Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2023, 15:30

General

  • Target

    33aeb3636988834cb63c7bf4b65581e1.exe

  • Size

    5.5MB

  • MD5

    33aeb3636988834cb63c7bf4b65581e1

  • SHA1

    2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

  • SHA256

    3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

  • SHA512

    55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

  • SSDEEP

    98304:xxV6zRhld9E1BlYb9uto2jgrGeweoSYp2prwvLWaNFXvow17IugzlHbGSZBN7fZm:bV8ld98BlON2jnbNswvBXvowJgzl7GSO

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Obfuscated with Agile.Net obfuscator 4 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 17 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33aeb3636988834cb63c7bf4b65581e1.exe
    "C:\Users\Admin\AppData\Local\Temp\33aeb3636988834cb63c7bf4b65581e1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:1112

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • C:\Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • C:\Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • C:\Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • memory/1112-170-0x0000000005CB0000-0x0000000005D42000-memory.dmp

          Filesize

          584KB

        • memory/1112-172-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-186-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-181-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-178-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-177-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-175-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-174-0x0000000005880000-0x0000000005890000-memory.dmp

          Filesize

          64KB

        • memory/1112-173-0x0000000005E90000-0x0000000005EF6000-memory.dmp

          Filesize

          408KB

        • memory/1112-164-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-165-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-166-0x0000000005880000-0x0000000005890000-memory.dmp

          Filesize

          64KB

        • memory/1112-168-0x0000000072FD0000-0x0000000073059000-memory.dmp

          Filesize

          548KB

        • memory/1112-167-0x0000000071F50000-0x0000000072569000-memory.dmp

          Filesize

          6.1MB

        • memory/1112-171-0x0000000005C20000-0x0000000005C2A000-memory.dmp

          Filesize

          40KB

        • memory/4044-133-0x0000000000EF0000-0x0000000001476000-memory.dmp

          Filesize

          5.5MB

        • memory/4044-146-0x0000000006200000-0x000000000629C000-memory.dmp

          Filesize

          624KB

        • memory/4044-141-0x0000000005D90000-0x0000000005DA0000-memory.dmp

          Filesize

          64KB

        • memory/4044-142-0x0000000070F10000-0x0000000071529000-memory.dmp

          Filesize

          6.1MB

        • memory/4044-160-0x0000000070F10000-0x0000000071529000-memory.dmp

          Filesize

          6.1MB

        • memory/4044-143-0x0000000070F10000-0x0000000071529000-memory.dmp

          Filesize

          6.1MB

        • memory/4044-144-0x0000000070F10000-0x0000000071529000-memory.dmp

          Filesize

          6.1MB

        • memory/4044-145-0x0000000072FD0000-0x0000000073059000-memory.dmp

          Filesize

          548KB

        • memory/4044-147-0x0000000006850000-0x0000000006DF4000-memory.dmp

          Filesize

          5.6MB