Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2023 18:01

General

  • Target

    131cc4da76d323e1792e458585a9161f.exe

  • Size

    70KB

  • MD5

    131cc4da76d323e1792e458585a9161f

  • SHA1

    2391bf26f9f880672a3469d8137fdd9c0daacd30

  • SHA256

    35822e68e8334cb47ca9cf01a80ec85047fbf6218298a4c4ee08b41b02bb9658

  • SHA512

    5c5b62217c04770f18e108b5623e0302329dceb28a695fe8bad316b9d8787aaa0dcf5f056bcc223d600aa45348c8e857e4bc48b56b878d3117e30afc64d0f1a4

  • SSDEEP

    768:zdlo/TaYmBcU7BKvk7m+8RoqdTQ+UzpvCHtnDvk7m+8RoqdTQ+UzpvCHtn2:zdoTsBrd7mvR7dTupvcS7mvR7dTupvcg

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

tyfdfdfs.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\131cc4da76d323e1792e458585a9161f.exe
    "C:\Users\Admin\AppData\Local\Temp\131cc4da76d323e1792e458585a9161f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      PID:2708
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:4324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    4fa8add6fc5821676245de5c3a3ff2b5

    SHA1

    d676e4d65f74724d2f7a6c6385ed36a2d0efac77

    SHA256

    40951afa1869484ca354dba200154bcf0719113c29a90662ff1867392480b3de

    SHA512

    e22efd4d9f8b04490e582dcb057cec4cc032da30c7c2d272094735cbcda4d236f548606a9fa95c7f9a5caa0b4ff08c80a40caec5d59f3da3ab4076708e0e2adf

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    4fa8add6fc5821676245de5c3a3ff2b5

    SHA1

    d676e4d65f74724d2f7a6c6385ed36a2d0efac77

    SHA256

    40951afa1869484ca354dba200154bcf0719113c29a90662ff1867392480b3de

    SHA512

    e22efd4d9f8b04490e582dcb057cec4cc032da30c7c2d272094735cbcda4d236f548606a9fa95c7f9a5caa0b4ff08c80a40caec5d59f3da3ab4076708e0e2adf

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    4fa8add6fc5821676245de5c3a3ff2b5

    SHA1

    d676e4d65f74724d2f7a6c6385ed36a2d0efac77

    SHA256

    40951afa1869484ca354dba200154bcf0719113c29a90662ff1867392480b3de

    SHA512

    e22efd4d9f8b04490e582dcb057cec4cc032da30c7c2d272094735cbcda4d236f548606a9fa95c7f9a5caa0b4ff08c80a40caec5d59f3da3ab4076708e0e2adf

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    4fa8add6fc5821676245de5c3a3ff2b5

    SHA1

    d676e4d65f74724d2f7a6c6385ed36a2d0efac77

    SHA256

    40951afa1869484ca354dba200154bcf0719113c29a90662ff1867392480b3de

    SHA512

    e22efd4d9f8b04490e582dcb057cec4cc032da30c7c2d272094735cbcda4d236f548606a9fa95c7f9a5caa0b4ff08c80a40caec5d59f3da3ab4076708e0e2adf

  • memory/2708-164-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-159-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-157-0x0000000001520000-0x0000000001532000-memory.dmp

    Filesize

    72KB

  • memory/2708-154-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-155-0x00000000015E0000-0x00000000015F0000-memory.dmp

    Filesize

    64KB

  • memory/2708-152-0x0000000000D10000-0x0000000000D18000-memory.dmp

    Filesize

    32KB

  • memory/3272-140-0x0000000000BD0000-0x0000000000BD8000-memory.dmp

    Filesize

    32KB

  • memory/3272-134-0x000000001B0C0000-0x000000001B166000-memory.dmp

    Filesize

    664KB

  • memory/3272-133-0x00000000001E0000-0x00000000001EC000-memory.dmp

    Filesize

    48KB

  • memory/3272-139-0x000000001BC60000-0x000000001BCFC000-memory.dmp

    Filesize

    624KB

  • memory/3272-138-0x0000000000BF0000-0x0000000000C00000-memory.dmp

    Filesize

    64KB

  • memory/3272-137-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/3272-156-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/3272-136-0x000000001B6F0000-0x000000001BBBE000-memory.dmp

    Filesize

    4.8MB

  • memory/3272-135-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/3272-141-0x000000001BDC0000-0x000000001BE0C000-memory.dmp

    Filesize

    304KB

  • memory/4324-158-0x0000000000D40000-0x0000000000D52000-memory.dmp

    Filesize

    72KB

  • memory/4324-161-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/4324-162-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/4324-160-0x0000000000F80000-0x0000000000F90000-memory.dmp

    Filesize

    64KB

  • memory/4324-166-0x000000001C6A0000-0x000000001C702000-memory.dmp

    Filesize

    392KB

  • memory/4324-167-0x000000001D110000-0x000000001D129000-memory.dmp

    Filesize

    100KB

  • memory/4324-168-0x0000000000F80000-0x0000000000F90000-memory.dmp

    Filesize

    64KB

  • memory/4324-169-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB

  • memory/4324-170-0x00007FFAE4E20000-0x00007FFAE57C1000-memory.dmp

    Filesize

    9.6MB