Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2023, 19:56

General

  • Target

    33aeb3636988834cb63c7bf4b.exe

  • Size

    5.5MB

  • MD5

    33aeb3636988834cb63c7bf4b65581e1

  • SHA1

    2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

  • SHA256

    3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

  • SHA512

    55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

  • SSDEEP

    98304:xxV6zRhld9E1BlYb9uto2jgrGeweoSYp2prwvLWaNFXvow17IugzlHbGSZBN7fZm:bV8ld98BlON2jnbNswvBXvowJgzl7GSO

Malware Config

Extracted

Family

njrat

Version

Hallaj PRO Rat [Fixed]

Botnet

HacKed

C2

212.ip.ply.gg:17869

Mutex

3db336165e398a08b41714abba10e742

Attributes
  • reg_key

    3db336165e398a08b41714abba10e742

  • splitter

    boolLove

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Obfuscated with Agile.Net obfuscator 6 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33aeb3636988834cb63c7bf4b.exe
    "C:\Users\Admin\AppData\Local\Temp\33aeb3636988834cb63c7bf4b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:1108

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • C:\Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3db336165e398a08b41714abba10e742.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • \Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • \Users\Admin\AppData\Local\Temp\754dcc14-7394-45e0-ba36-ff311d7c80f1\AgileDotNetRT.dll

          Filesize

          2.3MB

          MD5

          105e678e6ee84e0fa7fbe34df1f9639c

          SHA1

          17e4d775f4405e3a81a793b5bf775e9c95da5af9

          SHA256

          4ef4551d44fde6e46c470314b0b89f6418a54eee3f1ad9eb7456b2a20e3065a2

          SHA512

          3a15a2f188a4f572923d1999a77ef6d14b243d1c0e3a4442b5a6825756b93b40e2c6197d106df62ae3b427c62ff6b21fc2fe8181a3b6709e9991f1ddd36e5689

        • \Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          5.5MB

          MD5

          33aeb3636988834cb63c7bf4b65581e1

          SHA1

          2aedb042f39bddd34dd5ce4acbf7b1b259973e3b

          SHA256

          3df462b3e78232032a984a4b9138fc00ce4aaf93a33a6e540f5ba8bce0cad369

          SHA512

          55d75587088553a61c2bb200740a7ad8167f44df7b9a24c04b350068def5daf13c3e135cf086287fe740274583fb2742bc56fb3476641898293b619a68137fbb

        • memory/1108-82-0x0000000005010000-0x0000000005050000-memory.dmp

          Filesize

          256KB

        • memory/1108-81-0x0000000074BA0000-0x0000000074C20000-memory.dmp

          Filesize

          512KB

        • memory/1108-94-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/1108-90-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/1108-89-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/1108-88-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/1108-76-0x0000000000EC0000-0x0000000001446000-memory.dmp

          Filesize

          5.5MB

        • memory/1108-87-0x0000000005010000-0x0000000005050000-memory.dmp

          Filesize

          256KB

        • memory/1108-86-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/1108-79-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/1108-80-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/1108-84-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/1108-83-0x0000000074580000-0x0000000074B99000-memory.dmp

          Filesize

          6.1MB

        • memory/2400-54-0x0000000000920000-0x0000000000EA6000-memory.dmp

          Filesize

          5.5MB

        • memory/2400-66-0x00000000002B0000-0x00000000002BC000-memory.dmp

          Filesize

          48KB

        • memory/2400-60-0x0000000004ED0000-0x0000000004F10000-memory.dmp

          Filesize

          256KB

        • memory/2400-62-0x0000000074540000-0x0000000074B59000-memory.dmp

          Filesize

          6.1MB

        • memory/2400-63-0x0000000074540000-0x0000000074B59000-memory.dmp

          Filesize

          6.1MB

        • memory/2400-75-0x0000000074540000-0x0000000074B59000-memory.dmp

          Filesize

          6.1MB

        • memory/2400-64-0x0000000074540000-0x0000000074B59000-memory.dmp

          Filesize

          6.1MB

        • memory/2400-73-0x0000000074540000-0x0000000074B59000-memory.dmp

          Filesize

          6.1MB

        • memory/2400-65-0x0000000075400000-0x0000000075480000-memory.dmp

          Filesize

          512KB