Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2023 12:41
Static task
static1
Behavioral task
behavioral1
Sample
78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe
Resource
win10v2004-20230221-en
General
-
Target
78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe
-
Size
5KB
-
MD5
a3ec2027f8d685fb7d65e879f7a1fb3c
-
SHA1
de8b092a6c5344ecaa58f32f26470dc1f6816de6
-
SHA256
78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268
-
SHA512
0d1bfdf84b9ed23013d39ae2e7b98dcbc29eaf49e6efb6a7cf43087c4a5e714b0a2fad1013eacbd067a8347bfdd1df3908649b2eaa2b7ec57fddf1024959e4b2
-
SSDEEP
48:61aZr5mf/241GpgU2tHBLEO11SNMzf+Gc+aMa9iMs+t4q34V/q54tM0lXiH/IFCH:rcgB2fLL+GrcTu5VLlK7zNt
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
mYs7erY-22338.portmap.host:22338
6286f06a10ca5fcb83180126dff9c67f
-
reg_key
6286f06a10ca5fcb83180126dff9c67f
-
splitter
Y262SUCZ4UJJ
Signatures
-
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exewr55pjzl.3hl.batdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation wr55pjzl.3hl.bat -
Drops startup file 2 IoCs
Processes:
dllhost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6286f06a10ca5fcb83180126dff9c67f.exe dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6286f06a10ca5fcb83180126dff9c67f.exe dllhost.exe -
Executes dropped EXE 5 IoCs
Processes:
wr55pjzl.3hl.batdllhost.exedllhost.exedllhost.exedllhost.exepid process 4316 wr55pjzl.3hl.bat 3492 dllhost.exe 2816 dllhost.exe 2484 dllhost.exe 1212 dllhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6286f06a10ca5fcb83180126dff9c67f = "\"C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe\" .." dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6286f06a10ca5fcb83180126dff9c67f = "\"C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe\" .." dllhost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 808 sc.exe 392 sc.exe 2176 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wr55pjzl.3hl.batpid process 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat 4316 wr55pjzl.3hl.bat -
Suspicious use of AdjustPrivilegeToken 39 IoCs
Processes:
78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exewr55pjzl.3hl.batdllhost.exepowershell.exedllhost.exedllhost.exedllhost.exedescription pid process Token: SeDebugPrivilege 3724 78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe Token: SeDebugPrivilege 4316 wr55pjzl.3hl.bat Token: SeDebugPrivilege 3492 dllhost.exe Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 2816 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: SeDebugPrivilege 2484 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe Token: SeDebugPrivilege 1212 dllhost.exe Token: 33 3492 dllhost.exe Token: SeIncBasePriorityPrivilege 3492 dllhost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exewr55pjzl.3hl.batdllhost.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3724 wrote to memory of 4316 3724 78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe wr55pjzl.3hl.bat PID 3724 wrote to memory of 4316 3724 78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe wr55pjzl.3hl.bat PID 4316 wrote to memory of 3492 4316 wr55pjzl.3hl.bat dllhost.exe PID 4316 wrote to memory of 3492 4316 wr55pjzl.3hl.bat dllhost.exe PID 3492 wrote to memory of 60 3492 dllhost.exe attrib.exe PID 3492 wrote to memory of 60 3492 dllhost.exe attrib.exe PID 3492 wrote to memory of 1964 3492 dllhost.exe cmd.exe PID 3492 wrote to memory of 1964 3492 dllhost.exe cmd.exe PID 1964 wrote to memory of 2204 1964 cmd.exe powershell.exe PID 1964 wrote to memory of 2204 1964 cmd.exe powershell.exe PID 3492 wrote to memory of 4492 3492 dllhost.exe cmd.exe PID 3492 wrote to memory of 4492 3492 dllhost.exe cmd.exe PID 4492 wrote to memory of 808 4492 cmd.exe sc.exe PID 4492 wrote to memory of 808 4492 cmd.exe sc.exe PID 3492 wrote to memory of 4088 3492 dllhost.exe cmd.exe PID 3492 wrote to memory of 4088 3492 dllhost.exe cmd.exe PID 4088 wrote to memory of 392 4088 cmd.exe sc.exe PID 4088 wrote to memory of 392 4088 cmd.exe sc.exe PID 3492 wrote to memory of 2248 3492 dllhost.exe cmd.exe PID 3492 wrote to memory of 2248 3492 dllhost.exe cmd.exe PID 2248 wrote to memory of 2176 2248 cmd.exe sc.exe PID 2248 wrote to memory of 2176 2248 cmd.exe sc.exe PID 3492 wrote to memory of 1536 3492 dllhost.exe schtasks.exe PID 3492 wrote to memory of 1536 3492 dllhost.exe schtasks.exe PID 3492 wrote to memory of 4360 3492 dllhost.exe schtasks.exe PID 3492 wrote to memory of 4360 3492 dllhost.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe"C:\Users\Admin\AppData\Local\Temp\78dc792c0a29bf15cdea3b97ff30b8c9741f14f4cac60ef302694addc919d268.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wr55pjzl.3hl.bat"C:\Users\Admin\AppData\Local\Temp\wr55pjzl.3hl.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\attrib.exeattrib +h "C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Views/modifies file attributes
-
C:\Windows\SYSTEM32\cmd.execmd /c powershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /c sc query windefend4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc query windefend5⤵
- Launches sc.exe
-
C:\Windows\SYSTEM32\cmd.execmd /c sc stop windefend4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop windefend5⤵
- Launches sc.exe
-
C:\Windows\SYSTEM32\cmd.execmd /c sc delete windefend4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc delete windefend5⤵
- Launches sc.exe
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn CleanSweepCheck /f4⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Roaming\dllhost.exe4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\dllhost.exeC:\Users\Admin\AppData\Roaming\dllhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\dllhost.exeC:\Users\Admin\AppData\Roaming\dllhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\dllhost.exeC:\Users\Admin\AppData\Roaming\dllhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\dllhost.exe.logFilesize
319B
MD526ca4897aad21f536806c5e7925976e7
SHA1f072e5b6bfd7ce28dbb16f162d9a4e05690fcbd8
SHA2561c5b33fb22baaa5f9f1400e86f650aa4694387cdfa4835d3f60bebf203a491fd
SHA5120f16a7f7fb34550bd91f042b2005cdc4233ca3e4be650abb832ff2f253358d7aa5fde1de4e1d9fc9e6cf971f1ed343ae6b575988083d9c4e3c6af96bdfb5d5a1
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1ywlezh1.ibc.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\wr55pjzl.3hl.batFilesize
32KB
MD522b6825f2e779a6a3b679dfdedc71f00
SHA106ec4fd5e1d5931070ec9404903abced2747124f
SHA256daaf688745f8e4157d0c8f3850ef10f93ff09c11e2dad11f274bbe5bcbdb2bbc
SHA5121b4288b7f1f4537c37ef7500c7057528d490e8b0f384ba32b76e57aed3e5e98501b19c77713bfb68481dcd7f98808a900dce93e4f62ff465741b117ad21c60b4
-
C:\Users\Admin\AppData\Local\Temp\wr55pjzl.3hl.batFilesize
32KB
MD522b6825f2e779a6a3b679dfdedc71f00
SHA106ec4fd5e1d5931070ec9404903abced2747124f
SHA256daaf688745f8e4157d0c8f3850ef10f93ff09c11e2dad11f274bbe5bcbdb2bbc
SHA5121b4288b7f1f4537c37ef7500c7057528d490e8b0f384ba32b76e57aed3e5e98501b19c77713bfb68481dcd7f98808a900dce93e4f62ff465741b117ad21c60b4
-
C:\Users\Admin\AppData\Roaming\dllhost.exeFilesize
32KB
MD522b6825f2e779a6a3b679dfdedc71f00
SHA106ec4fd5e1d5931070ec9404903abced2747124f
SHA256daaf688745f8e4157d0c8f3850ef10f93ff09c11e2dad11f274bbe5bcbdb2bbc
SHA5121b4288b7f1f4537c37ef7500c7057528d490e8b0f384ba32b76e57aed3e5e98501b19c77713bfb68481dcd7f98808a900dce93e4f62ff465741b117ad21c60b4
-
C:\Users\Admin\AppData\Roaming\dllhost.exeFilesize
32KB
MD522b6825f2e779a6a3b679dfdedc71f00
SHA106ec4fd5e1d5931070ec9404903abced2747124f
SHA256daaf688745f8e4157d0c8f3850ef10f93ff09c11e2dad11f274bbe5bcbdb2bbc
SHA5121b4288b7f1f4537c37ef7500c7057528d490e8b0f384ba32b76e57aed3e5e98501b19c77713bfb68481dcd7f98808a900dce93e4f62ff465741b117ad21c60b4
-
C:\Users\Admin\AppData\Roaming\dllhost.exeFilesize
32KB
MD522b6825f2e779a6a3b679dfdedc71f00
SHA106ec4fd5e1d5931070ec9404903abced2747124f
SHA256daaf688745f8e4157d0c8f3850ef10f93ff09c11e2dad11f274bbe5bcbdb2bbc
SHA5121b4288b7f1f4537c37ef7500c7057528d490e8b0f384ba32b76e57aed3e5e98501b19c77713bfb68481dcd7f98808a900dce93e4f62ff465741b117ad21c60b4
-
C:\Users\Admin\AppData\Roaming\dllhost.exeFilesize
32KB
MD522b6825f2e779a6a3b679dfdedc71f00
SHA106ec4fd5e1d5931070ec9404903abced2747124f
SHA256daaf688745f8e4157d0c8f3850ef10f93ff09c11e2dad11f274bbe5bcbdb2bbc
SHA5121b4288b7f1f4537c37ef7500c7057528d490e8b0f384ba32b76e57aed3e5e98501b19c77713bfb68481dcd7f98808a900dce93e4f62ff465741b117ad21c60b4
-
C:\Users\Admin\AppData\Roaming\dllhost.exeFilesize
32KB
MD522b6825f2e779a6a3b679dfdedc71f00
SHA106ec4fd5e1d5931070ec9404903abced2747124f
SHA256daaf688745f8e4157d0c8f3850ef10f93ff09c11e2dad11f274bbe5bcbdb2bbc
SHA5121b4288b7f1f4537c37ef7500c7057528d490e8b0f384ba32b76e57aed3e5e98501b19c77713bfb68481dcd7f98808a900dce93e4f62ff465741b117ad21c60b4
-
C:\Users\Admin\AppData\Roaming\dllhost.exeFilesize
32KB
MD522b6825f2e779a6a3b679dfdedc71f00
SHA106ec4fd5e1d5931070ec9404903abced2747124f
SHA256daaf688745f8e4157d0c8f3850ef10f93ff09c11e2dad11f274bbe5bcbdb2bbc
SHA5121b4288b7f1f4537c37ef7500c7057528d490e8b0f384ba32b76e57aed3e5e98501b19c77713bfb68481dcd7f98808a900dce93e4f62ff465741b117ad21c60b4
-
memory/1212-186-0x00000000011C0000-0x00000000011D4000-memory.dmpFilesize
80KB
-
memory/1212-187-0x00000000013C0000-0x00000000013D0000-memory.dmpFilesize
64KB
-
memory/2204-168-0x0000019A36CB0000-0x0000019A36CC0000-memory.dmpFilesize
64KB
-
memory/2204-166-0x0000019A1E700000-0x0000019A1E722000-memory.dmpFilesize
136KB
-
memory/2204-167-0x0000019A36CB0000-0x0000019A36CC0000-memory.dmpFilesize
64KB
-
memory/2484-183-0x00000000010E0000-0x00000000010F0000-memory.dmpFilesize
64KB
-
memory/2484-184-0x000000001B430000-0x000000001B444000-memory.dmpFilesize
80KB
-
memory/2816-178-0x0000000001760000-0x0000000001770000-memory.dmpFilesize
64KB
-
memory/2816-177-0x0000000001410000-0x0000000001424000-memory.dmpFilesize
80KB
-
memory/3492-155-0x0000000000EE0000-0x0000000000EF4000-memory.dmpFilesize
80KB
-
memory/3492-173-0x000000001BC50000-0x000000001BC58000-memory.dmpFilesize
32KB
-
memory/3492-174-0x0000000000F30000-0x0000000000F40000-memory.dmpFilesize
64KB
-
memory/3492-175-0x0000000000F30000-0x0000000000F40000-memory.dmpFilesize
64KB
-
memory/3492-156-0x0000000000F30000-0x0000000000F40000-memory.dmpFilesize
64KB
-
memory/3492-172-0x000000001C4F0000-0x000000001C58C000-memory.dmpFilesize
624KB
-
memory/3492-180-0x0000000000F30000-0x0000000000F40000-memory.dmpFilesize
64KB
-
memory/3724-133-0x0000000000EE0000-0x0000000000EE8000-memory.dmpFilesize
32KB
-
memory/3724-134-0x00000000058B0000-0x00000000058C0000-memory.dmpFilesize
64KB
-
memory/4316-145-0x0000000000D20000-0x0000000000D30000-memory.dmpFilesize
64KB
-
memory/4316-144-0x000000001C030000-0x000000001C0D6000-memory.dmpFilesize
664KB
-
memory/4316-143-0x0000000001080000-0x0000000001094000-memory.dmpFilesize
80KB
-
memory/4316-142-0x000000001BA80000-0x000000001BF4E000-memory.dmpFilesize
4.8MB
-
memory/4316-141-0x00000000007D0000-0x00000000007D8000-memory.dmpFilesize
32KB