Analysis

  • max time kernel
    26s
  • max time network
    28s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2023 07:00

General

  • Target

    nixware crack.dll

  • Size

    131KB

  • MD5

    9e2a655b74dd710c229750deadccd76f

  • SHA1

    171596d21b5ba58aed4ece7f23bd5ee0b50a853d

  • SHA256

    6caf2e1e6496de3efe605e8789bd5fd2b00649974292b4b2e850d4524c103eec

  • SHA512

    65a34dd2ca72e161189bca733eb24a7c0b0ee22c3b39b65c78db995c5cc4dea1cd693630c9c984965be86d81ff4968291f5ebd76e180df421d074c6267b70169

  • SSDEEP

    3072:G24KYnxDl1SlpejXNEFJUFew/UWjKoamC3uDz6iksXQl4BounDFtnUWO2fiL:T4NnRl4leG7iUVmC3w6uBDn4k6L

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

mYs7erY2-20549.portmap.host:20549

Mutex

c7ecaeb62dbc9789b90e03340b3fcb9e

Attributes
  • reg_key

    c7ecaeb62dbc9789b90e03340b3fcb9e

  • splitter

    Y262SUCZ4UJJ

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\nixware crack.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\nixware crack.dll",#1
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:788
      • C:\Users\Admin\AppData\Local\Temp\~ZYA4C0.tmp
        C:\Users\Admin\AppData\Local\Temp\~ZYA4C0.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Users\Admin\AppData\Roaming\dllhost.exe
          "C:\Users\Admin\AppData\Roaming\dllhost.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3264
          • C:\Windows\SYSTEM32\attrib.exe
            attrib +h "C:\Users\Admin\AppData\Roaming\dllhost.exe"
            5⤵
            • Views/modifies file attributes
            PID:5012
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3928
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Set-MpPreference -DisableRealtimeMonitoring $true
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3076
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c sc query windefend
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2792
            • C:\Windows\system32\sc.exe
              sc query windefend
              6⤵
              • Launches sc.exe
              PID:1828
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c sc stop windefend
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4604
            • C:\Windows\system32\sc.exe
              sc stop windefend
              6⤵
              • Launches sc.exe
              PID:4296
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c sc delete windefend
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1128
            • C:\Windows\system32\sc.exe
              sc delete windefend
              6⤵
              • Launches sc.exe
              PID:5064
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /tn CleanSweepCheck /f
            5⤵
              PID:4404
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Roaming\dllhost.exe
              5⤵
              • Creates scheduled task(s)
              PID:1368

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Hidden Files and Directories

    1
    T1158

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Impair Defenses

    1
    T1562

    Modify Registry

    1
    T1112

    Hidden Files and Directories

    1
    T1158

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Impact

    Service Stop

    1
    T1489

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_la2tum5z.kpj.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\~ZYA4C0.tmp
      Filesize

      32KB

      MD5

      97ad4704dac3a3e05dab32f5952e5122

      SHA1

      fe121757efc0e1898ee2b07d243ba8b17b446989

      SHA256

      86a9b3365ad9eb2e912253ffea5b42fe427c9a9bed310812ae66a07c233eef9d

      SHA512

      bf11f0341eb6bf7c45b4e00db44c3d124bfaba86ece487d341a805b3c24f841b8334424c3c242fd1d6763aa55572f42290b341b1bfd03204d3a4ec8bb6092b8a

    • C:\Users\Admin\AppData\Local\Temp\~ZYA4C0.tmp
      Filesize

      32KB

      MD5

      97ad4704dac3a3e05dab32f5952e5122

      SHA1

      fe121757efc0e1898ee2b07d243ba8b17b446989

      SHA256

      86a9b3365ad9eb2e912253ffea5b42fe427c9a9bed310812ae66a07c233eef9d

      SHA512

      bf11f0341eb6bf7c45b4e00db44c3d124bfaba86ece487d341a805b3c24f841b8334424c3c242fd1d6763aa55572f42290b341b1bfd03204d3a4ec8bb6092b8a

    • C:\Users\Admin\AppData\Roaming\dllhost.exe
      Filesize

      32KB

      MD5

      97ad4704dac3a3e05dab32f5952e5122

      SHA1

      fe121757efc0e1898ee2b07d243ba8b17b446989

      SHA256

      86a9b3365ad9eb2e912253ffea5b42fe427c9a9bed310812ae66a07c233eef9d

      SHA512

      bf11f0341eb6bf7c45b4e00db44c3d124bfaba86ece487d341a805b3c24f841b8334424c3c242fd1d6763aa55572f42290b341b1bfd03204d3a4ec8bb6092b8a

    • C:\Users\Admin\AppData\Roaming\dllhost.exe
      Filesize

      32KB

      MD5

      97ad4704dac3a3e05dab32f5952e5122

      SHA1

      fe121757efc0e1898ee2b07d243ba8b17b446989

      SHA256

      86a9b3365ad9eb2e912253ffea5b42fe427c9a9bed310812ae66a07c233eef9d

      SHA512

      bf11f0341eb6bf7c45b4e00db44c3d124bfaba86ece487d341a805b3c24f841b8334424c3c242fd1d6763aa55572f42290b341b1bfd03204d3a4ec8bb6092b8a

    • C:\Users\Admin\AppData\Roaming\dllhost.exe
      Filesize

      32KB

      MD5

      97ad4704dac3a3e05dab32f5952e5122

      SHA1

      fe121757efc0e1898ee2b07d243ba8b17b446989

      SHA256

      86a9b3365ad9eb2e912253ffea5b42fe427c9a9bed310812ae66a07c233eef9d

      SHA512

      bf11f0341eb6bf7c45b4e00db44c3d124bfaba86ece487d341a805b3c24f841b8334424c3c242fd1d6763aa55572f42290b341b1bfd03204d3a4ec8bb6092b8a

    • memory/788-143-0x0000000011000000-0x0000000011083000-memory.dmp
      Filesize

      524KB

    • memory/788-133-0x0000000011000000-0x0000000011083000-memory.dmp
      Filesize

      524KB

    • memory/3076-164-0x000001BD77EA0000-0x000001BD77EC2000-memory.dmp
      Filesize

      136KB

    • memory/3076-165-0x000001BD77D60000-0x000001BD77D70000-memory.dmp
      Filesize

      64KB

    • memory/3076-167-0x000001BD77D60000-0x000001BD77D70000-memory.dmp
      Filesize

      64KB

    • memory/3076-166-0x000001BD77D60000-0x000001BD77D70000-memory.dmp
      Filesize

      64KB

    • memory/3264-153-0x0000000001290000-0x00000000012A4000-memory.dmp
      Filesize

      80KB

    • memory/3264-154-0x00000000009F0000-0x0000000000A00000-memory.dmp
      Filesize

      64KB

    • memory/3264-171-0x000000001C8F0000-0x000000001C98C000-memory.dmp
      Filesize

      624KB

    • memory/3264-172-0x00000000009F0000-0x0000000000A00000-memory.dmp
      Filesize

      64KB

    • memory/3264-173-0x000000001B700000-0x000000001B708000-memory.dmp
      Filesize

      32KB

    • memory/3264-174-0x00000000009F0000-0x0000000000A00000-memory.dmp
      Filesize

      64KB

    • memory/4700-139-0x0000000001680000-0x0000000001690000-memory.dmp
      Filesize

      64KB

    • memory/4700-138-0x0000000000E90000-0x0000000000E98000-memory.dmp
      Filesize

      32KB

    • memory/4700-142-0x000000001BDA0000-0x000000001BE46000-memory.dmp
      Filesize

      664KB

    • memory/4700-140-0x000000001C350000-0x000000001C81E000-memory.dmp
      Filesize

      4.8MB

    • memory/4700-141-0x0000000001730000-0x0000000001744000-memory.dmp
      Filesize

      80KB