Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2023, 02:05

General

  • Target

    d8ea408260319428541bb48eb7fb0ad9f1c115d0faa243aefc27c28399eb5277.exe

  • Size

    208KB

  • MD5

    b074e0cc3c448376b30b4f65805bb368

  • SHA1

    f6f2c8e3d3066d72087aaab74c28a905a44858af

  • SHA256

    d8ea408260319428541bb48eb7fb0ad9f1c115d0faa243aefc27c28399eb5277

  • SHA512

    3e1cbf1ffa14614cb169e819bae5bdcbe54d96db3cea418c9e904af25d0d8bdf0b02a2e95d8ed2223a6e7e3e26336462327b4f54a9b94ef1c3f9c381583e4402

  • SSDEEP

    384:3DVUq67iFRNItImlQNYlEi0jWro5kqNKk1d7U33r+Y7DTP6juEfU5PZQhht1XKvO:3pUZ7iFfuITm+5LdqHSjumT6vmp+BIl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Telegram

C2

0.tcp.sa.ngrok.io:11552

Mutex

11a5bc89b304534ead07ff50b25ffb52

Attributes
  • reg_key

    11a5bc89b304534ead07ff50b25ffb52

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8ea408260319428541bb48eb7fb0ad9f1c115d0faa243aefc27c28399eb5277.exe
    "C:\Users\Admin\AppData\Local\Temp\d8ea408260319428541bb48eb7fb0ad9f1c115d0faa243aefc27c28399eb5277.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\0.vbs
      C:\Users\Admin\AppData\Local\Temp\0.vbs
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Roaming\Telegram Desktop.exe
        "C:\Users\Admin\AppData\Roaming\Telegram Desktop.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Telegram Desktop.exe" "Telegram Desktop.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:4268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0.vbs

    Filesize

    23KB

    MD5

    1bf9b7c17625a359cc3a3df4bea971fe

    SHA1

    60fefb77194fc70149b8179c4f7aeba2bf573909

    SHA256

    7e1a8eb57cfeb670aa6ef3687ec970ad004c0dbe0c4a9957c7025cf3d30f2c54

    SHA512

    eb87c7f25f25614c3e7b2fe581e44de5d3018ecd8c5f1127c8bffacaa932c11cf1b04d5773e5d28c241a0d678d48ec0ef6faa5ee0c88270f1124904ce9276997

  • C:\Users\Admin\AppData\Local\Temp\0.vbs

    Filesize

    23KB

    MD5

    1bf9b7c17625a359cc3a3df4bea971fe

    SHA1

    60fefb77194fc70149b8179c4f7aeba2bf573909

    SHA256

    7e1a8eb57cfeb670aa6ef3687ec970ad004c0dbe0c4a9957c7025cf3d30f2c54

    SHA512

    eb87c7f25f25614c3e7b2fe581e44de5d3018ecd8c5f1127c8bffacaa932c11cf1b04d5773e5d28c241a0d678d48ec0ef6faa5ee0c88270f1124904ce9276997

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop.exe

    Filesize

    23KB

    MD5

    1bf9b7c17625a359cc3a3df4bea971fe

    SHA1

    60fefb77194fc70149b8179c4f7aeba2bf573909

    SHA256

    7e1a8eb57cfeb670aa6ef3687ec970ad004c0dbe0c4a9957c7025cf3d30f2c54

    SHA512

    eb87c7f25f25614c3e7b2fe581e44de5d3018ecd8c5f1127c8bffacaa932c11cf1b04d5773e5d28c241a0d678d48ec0ef6faa5ee0c88270f1124904ce9276997

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop.exe

    Filesize

    23KB

    MD5

    1bf9b7c17625a359cc3a3df4bea971fe

    SHA1

    60fefb77194fc70149b8179c4f7aeba2bf573909

    SHA256

    7e1a8eb57cfeb670aa6ef3687ec970ad004c0dbe0c4a9957c7025cf3d30f2c54

    SHA512

    eb87c7f25f25614c3e7b2fe581e44de5d3018ecd8c5f1127c8bffacaa932c11cf1b04d5773e5d28c241a0d678d48ec0ef6faa5ee0c88270f1124904ce9276997

  • C:\Users\Admin\AppData\Roaming\Telegram Desktop.exe

    Filesize

    23KB

    MD5

    1bf9b7c17625a359cc3a3df4bea971fe

    SHA1

    60fefb77194fc70149b8179c4f7aeba2bf573909

    SHA256

    7e1a8eb57cfeb670aa6ef3687ec970ad004c0dbe0c4a9957c7025cf3d30f2c54

    SHA512

    eb87c7f25f25614c3e7b2fe581e44de5d3018ecd8c5f1127c8bffacaa932c11cf1b04d5773e5d28c241a0d678d48ec0ef6faa5ee0c88270f1124904ce9276997

  • memory/1676-153-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB

  • memory/1676-154-0x00000000018E0000-0x00000000018F0000-memory.dmp

    Filesize

    64KB

  • memory/1676-155-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB

  • memory/1676-157-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB

  • memory/1676-158-0x00000000018E0000-0x00000000018F0000-memory.dmp

    Filesize

    64KB

  • memory/5052-142-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/5052-141-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5052-152-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5052-140-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB