Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2023, 19:46

General

  • Target

    1dfe93c432a71787bec625e9f37aea5c.exe

  • Size

    37KB

  • MD5

    1dfe93c432a71787bec625e9f37aea5c

  • SHA1

    c733d9b06b59e9cd883787998d36cb890a601ef2

  • SHA256

    a01ef3fdd7c3df2e845dca28c37e9244cb1823c655da892ff5d5dacb9db70afd

  • SHA512

    539b983f1ff6b954e1015cd11190d9d6562e23b3c88fd1379a7cec008479a8d8fba9606641d1c11807ee44986bf1f11562f770a448d76d7d0c4ed5bbc3bd0998

  • SSDEEP

    384:tdKvEiTbHvpWNcZ0y8f7CTvvrILkCwE3rAF+rMRTyN/0L+EcoinblneHQM3epzX9:DKXTZ38f7CTv8FwKrM+rMRa8NuLGKt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

0.tcp.eu.ngrok.io:16261

Mutex

0dfab35b0ccfd955e7d94fa1f5dce520

Attributes
  • reg_key

    0dfab35b0ccfd955e7d94fa1f5dce520

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dfe93c432a71787bec625e9f37aea5c.exe
    "C:\Users\Admin\AppData\Local\Temp\1dfe93c432a71787bec625e9f37aea5c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:4588

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          37KB

          MD5

          1dfe93c432a71787bec625e9f37aea5c

          SHA1

          c733d9b06b59e9cd883787998d36cb890a601ef2

          SHA256

          a01ef3fdd7c3df2e845dca28c37e9244cb1823c655da892ff5d5dacb9db70afd

          SHA512

          539b983f1ff6b954e1015cd11190d9d6562e23b3c88fd1379a7cec008479a8d8fba9606641d1c11807ee44986bf1f11562f770a448d76d7d0c4ed5bbc3bd0998

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          37KB

          MD5

          1dfe93c432a71787bec625e9f37aea5c

          SHA1

          c733d9b06b59e9cd883787998d36cb890a601ef2

          SHA256

          a01ef3fdd7c3df2e845dca28c37e9244cb1823c655da892ff5d5dacb9db70afd

          SHA512

          539b983f1ff6b954e1015cd11190d9d6562e23b3c88fd1379a7cec008479a8d8fba9606641d1c11807ee44986bf1f11562f770a448d76d7d0c4ed5bbc3bd0998

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          37KB

          MD5

          1dfe93c432a71787bec625e9f37aea5c

          SHA1

          c733d9b06b59e9cd883787998d36cb890a601ef2

          SHA256

          a01ef3fdd7c3df2e845dca28c37e9244cb1823c655da892ff5d5dacb9db70afd

          SHA512

          539b983f1ff6b954e1015cd11190d9d6562e23b3c88fd1379a7cec008479a8d8fba9606641d1c11807ee44986bf1f11562f770a448d76d7d0c4ed5bbc3bd0998

        • memory/3212-149-0x0000000001090000-0x00000000010A0000-memory.dmp

          Filesize

          64KB

        • memory/3212-148-0x00000000748E0000-0x0000000074E91000-memory.dmp

          Filesize

          5.7MB

        • memory/3212-151-0x00000000748E0000-0x0000000074E91000-memory.dmp

          Filesize

          5.7MB

        • memory/3212-152-0x00000000748E0000-0x0000000074E91000-memory.dmp

          Filesize

          5.7MB

        • memory/3212-153-0x0000000001090000-0x00000000010A0000-memory.dmp

          Filesize

          64KB

        • memory/4572-136-0x0000000000E60000-0x0000000000E70000-memory.dmp

          Filesize

          64KB

        • memory/4572-135-0x00000000748E0000-0x0000000074E91000-memory.dmp

          Filesize

          5.7MB

        • memory/4572-147-0x00000000748E0000-0x0000000074E91000-memory.dmp

          Filesize

          5.7MB

        • memory/4572-146-0x00000000748E0000-0x0000000074E91000-memory.dmp

          Filesize

          5.7MB

        • memory/4572-134-0x00000000748E0000-0x0000000074E91000-memory.dmp

          Filesize

          5.7MB