Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27/06/2023, 18:35
Behavioral task
behavioral1
Sample
xV0aWLFtJKKg.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
xV0aWLFtJKKg.exe
Resource
win10v2004-20230621-en
General
-
Target
xV0aWLFtJKKg.exe
-
Size
78KB
-
MD5
5658dd93a8379d6c46126a380ceb8b50
-
SHA1
4de37a6d63ebd5f89a96eb8f832c12dbf21c38ce
-
SHA256
8539d8e44e928a23ef872c5a8ad4d4e632c9f489a013a5b29d36d15ac2767b61
-
SHA512
a355e0e5b0c8b9933233951758d63fedcf4c8813b84ba9844334e4b6c2eb5b30566294bcb5fd33f6684576b77175369214f2f469a66e0b6647331f81c93dafee
-
SSDEEP
1536:qpbXx+1CmYDp2S5wpOk3JCK6pFoETQ6fOpd/9nEh9TGGhJcR:OwQwpOk5CK6pO/9ESGhJc
Malware Config
Extracted
njrat
0.7.3
JUNIO777
verderesilencia.duckdns.org:2010
Client.exe
-
reg_key
Client.exe
-
splitter
2023
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 1 IoCs
pid Process 1600 Client.exe -
Loads dropped DLL 1 IoCs
pid Process 1056 xV0aWLFtJKKg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3518257231-2980324860-1431329550-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1004 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1600 Client.exe Token: 33 1600 Client.exe Token: SeIncBasePriorityPrivilege 1600 Client.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1600 1056 xV0aWLFtJKKg.exe 27 PID 1056 wrote to memory of 1600 1056 xV0aWLFtJKKg.exe 27 PID 1056 wrote to memory of 1600 1056 xV0aWLFtJKKg.exe 27 PID 1056 wrote to memory of 1600 1056 xV0aWLFtJKKg.exe 27 PID 1600 wrote to memory of 480 1600 Client.exe 29 PID 1600 wrote to memory of 480 1600 Client.exe 29 PID 1600 wrote to memory of 480 1600 Client.exe 29 PID 1600 wrote to memory of 480 1600 Client.exe 29 PID 1600 wrote to memory of 892 1600 Client.exe 31 PID 1600 wrote to memory of 892 1600 Client.exe 31 PID 1600 wrote to memory of 892 1600 Client.exe 31 PID 1600 wrote to memory of 892 1600 Client.exe 31 PID 892 wrote to memory of 1004 892 cmd.exe 33 PID 892 wrote to memory of 1004 892 cmd.exe 33 PID 892 wrote to memory of 1004 892 cmd.exe 33 PID 892 wrote to memory of 1004 892 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\xV0aWLFtJKKg.exe"C:\Users\Admin\AppData\Local\Temp\xV0aWLFtJKKg.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:480
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Client.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 24⤵
- Runs ping.exe
PID:1004
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD55658dd93a8379d6c46126a380ceb8b50
SHA14de37a6d63ebd5f89a96eb8f832c12dbf21c38ce
SHA2568539d8e44e928a23ef872c5a8ad4d4e632c9f489a013a5b29d36d15ac2767b61
SHA512a355e0e5b0c8b9933233951758d63fedcf4c8813b84ba9844334e4b6c2eb5b30566294bcb5fd33f6684576b77175369214f2f469a66e0b6647331f81c93dafee
-
Filesize
78KB
MD55658dd93a8379d6c46126a380ceb8b50
SHA14de37a6d63ebd5f89a96eb8f832c12dbf21c38ce
SHA2568539d8e44e928a23ef872c5a8ad4d4e632c9f489a013a5b29d36d15ac2767b61
SHA512a355e0e5b0c8b9933233951758d63fedcf4c8813b84ba9844334e4b6c2eb5b30566294bcb5fd33f6684576b77175369214f2f469a66e0b6647331f81c93dafee
-
Filesize
78KB
MD55658dd93a8379d6c46126a380ceb8b50
SHA14de37a6d63ebd5f89a96eb8f832c12dbf21c38ce
SHA2568539d8e44e928a23ef872c5a8ad4d4e632c9f489a013a5b29d36d15ac2767b61
SHA512a355e0e5b0c8b9933233951758d63fedcf4c8813b84ba9844334e4b6c2eb5b30566294bcb5fd33f6684576b77175369214f2f469a66e0b6647331f81c93dafee
-
Filesize
78KB
MD55658dd93a8379d6c46126a380ceb8b50
SHA14de37a6d63ebd5f89a96eb8f832c12dbf21c38ce
SHA2568539d8e44e928a23ef872c5a8ad4d4e632c9f489a013a5b29d36d15ac2767b61
SHA512a355e0e5b0c8b9933233951758d63fedcf4c8813b84ba9844334e4b6c2eb5b30566294bcb5fd33f6684576b77175369214f2f469a66e0b6647331f81c93dafee