Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2023, 15:30

General

  • Target

    33aeb3636988834cb63c7bf4b65581e1.exe

  • Size

    5.5MB

  • MD5

    33aeb3636988834cb63c7bf4b65581e1

  • SHA1

    2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

  • SHA256

    3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

  • SHA512

    55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

  • SSDEEP

    98304:xxV6zRhld9E1BlYb9uto2jgrGeweoSYp2prwvLWaNFXvow17IugzlHbGSZBN7fZm:bV8ld98BlON2jnbNswvBXvowJgzl7GSO

Malware Config

Extracted

Family

njrat

Version

Hallaj PRO Rat [Fixed]

Botnet

HacKed

C2

212.ip.ply.gg:17869

Mutex

3db336165e398a08b41714abba10e742

Attributes
  • reg_key

    3db336165e398a08b41714abba10e742

  • splitter

    boolLove

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Obfuscated with Agile.Net obfuscator 6 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 19 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33aeb3636988834cb63c7bf4b65581e1.exe
    "C:\Users\Admin\AppData\Local\Temp\33aeb3636988834cb63c7bf4b65581e1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:588

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • C:\Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3db336165e398a08b41714abba10e742.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • \Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • \Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • \Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • memory/588-83-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-81-0x0000000074A30000-0x0000000074AB0000-memory.dmp

          Filesize

          512KB

        • memory/588-95-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-94-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-91-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-90-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-76-0x0000000000F60000-0x00000000014E6000-memory.dmp

          Filesize

          5.5MB

        • memory/588-89-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-87-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-79-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-80-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/588-86-0x0000000004F10000-0x0000000004F50000-memory.dmp

          Filesize

          256KB

        • memory/588-82-0x0000000004F10000-0x0000000004F50000-memory.dmp

          Filesize

          256KB

        • memory/588-85-0x0000000074410000-0x0000000074A29000-memory.dmp

          Filesize

          6.1MB

        • memory/2096-56-0x0000000004DC0000-0x0000000004E00000-memory.dmp

          Filesize

          256KB

        • memory/2096-54-0x0000000000870000-0x0000000000DF6000-memory.dmp

          Filesize

          5.5MB

        • memory/2096-68-0x00000000743D0000-0x00000000749E9000-memory.dmp

          Filesize

          6.1MB

        • memory/2096-62-0x00000000743D0000-0x00000000749E9000-memory.dmp

          Filesize

          6.1MB

        • memory/2096-63-0x00000000743D0000-0x00000000749E9000-memory.dmp

          Filesize

          6.1MB

        • memory/2096-75-0x00000000743D0000-0x00000000749E9000-memory.dmp

          Filesize

          6.1MB

        • memory/2096-65-0x00000000743D0000-0x00000000749E9000-memory.dmp

          Filesize

          6.1MB

        • memory/2096-64-0x0000000075290000-0x0000000075310000-memory.dmp

          Filesize

          512KB

        • memory/2096-66-0x00000000005D0000-0x00000000005DC000-memory.dmp

          Filesize

          48KB