Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 19:22
Behavioral task
behavioral1
Sample
JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe
Resource
win10v2004-20230831-en
General
-
Target
JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe
-
Size
37KB
-
MD5
d98745233b322553e2262ed6483e3528
-
SHA1
a39915af650261eee726721c20ff84b98d4be365
-
SHA256
89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9
-
SHA512
19cde1c3cc346d004589b1d1c673d87ad0e817e58d8bbf01e426abb85241b87f8899b5e7c02fbd4bf62e2fff5275bf8d57201d560cd9f88e87027b5289bbb0f3
-
SSDEEP
384:ZnL+Yw7BeAaXaEiVZzdmB0O4yUvPQxgp+Z2fPnYL/6qUtirAF+rMRTyN/0L+Ecor:l6Yw7bPOTUvPfI3U8rM+rMRa8NuBMt
Malware Config
Extracted
njrat
im523
HacKed
ctl-plg-ap-8.nsa.gov:443
b2e30700dde72c163e3f2a5afaf275a9
-
reg_key
b2e30700dde72c163e3f2a5afaf275a9
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2060 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1648 JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows\CurrentVersion\Run\b2e30700dde72c163e3f2a5afaf275a9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\b2e30700dde72c163e3f2a5afaf275a9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2176 svchost.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe Token: 33 2176 svchost.exe Token: SeIncBasePriorityPrivilege 2176 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2176 1648 JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe 28 PID 1648 wrote to memory of 2176 1648 JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe 28 PID 1648 wrote to memory of 2176 1648 JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe 28 PID 1648 wrote to memory of 2176 1648 JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe 28 PID 2176 wrote to memory of 2060 2176 svchost.exe 29 PID 2176 wrote to memory of 2060 2176 svchost.exe 29 PID 2176 wrote to memory of 2060 2176 svchost.exe 29 PID 2176 wrote to memory of 2060 2176 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe"C:\Users\Admin\AppData\Local\Temp\JC_89027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2060
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5d98745233b322553e2262ed6483e3528
SHA1a39915af650261eee726721c20ff84b98d4be365
SHA25689027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9
SHA51219cde1c3cc346d004589b1d1c673d87ad0e817e58d8bbf01e426abb85241b87f8899b5e7c02fbd4bf62e2fff5275bf8d57201d560cd9f88e87027b5289bbb0f3
-
Filesize
37KB
MD5d98745233b322553e2262ed6483e3528
SHA1a39915af650261eee726721c20ff84b98d4be365
SHA25689027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9
SHA51219cde1c3cc346d004589b1d1c673d87ad0e817e58d8bbf01e426abb85241b87f8899b5e7c02fbd4bf62e2fff5275bf8d57201d560cd9f88e87027b5289bbb0f3
-
Filesize
37KB
MD5d98745233b322553e2262ed6483e3528
SHA1a39915af650261eee726721c20ff84b98d4be365
SHA25689027c9c505ea145c8574c02726ccecaf5cd41ec73d05dfc86809d059b4234c9
SHA51219cde1c3cc346d004589b1d1c673d87ad0e817e58d8bbf01e426abb85241b87f8899b5e7c02fbd4bf62e2fff5275bf8d57201d560cd9f88e87027b5289bbb0f3