Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
e00f576601e991f42f039363fb8461ba.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e00f576601e991f42f039363fb8461ba.exe
Resource
win10v2004-20230703-en
General
-
Target
e00f576601e991f42f039363fb8461ba.exe
-
Size
181KB
-
MD5
e00f576601e991f42f039363fb8461ba
-
SHA1
29b5958ebe505cc6638eb37531e944e7ea895203
-
SHA256
fdbde655dc835a93bf7ebd5ce18dfbae737ce99ea9fd041f60138ee9b8f0d0f2
-
SHA512
05e0f3a39bccfc192e28453c67d3f020403d6c51489e196d94a0889163eb6c1127879a093622805194a5d5a2debc4a743fb82e9570afd90adb792afc2a0c4ace
-
SSDEEP
3072:KahKyd2n31/5GWp1icKAArDZz4N9GhbkrNEkE8/16MXsnsp:KahOTp0yN90QEM/IM82
Malware Config
Extracted
njrat
im523
Cursed
2.tcp.eu.ngrok.io:10289
910556b16efeeddcdf7a775cbd4b8f09
-
reg_key
910556b16efeeddcdf7a775cbd4b8f09
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2892 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\910556b16efeeddcdf7a775cbd4b8f09.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\910556b16efeeddcdf7a775cbd4b8f09.exe server.exe -
Executes dropped EXE 3 IoCs
pid Process 2532 Gmag.exe 2936 server.exe 2472 XPLoader.exe -
Loads dropped DLL 3 IoCs
pid Process 2532 Gmag.exe 2216 e00f576601e991f42f039363fb8461ba.exe 1308 Process not Found -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e00f576601e991f42f039363fb8461ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows\CurrentVersion\Run\910556b16efeeddcdf7a775cbd4b8f09 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\910556b16efeeddcdf7a775cbd4b8f09 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created D:\autorun.inf server.exe File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2720 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe 2936 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2936 server.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2936 server.exe Token: SeDebugPrivilege 2720 taskkill.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe Token: 33 2936 server.exe Token: SeIncBasePriorityPrivilege 2936 server.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2532 2216 e00f576601e991f42f039363fb8461ba.exe 28 PID 2216 wrote to memory of 2532 2216 e00f576601e991f42f039363fb8461ba.exe 28 PID 2216 wrote to memory of 2532 2216 e00f576601e991f42f039363fb8461ba.exe 28 PID 2216 wrote to memory of 2532 2216 e00f576601e991f42f039363fb8461ba.exe 28 PID 2532 wrote to memory of 2936 2532 Gmag.exe 29 PID 2532 wrote to memory of 2936 2532 Gmag.exe 29 PID 2532 wrote to memory of 2936 2532 Gmag.exe 29 PID 2532 wrote to memory of 2936 2532 Gmag.exe 29 PID 2216 wrote to memory of 2472 2216 e00f576601e991f42f039363fb8461ba.exe 30 PID 2216 wrote to memory of 2472 2216 e00f576601e991f42f039363fb8461ba.exe 30 PID 2216 wrote to memory of 2472 2216 e00f576601e991f42f039363fb8461ba.exe 30 PID 2936 wrote to memory of 2892 2936 server.exe 32 PID 2936 wrote to memory of 2892 2936 server.exe 32 PID 2936 wrote to memory of 2892 2936 server.exe 32 PID 2936 wrote to memory of 2892 2936 server.exe 32 PID 2936 wrote to memory of 2720 2936 server.exe 34 PID 2936 wrote to memory of 2720 2936 server.exe 34 PID 2936 wrote to memory of 2720 2936 server.exe 34 PID 2936 wrote to memory of 2720 2936 server.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e00f576601e991f42f039363fb8461ba.exe"C:\Users\Admin\AppData\Local\Temp\e00f576601e991f42f039363fb8461ba.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gmag.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gmag.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:2892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Exsample.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XPLoader.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XPLoader.exe2⤵
- Executes dropped EXE
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5075a4132cef39d9b328347733f039463
SHA1bc5a627bd9ebb2ddad504ff312b37f1f148953aa
SHA256f4571e614f18225b4f4d5bc819cbc0db18af5adb401e252e0b277861f39f2ac2
SHA512efc3bd0cd018dc37f5a89f62241d67b0da04b467f7e2cf21acc8c82233600d22a3a41527e07404ad6495d70068476bf549de556b87d922341f09e8db56541674
-
Filesize
37KB
MD5075a4132cef39d9b328347733f039463
SHA1bc5a627bd9ebb2ddad504ff312b37f1f148953aa
SHA256f4571e614f18225b4f4d5bc819cbc0db18af5adb401e252e0b277861f39f2ac2
SHA512efc3bd0cd018dc37f5a89f62241d67b0da04b467f7e2cf21acc8c82233600d22a3a41527e07404ad6495d70068476bf549de556b87d922341f09e8db56541674
-
Filesize
28KB
MD5c2b360524c63fd491cc2bc82c9185705
SHA183d72908dcb76d58a6df191f5db37f0ee954aa3c
SHA256522eeb52ca95aba91fbe76b06bb0d1e1bfd5c6b03f1a250931d115d581b0bb44
SHA5128e72764f838a15f4541bf8a32a4b0cf58828223fd14f84b52c359fac775c1bb9b08e56201ba9ac3c16a2bacdfae5ebf1c5bccab2656d95467ce525285b6ce012
-
Filesize
28KB
MD5c2b360524c63fd491cc2bc82c9185705
SHA183d72908dcb76d58a6df191f5db37f0ee954aa3c
SHA256522eeb52ca95aba91fbe76b06bb0d1e1bfd5c6b03f1a250931d115d581b0bb44
SHA5128e72764f838a15f4541bf8a32a4b0cf58828223fd14f84b52c359fac775c1bb9b08e56201ba9ac3c16a2bacdfae5ebf1c5bccab2656d95467ce525285b6ce012
-
Filesize
37KB
MD5075a4132cef39d9b328347733f039463
SHA1bc5a627bd9ebb2ddad504ff312b37f1f148953aa
SHA256f4571e614f18225b4f4d5bc819cbc0db18af5adb401e252e0b277861f39f2ac2
SHA512efc3bd0cd018dc37f5a89f62241d67b0da04b467f7e2cf21acc8c82233600d22a3a41527e07404ad6495d70068476bf549de556b87d922341f09e8db56541674
-
Filesize
37KB
MD5075a4132cef39d9b328347733f039463
SHA1bc5a627bd9ebb2ddad504ff312b37f1f148953aa
SHA256f4571e614f18225b4f4d5bc819cbc0db18af5adb401e252e0b277861f39f2ac2
SHA512efc3bd0cd018dc37f5a89f62241d67b0da04b467f7e2cf21acc8c82233600d22a3a41527e07404ad6495d70068476bf549de556b87d922341f09e8db56541674
-
Filesize
37KB
MD5075a4132cef39d9b328347733f039463
SHA1bc5a627bd9ebb2ddad504ff312b37f1f148953aa
SHA256f4571e614f18225b4f4d5bc819cbc0db18af5adb401e252e0b277861f39f2ac2
SHA512efc3bd0cd018dc37f5a89f62241d67b0da04b467f7e2cf21acc8c82233600d22a3a41527e07404ad6495d70068476bf549de556b87d922341f09e8db56541674
-
Filesize
28KB
MD5c2b360524c63fd491cc2bc82c9185705
SHA183d72908dcb76d58a6df191f5db37f0ee954aa3c
SHA256522eeb52ca95aba91fbe76b06bb0d1e1bfd5c6b03f1a250931d115d581b0bb44
SHA5128e72764f838a15f4541bf8a32a4b0cf58828223fd14f84b52c359fac775c1bb9b08e56201ba9ac3c16a2bacdfae5ebf1c5bccab2656d95467ce525285b6ce012
-
Filesize
28KB
MD5c2b360524c63fd491cc2bc82c9185705
SHA183d72908dcb76d58a6df191f5db37f0ee954aa3c
SHA256522eeb52ca95aba91fbe76b06bb0d1e1bfd5c6b03f1a250931d115d581b0bb44
SHA5128e72764f838a15f4541bf8a32a4b0cf58828223fd14f84b52c359fac775c1bb9b08e56201ba9ac3c16a2bacdfae5ebf1c5bccab2656d95467ce525285b6ce012
-
Filesize
37KB
MD5075a4132cef39d9b328347733f039463
SHA1bc5a627bd9ebb2ddad504ff312b37f1f148953aa
SHA256f4571e614f18225b4f4d5bc819cbc0db18af5adb401e252e0b277861f39f2ac2
SHA512efc3bd0cd018dc37f5a89f62241d67b0da04b467f7e2cf21acc8c82233600d22a3a41527e07404ad6495d70068476bf549de556b87d922341f09e8db56541674