ca522264968affff3aedb2997045fb9b
-
C:\Users\Admin\AppData\Roaming\ploksdfgh\ploksdfgh.exeFilesize
101KB
MD5964c11b64832dfc0228228dc3041ad30
SHA144340a21dd37096807675f8ca68a111031480d01
SHA256c015c0871db838b7225f72b293fdb88dbcea09aa258cfb5fe18e986072e9f793
SHA512c0e843952d423335491f68169d67575a67952b5b7efeb98632f6d66453b1cae1440232f7c5fa8e7cf92cc8a9f5c8fa22ca522264968affff3aedb2997045fb9b
-
memory/2640-155-0x0000000003110000-0x0000000003120000-memory.dmpFilesize
64KB
-
memory/2844-148-0x0000000005550000-0x0000000005560000-memory.dmpFilesize
64KB
-
memory/4212-134-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/4212-133-0x00000000005F0000-0x0000000000610000-memory.dmpFilesize
128KB
-
memory/4232-137-0x0000000005E10000-0x00000000063B4000-memory.dmpFilesize
5.6MB
-
memory/4232-144-0x0000000005A30000-0x0000000005A40000-memory.dmpFilesize
64KB
-
memory/4232-143-0x0000000005980000-0x000000000598A000-memory.dmpFilesize
40KB
-
memory/4232-142-0x0000000005A30000-0x0000000005A40000-memory.dmpFilesize
64KB
-
memory/4232-141-0x0000000005A40000-0x0000000005AD2000-memory.dmpFilesize
584KB
-
memory/4232-136-0x00000000057C0000-0x000000000585C000-memory.dmpFilesize
624KB
-
memory/4232-135-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB