Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2023, 12:31

General

  • Target

    075cfb9b060c21f8124eea51436f8282.exe

  • Size

    266KB

  • MD5

    075cfb9b060c21f8124eea51436f8282

  • SHA1

    f0d7ce2d57a1d5886294d81b2e289f421c6106de

  • SHA256

    5df688f5538aca79256dc329400ac5fb412000930d21072433733fa8417b9913

  • SHA512

    b675e76109c03a4d834da998c5a8818d55637c9468c5024370f9fc5635e3f69f90e40da1597c7de66658cc3ab1a0dec94b9a2a433816897b908e48b3d0f58eff

  • SSDEEP

    6144:PDKW1Lgbdl0TBBvjc/EPuO5Wo8XBZ44AMmlwScO/Hgij:Lh1Lk70Tnvjc8PtEo8XBZ47lwNcP

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

hgjdjs.0pe.kr:1

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\075cfb9b060c21f8124eea51436f8282.exe
    "C:\Users\Admin\AppData\Local\Temp\075cfb9b060c21f8124eea51436f8282.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\AppData\Local\Temp\144.exe
      C:\Users\Admin\AppData\Local\Temp\144.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\Dllhost.exe
        "C:\Windows\Dllhost.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\system32\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn Server /tr C:\Users\Admin\AppData\Local\Temp/Server.exe
          4⤵
          • Creates scheduled task(s)
          PID:2152
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7B7BB709-0C2B-4D44-A8A8-476D4CE2ADED} S-1-5-21-722410544-1258951091-1992882075-1000:MGKTNXNO\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      C:\Users\Admin\AppData\Local\Temp/Server.exe
      2⤵
      • Executes dropped EXE
      PID:2656
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      C:\Users\Admin\AppData\Local\Temp/Server.exe
      2⤵
      • Executes dropped EXE
      PID:1028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\144.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • C:\Users\Admin\AppData\Local\Temp\144.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • C:\Windows\Dllhost.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • C:\Windows\Dllhost.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • C:\Windows\Dllhost.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • \Users\Admin\AppData\Local\Temp\144.exe

    Filesize

    25KB

    MD5

    be903fc3836d0a5912cae52a8c91204b

    SHA1

    b9da266846ecf050e283bfaab9e393a60537cd6f

    SHA256

    9a9ff65a67d6264ab7865f1c25035257998159c66f32ad366a2c16da47dc7abb

    SHA512

    8e32b2768dde7c6a92d85488298ba46c32f1b2b53bdbb646b7522dea10a9f117fc9906f9b58194bc9efbf36a318c7e788355d8b12989623201c93eaeaef5bfeb

  • memory/1028-153-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

    Filesize

    9.9MB

  • memory/1028-154-0x00000000009B0000-0x00000000009B8000-memory.dmp

    Filesize

    32KB

  • memory/1028-155-0x000000001AFE0000-0x000000001B060000-memory.dmp

    Filesize

    512KB

  • memory/1028-156-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-80-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-70-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-78-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-54-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2396-82-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-84-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-86-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-88-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-90-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-92-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-94-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-96-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-98-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-100-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-102-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-104-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-106-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-108-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-110-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-112-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-114-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-116-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-118-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-119-0x0000000004890000-0x00000000048D0000-memory.dmp

    Filesize

    256KB

  • memory/2396-120-0x0000000001D30000-0x0000000001D31000-memory.dmp

    Filesize

    4KB

  • memory/2396-74-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-72-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-76-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-55-0x0000000004890000-0x00000000048D0000-memory.dmp

    Filesize

    256KB

  • memory/2396-53-0x0000000002070000-0x00000000020A2000-memory.dmp

    Filesize

    200KB

  • memory/2396-56-0x00000000020A0000-0x00000000020D2000-memory.dmp

    Filesize

    200KB

  • memory/2396-129-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2396-57-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-131-0x0000000004890000-0x00000000048D0000-memory.dmp

    Filesize

    256KB

  • memory/2396-68-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-66-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-64-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-58-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-60-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-62-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2396-141-0x0000000074AC0000-0x00000000751AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-148-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2656-151-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2656-150-0x00000000003C0000-0x0000000000440000-memory.dmp

    Filesize

    512KB

  • memory/2656-149-0x0000000000370000-0x0000000000378000-memory.dmp

    Filesize

    32KB

  • memory/2812-138-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2812-139-0x000000001AD40000-0x000000001ADC0000-memory.dmp

    Filesize

    512KB

  • memory/2812-144-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2812-137-0x0000000001040000-0x0000000001048000-memory.dmp

    Filesize

    32KB

  • memory/2836-140-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-130-0x000000001B150000-0x000000001B1D0000-memory.dmp

    Filesize

    512KB

  • memory/2836-127-0x00000000003C0000-0x00000000003D2000-memory.dmp

    Filesize

    72KB

  • memory/2836-128-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-126-0x00000000008B0000-0x00000000008B8000-memory.dmp

    Filesize

    32KB