Analysis

  • max time kernel
    79s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2023, 17:49

General

  • Target

    a7e5ba6eb88830abc5baa063d667d36a786cd9c845b6d3536aa2c5405332e74b.exe

  • Size

    2.0MB

  • MD5

    4a9efd5ecea388e5ce1d20b75060874b

  • SHA1

    5cd3796b22f4c126df395f4fbb4285a3997ec345

  • SHA256

    a7e5ba6eb88830abc5baa063d667d36a786cd9c845b6d3536aa2c5405332e74b

  • SHA512

    08186d35b539c1984384de0bcf36faf510b997a39f06661c9de573843357dcffbb6c7f750e578f30570dadc3fde2166ee0f1b11e1bcf883d4bef197409c6c006

  • SSDEEP

    3072:OgdUd3vlTmL/A5nzbYHnzVO9qtD2jW+/5LUa:adfiAxbYHnz5ay+/5L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7NC

Botnet

NYAN CAT

C2

juancaf4000.duckdns.org:5050

Mutex

2925ee0393c24d569

Attributes
  • reg_key

    2925ee0393c24d569

  • splitter

    @!#&^%$

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7e5ba6eb88830abc5baa063d667d36a786cd9c845b6d3536aa2c5405332e74b.exe
    "C:\Users\Admin\AppData\Local\Temp\a7e5ba6eb88830abc5baa063d667d36a786cd9c845b6d3536aa2c5405332e74b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1200
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\monost"
      2⤵
        PID:1748
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\monost\monost.exe'" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\monost\monost.exe'" /f
          3⤵
          • Creates scheduled task(s)
          PID:1756
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\a7e5ba6eb88830abc5baa063d667d36a786cd9c845b6d3536aa2c5405332e74b.exe" "C:\Users\Admin\AppData\Roaming\monost\monost.exe"
        2⤵
          PID:1148
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {7C7A490A-AB05-41D8-84D3-64E500703DDE} S-1-5-21-3948302646-268491222-1934009652-1000:KXZDHPUW\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Users\Admin\AppData\Roaming\monost\monost.exe
          C:\Users\Admin\AppData\Roaming\monost\monost.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
            3⤵
              PID:1716
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\monost"
              3⤵
                PID:1092
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\monost\monost.exe'" /f
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2000
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\monost\monost.exe'" /f
                  4⤵
                  • Creates scheduled task(s)
                  PID:1332
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\monost\monost.exe" "C:\Users\Admin\AppData\Roaming\monost\monost.exe"
                3⤵
                  PID:1244
            • C:\Windows\system32\taskmgr.exe
              "C:\Windows\system32\taskmgr.exe" /4
              1⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:1460

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\monost\monost.exe

              Filesize

              2.0MB

              MD5

              4a9efd5ecea388e5ce1d20b75060874b

              SHA1

              5cd3796b22f4c126df395f4fbb4285a3997ec345

              SHA256

              a7e5ba6eb88830abc5baa063d667d36a786cd9c845b6d3536aa2c5405332e74b

              SHA512

              08186d35b539c1984384de0bcf36faf510b997a39f06661c9de573843357dcffbb6c7f750e578f30570dadc3fde2166ee0f1b11e1bcf883d4bef197409c6c006

            • C:\Users\Admin\AppData\Roaming\monost\monost.exe

              Filesize

              2.0MB

              MD5

              4a9efd5ecea388e5ce1d20b75060874b

              SHA1

              5cd3796b22f4c126df395f4fbb4285a3997ec345

              SHA256

              a7e5ba6eb88830abc5baa063d667d36a786cd9c845b6d3536aa2c5405332e74b

              SHA512

              08186d35b539c1984384de0bcf36faf510b997a39f06661c9de573843357dcffbb6c7f750e578f30570dadc3fde2166ee0f1b11e1bcf883d4bef197409c6c006

            • memory/868-73-0x0000000000830000-0x000000000084E000-memory.dmp

              Filesize

              120KB

            • memory/1200-62-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/1200-66-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/1200-59-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/1200-60-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/1200-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

              Filesize

              4KB

            • memory/1200-57-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/1200-64-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/1200-58-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/1200-69-0x0000000000290000-0x00000000002D0000-memory.dmp

              Filesize

              256KB

            • memory/1200-70-0x0000000000290000-0x00000000002D0000-memory.dmp

              Filesize

              256KB

            • memory/1204-54-0x0000000001130000-0x000000000114E000-memory.dmp

              Filesize

              120KB

            • memory/1204-56-0x0000000004B10000-0x0000000004B50000-memory.dmp

              Filesize

              256KB

            • memory/1204-55-0x00000000002F0000-0x00000000002FE000-memory.dmp

              Filesize

              56KB

            • memory/1460-84-0x0000000140000000-0x00000001405E8000-memory.dmp

              Filesize

              5.9MB

            • memory/1460-85-0x0000000140000000-0x00000001405E8000-memory.dmp

              Filesize

              5.9MB