Analysis

  • max time kernel
    296s
  • max time network
    300s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2023, 12:27

General

  • Target

    NjRat 0.7D Golden Edition - Rus.exe

  • Size

    1.1MB

  • MD5

    b740b825e1fdd8dfca62607fdebd6d28

  • SHA1

    aa7fa4730abc65cac68212278fef710feefb2169

  • SHA256

    62cc3e8ad0d36ecf9024fd801eba17e467558c29eb2b2ab40a935b79d8e98a18

  • SHA512

    68e4a8476e496ec959ca831e0bdcd63c46b455d9ef9671dd633617ebe4f10c50107c2b37115ac1b957630766d078014c4fd70bf97659cbc97c10f574be33c9c4

  • SSDEEP

    24576:cOPq7Qt50WkTbWeUvrFyLBE4uiuKjYZTC8ctzI9UXWNJRvs:cX7tjbavUBEjg29UmNs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Golden Edition - Rus.exe
    "C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Golden Edition - Rus.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\Zer0Day.bat
      "C:\Users\Admin\AppData\Local\Temp\Zer0Day.bat"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:816
      • C:\Users\Admin\AppData\Local\Temp\XSMN.EXE
        "C:\Users\Admin\AppData\Local\Temp\XSMN.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Users\Admin\AppData\Local\Temp\CIDiag.exe
          "C:\Users\Admin\AppData\Local\Temp\CIDiag.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "CIDiag" /tr "C:\Users\Public\CIDiag.exe"
            5⤵
            • Creates scheduled task(s)
            PID:596
    • C:\Users\Admin\AppData\Local\Temp\exefile.exe
      "C:\Users\Admin\AppData\Local\Temp\exefile.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 772
        3⤵
          PID:852
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c ping -n 3 127.0.0.1 & copy /Y "C:\Users\Admin\AppData\Local\Temp\exefile.exe" "C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Golden Edition - Rus.exe" >> NUL
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 3 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:2604
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {E797460D-E7DB-44C3-A6AC-4398E95C98B9} S-1-5-21-1528014236-771305907-3973026625-1000:DMCOTBQQ\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Public\CIDiag.exe
        C:\Users\Public\CIDiag.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1596
      • C:\Users\Public\CIDiag.exe
        C:\Users\Public\CIDiag.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
      • C:\Users\Public\CIDiag.exe
        C:\Users\Public\CIDiag.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1956
      • C:\Users\Public\CIDiag.exe
        C:\Users\Public\CIDiag.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2936

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            61KB

            MD5

            f3441b8572aae8801c04f3060b550443

            SHA1

            4ef0a35436125d6821831ef36c28ffaf196cda15

            SHA256

            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

            SHA512

            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

          • C:\Users\Admin\AppData\Local\Temp\CIDiag.exe

            Filesize

            67KB

            MD5

            95e292e14f8d45ae3f05ec7a29b47646

            SHA1

            ecbfb508128d9e771a9266f4ed547547f4b0721b

            SHA256

            da23959d4678f340e2d86a4c2fbbc99cb22a99377d7eccd7b7abcea2821a035f

            SHA512

            79c1a41ad85991cc64621d45bcbd047ed19dc30ebcdb09013f3370e35998e06b78c92dc71a053ca8a2ee7e936a3c61768ed834c58f444747467af95498c4d2a4

          • C:\Users\Admin\AppData\Local\Temp\CIDiag.exe

            Filesize

            67KB

            MD5

            95e292e14f8d45ae3f05ec7a29b47646

            SHA1

            ecbfb508128d9e771a9266f4ed547547f4b0721b

            SHA256

            da23959d4678f340e2d86a4c2fbbc99cb22a99377d7eccd7b7abcea2821a035f

            SHA512

            79c1a41ad85991cc64621d45bcbd047ed19dc30ebcdb09013f3370e35998e06b78c92dc71a053ca8a2ee7e936a3c61768ed834c58f444747467af95498c4d2a4

          • C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Golden Edition - Rus.exe

            Filesize

            1.9MB

            MD5

            8d540934a359a0480de188a748b3d573

            SHA1

            556693330454d09e461b0cc16c2c8f69f7f3cd45

            SHA256

            c81d701c3a4d6b7bcaa40f9c92a1bcfdf2f829954cf1ca15556712fbdc792834

            SHA512

            d2214389578a2928cc51b7fb098dd8d1ed4677f97a3f6bb18ec5494a3247866c400af7fe5d1a326cd25faf6090139849d3ef0fbb43c62075e5a436c0599d47b9

          • C:\Users\Admin\AppData\Local\Temp\Tar3605.tmp

            Filesize

            163KB

            MD5

            9441737383d21192400eca82fda910ec

            SHA1

            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

            SHA256

            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

            SHA512

            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

          • C:\Users\Admin\AppData\Local\Temp\XSMN.EXE

            Filesize

            79KB

            MD5

            b9ed8e1901a19c0d89fd4039b1c0894d

            SHA1

            6862dcdaa1d369036f7d7d51a199dfe141bc1001

            SHA256

            d0c495e65d35a2a06df664cb9250506aba1cd7054aa3a1144052bf45d13bb414

            SHA512

            e67139dc55aab172872c648ff9433ca3d37e7ac54d98dc39ac1219cb5fecdf763b5340b51a7f17324e4b6a068cb7287659b74a2f9bd4ee333658c38a6ecf3a0a

          • C:\Users\Admin\AppData\Local\Temp\XSMN.EXE

            Filesize

            79KB

            MD5

            b9ed8e1901a19c0d89fd4039b1c0894d

            SHA1

            6862dcdaa1d369036f7d7d51a199dfe141bc1001

            SHA256

            d0c495e65d35a2a06df664cb9250506aba1cd7054aa3a1144052bf45d13bb414

            SHA512

            e67139dc55aab172872c648ff9433ca3d37e7ac54d98dc39ac1219cb5fecdf763b5340b51a7f17324e4b6a068cb7287659b74a2f9bd4ee333658c38a6ecf3a0a

          • C:\Users\Admin\AppData\Local\Temp\Zer0Day.bat

            Filesize

            132KB

            MD5

            6f1ce50b8b11f9e8a05079fecf24e560

            SHA1

            2b50354806a64541606a6d090ac4d78eb60f29f7

            SHA256

            d68b8ddf9a910dd95129b136d83d3181b57962baac420d5142395d48adeb4687

            SHA512

            621ca4573c3fc96920dacaccce437606963cd79af24ef90320699a067d2ae053fd3be6ddde8ccd01e4baf9a2b4764a82135729e35a1e044b4b2c3f95d616b32f

          • C:\Users\Admin\AppData\Local\Temp\Zer0Day.bat

            Filesize

            132KB

            MD5

            6f1ce50b8b11f9e8a05079fecf24e560

            SHA1

            2b50354806a64541606a6d090ac4d78eb60f29f7

            SHA256

            d68b8ddf9a910dd95129b136d83d3181b57962baac420d5142395d48adeb4687

            SHA512

            621ca4573c3fc96920dacaccce437606963cd79af24ef90320699a067d2ae053fd3be6ddde8ccd01e4baf9a2b4764a82135729e35a1e044b4b2c3f95d616b32f

          • C:\Users\Admin\AppData\Local\Temp\exefile.exe

            Filesize

            1.9MB

            MD5

            8d540934a359a0480de188a748b3d573

            SHA1

            556693330454d09e461b0cc16c2c8f69f7f3cd45

            SHA256

            c81d701c3a4d6b7bcaa40f9c92a1bcfdf2f829954cf1ca15556712fbdc792834

            SHA512

            d2214389578a2928cc51b7fb098dd8d1ed4677f97a3f6bb18ec5494a3247866c400af7fe5d1a326cd25faf6090139849d3ef0fbb43c62075e5a436c0599d47b9

          • C:\Users\Admin\AppData\Local\Temp\exefile.exe

            Filesize

            1.9MB

            MD5

            8d540934a359a0480de188a748b3d573

            SHA1

            556693330454d09e461b0cc16c2c8f69f7f3cd45

            SHA256

            c81d701c3a4d6b7bcaa40f9c92a1bcfdf2f829954cf1ca15556712fbdc792834

            SHA512

            d2214389578a2928cc51b7fb098dd8d1ed4677f97a3f6bb18ec5494a3247866c400af7fe5d1a326cd25faf6090139849d3ef0fbb43c62075e5a436c0599d47b9

          • C:\Users\Public\CIDiag.exe

            Filesize

            67KB

            MD5

            95e292e14f8d45ae3f05ec7a29b47646

            SHA1

            ecbfb508128d9e771a9266f4ed547547f4b0721b

            SHA256

            da23959d4678f340e2d86a4c2fbbc99cb22a99377d7eccd7b7abcea2821a035f

            SHA512

            79c1a41ad85991cc64621d45bcbd047ed19dc30ebcdb09013f3370e35998e06b78c92dc71a053ca8a2ee7e936a3c61768ed834c58f444747467af95498c4d2a4

          • C:\Users\Public\CIDiag.exe

            Filesize

            67KB

            MD5

            95e292e14f8d45ae3f05ec7a29b47646

            SHA1

            ecbfb508128d9e771a9266f4ed547547f4b0721b

            SHA256

            da23959d4678f340e2d86a4c2fbbc99cb22a99377d7eccd7b7abcea2821a035f

            SHA512

            79c1a41ad85991cc64621d45bcbd047ed19dc30ebcdb09013f3370e35998e06b78c92dc71a053ca8a2ee7e936a3c61768ed834c58f444747467af95498c4d2a4

          • C:\Users\Public\CIDiag.exe

            Filesize

            67KB

            MD5

            95e292e14f8d45ae3f05ec7a29b47646

            SHA1

            ecbfb508128d9e771a9266f4ed547547f4b0721b

            SHA256

            da23959d4678f340e2d86a4c2fbbc99cb22a99377d7eccd7b7abcea2821a035f

            SHA512

            79c1a41ad85991cc64621d45bcbd047ed19dc30ebcdb09013f3370e35998e06b78c92dc71a053ca8a2ee7e936a3c61768ed834c58f444747467af95498c4d2a4

          • C:\Users\Public\CIDiag.exe

            Filesize

            67KB

            MD5

            95e292e14f8d45ae3f05ec7a29b47646

            SHA1

            ecbfb508128d9e771a9266f4ed547547f4b0721b

            SHA256

            da23959d4678f340e2d86a4c2fbbc99cb22a99377d7eccd7b7abcea2821a035f

            SHA512

            79c1a41ad85991cc64621d45bcbd047ed19dc30ebcdb09013f3370e35998e06b78c92dc71a053ca8a2ee7e936a3c61768ed834c58f444747467af95498c4d2a4

          • C:\Users\Public\CIDiag.exe

            Filesize

            67KB

            MD5

            95e292e14f8d45ae3f05ec7a29b47646

            SHA1

            ecbfb508128d9e771a9266f4ed547547f4b0721b

            SHA256

            da23959d4678f340e2d86a4c2fbbc99cb22a99377d7eccd7b7abcea2821a035f

            SHA512

            79c1a41ad85991cc64621d45bcbd047ed19dc30ebcdb09013f3370e35998e06b78c92dc71a053ca8a2ee7e936a3c61768ed834c58f444747467af95498c4d2a4

          • C:\Users\Public\CIDiag.exe

            Filesize

            67KB

            MD5

            95e292e14f8d45ae3f05ec7a29b47646

            SHA1

            ecbfb508128d9e771a9266f4ed547547f4b0721b

            SHA256

            da23959d4678f340e2d86a4c2fbbc99cb22a99377d7eccd7b7abcea2821a035f

            SHA512

            79c1a41ad85991cc64621d45bcbd047ed19dc30ebcdb09013f3370e35998e06b78c92dc71a053ca8a2ee7e936a3c61768ed834c58f444747467af95498c4d2a4

          • \Users\Admin\AppData\Local\Temp\XSMN.EXE

            Filesize

            79KB

            MD5

            b9ed8e1901a19c0d89fd4039b1c0894d

            SHA1

            6862dcdaa1d369036f7d7d51a199dfe141bc1001

            SHA256

            d0c495e65d35a2a06df664cb9250506aba1cd7054aa3a1144052bf45d13bb414

            SHA512

            e67139dc55aab172872c648ff9433ca3d37e7ac54d98dc39ac1219cb5fecdf763b5340b51a7f17324e4b6a068cb7287659b74a2f9bd4ee333658c38a6ecf3a0a

          • \Users\Admin\AppData\Local\Temp\Zer0Day.bat

            Filesize

            132KB

            MD5

            6f1ce50b8b11f9e8a05079fecf24e560

            SHA1

            2b50354806a64541606a6d090ac4d78eb60f29f7

            SHA256

            d68b8ddf9a910dd95129b136d83d3181b57962baac420d5142395d48adeb4687

            SHA512

            621ca4573c3fc96920dacaccce437606963cd79af24ef90320699a067d2ae053fd3be6ddde8ccd01e4baf9a2b4764a82135729e35a1e044b4b2c3f95d616b32f

          • \Users\Admin\AppData\Local\Temp\Zer0Day.bat

            Filesize

            132KB

            MD5

            6f1ce50b8b11f9e8a05079fecf24e560

            SHA1

            2b50354806a64541606a6d090ac4d78eb60f29f7

            SHA256

            d68b8ddf9a910dd95129b136d83d3181b57962baac420d5142395d48adeb4687

            SHA512

            621ca4573c3fc96920dacaccce437606963cd79af24ef90320699a067d2ae053fd3be6ddde8ccd01e4baf9a2b4764a82135729e35a1e044b4b2c3f95d616b32f

          • \Users\Admin\AppData\Local\Temp\exefile.exe

            Filesize

            1.9MB

            MD5

            8d540934a359a0480de188a748b3d573

            SHA1

            556693330454d09e461b0cc16c2c8f69f7f3cd45

            SHA256

            c81d701c3a4d6b7bcaa40f9c92a1bcfdf2f829954cf1ca15556712fbdc792834

            SHA512

            d2214389578a2928cc51b7fb098dd8d1ed4677f97a3f6bb18ec5494a3247866c400af7fe5d1a326cd25faf6090139849d3ef0fbb43c62075e5a436c0599d47b9

          • memory/852-47-0x0000000002040000-0x0000000002041000-memory.dmp

            Filesize

            4KB

          • memory/1052-96-0x0000000000DF0000-0x0000000000E06000-memory.dmp

            Filesize

            88KB

          • memory/1052-97-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/1052-98-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/1596-94-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/1596-93-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/1596-92-0x0000000000B60000-0x0000000000B76000-memory.dmp

            Filesize

            88KB

          • memory/1956-101-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/1956-100-0x0000000000E20000-0x0000000000E36000-memory.dmp

            Filesize

            88KB

          • memory/1956-102-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/2480-37-0x00000000011F0000-0x0000000001206000-memory.dmp

            Filesize

            88KB

          • memory/2480-48-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/2480-42-0x000000001B310000-0x000000001B390000-memory.dmp

            Filesize

            512KB

          • memory/2480-38-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/2480-88-0x00000000011E0000-0x00000000011EA000-memory.dmp

            Filesize

            40KB

          • memory/2720-27-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/2720-26-0x0000000001020000-0x000000000103A000-memory.dmp

            Filesize

            104KB

          • memory/2720-44-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/2936-106-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/2936-105-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

            Filesize

            9.9MB

          • memory/2936-104-0x0000000000070000-0x0000000000086000-memory.dmp

            Filesize

            88KB

          • memory/3068-29-0x00000000021C0000-0x0000000002240000-memory.dmp

            Filesize

            512KB

          • memory/3068-40-0x00000000021C0000-0x0000000002240000-memory.dmp

            Filesize

            512KB

          • memory/3068-39-0x00000000021C0000-0x0000000002240000-memory.dmp

            Filesize

            512KB

          • memory/3068-49-0x000007FEF4A60000-0x000007FEF53FD000-memory.dmp

            Filesize

            9.6MB

          • memory/3068-28-0x00000000021C0000-0x0000000002240000-memory.dmp

            Filesize

            512KB

          • memory/3068-41-0x000007FEF4A60000-0x000007FEF53FD000-memory.dmp

            Filesize

            9.6MB

          • memory/3068-25-0x000007FEF4A60000-0x000007FEF53FD000-memory.dmp

            Filesize

            9.6MB

          • memory/3068-24-0x000007FEF4A60000-0x000007FEF53FD000-memory.dmp

            Filesize

            9.6MB

          • memory/3068-23-0x0000000000A60000-0x0000000000C56000-memory.dmp

            Filesize

            2.0MB

          • memory/3068-43-0x000007FEF4A60000-0x000007FEF53FD000-memory.dmp

            Filesize

            9.6MB

          • memory/3068-45-0x00000000021C0000-0x0000000002240000-memory.dmp

            Filesize

            512KB

          • memory/3068-46-0x00000000021C0000-0x0000000002240000-memory.dmp

            Filesize

            512KB