Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2023 20:47
Behavioral task
behavioral1
Sample
1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe
Resource
win10v2004-20230831-en
General
-
Target
1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe
-
Size
96KB
-
MD5
c00262699ae0facbf297badd09233876
-
SHA1
305a02a7c0623004c6b9fa2c91a883f840d751bc
-
SHA256
00b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
-
SHA512
845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
SSDEEP
1536:qExAU0oN36tuQviFw15GHyBnvb3fLteF3nLrB9z3nOaF9bhS9vM:bxAU0oN36tuQviFCYSBnDfWl9zeaF9bV
Malware Config
Extracted
njrat
Platinum
Cheats
127.0.0.1:1
smss.exe
-
reg_key
smss.exe
-
splitter
|Ghost|
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
smss.exe1916-1-0x00000000009A0000-0x00000000009B8000-memory.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Control Panel\International\Geo\Nation 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe -
Drops startup file 3 IoCs
Processes:
smss.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smss.exe smss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smss.url smss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smss.exe smss.exe -
Executes dropped EXE 5 IoCs
Processes:
smss.exe38176b3bec5740deb70d5441c9fec2fe.exesmss.exefd58716a08c0405c809adb8a935d46b1.exesmss.exepid process 3416 smss.exe 1848 38176b3bec5740deb70d5441c9fec2fe.exe 892 smss.exe 4296 fd58716a08c0405c809adb8a935d46b1.exe 4732 smss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
smss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\smss.exe\" .." smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\smss.exe\" .." smss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2672 schtasks.exe 1384 schtasks.exe 3312 schtasks.exe 4016 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
smss.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 1036 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1036 AUDIODG.EXE Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe Token: 33 3416 smss.exe Token: SeIncBasePriorityPrivilege 3416 smss.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
1916-1-0x00000000009A0000-0x00000000009B8000-memory.execmd.exesmss.exedescription pid process target process PID 216 wrote to memory of 3416 216 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe smss.exe PID 216 wrote to memory of 3416 216 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe smss.exe PID 216 wrote to memory of 3416 216 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe smss.exe PID 216 wrote to memory of 3200 216 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe cmd.exe PID 216 wrote to memory of 3200 216 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe cmd.exe PID 216 wrote to memory of 3200 216 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe cmd.exe PID 3200 wrote to memory of 2864 3200 cmd.exe choice.exe PID 3200 wrote to memory of 2864 3200 cmd.exe choice.exe PID 3200 wrote to memory of 2864 3200 cmd.exe choice.exe PID 3416 wrote to memory of 3644 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 3644 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 3644 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4016 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4016 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4016 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4124 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4124 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4124 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 2672 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 2672 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 2672 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 1848 3416 smss.exe 38176b3bec5740deb70d5441c9fec2fe.exe PID 3416 wrote to memory of 1848 3416 smss.exe 38176b3bec5740deb70d5441c9fec2fe.exe PID 3416 wrote to memory of 4296 3416 smss.exe fd58716a08c0405c809adb8a935d46b1.exe PID 3416 wrote to memory of 4296 3416 smss.exe fd58716a08c0405c809adb8a935d46b1.exe PID 3416 wrote to memory of 1380 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 1380 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 1380 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 1384 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 1384 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 1384 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4192 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4192 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 4192 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 3312 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 3312 3416 smss.exe schtasks.exe PID 3416 wrote to memory of 3312 3416 smss.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\smss.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\smss.exe3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\38176b3bec5740deb70d5441c9fec2fe.exe"C:\Users\Admin\AppData\Local\Temp\38176b3bec5740deb70d5441c9fec2fe.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fd58716a08c0405c809adb8a935d46b1.exe"C:\Users\Admin\AppData\Local\Temp\fd58716a08c0405c809adb8a935d46b1.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\smss.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\smss.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 53⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x150 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\smss.exeC:\Users\Admin\AppData\Local\Temp\smss.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\smss.exeC:\Users\Admin\AppData\Local\Temp\smss.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\smss.exe.logFilesize
319B
MD5da4fafeffe21b7cb3a8c170ca7911976
SHA150ef77e2451ab60f93f4db88325b897d215be5ad
SHA2567341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA5120bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6
-
C:\Users\Admin\AppData\Local\Temp\38176b3bec5740deb70d5441c9fec2fe.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\38176b3bec5740deb70d5441c9fec2fe.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\38176b3bec5740deb70d5441c9fec2fe.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\fd58716a08c0405c809adb8a935d46b1.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\fd58716a08c0405c809adb8a935d46b1.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
memory/216-0-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/216-2-0x00000000008A0000-0x00000000008B0000-memory.dmpFilesize
64KB
-
memory/216-1-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/216-13-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/892-36-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/892-37-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/892-39-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/1848-33-0x00007FF982910000-0x00007FF9833D1000-memory.dmpFilesize
10.8MB
-
memory/1848-34-0x000002EBF65E0000-0x000002EBF65F0000-memory.dmpFilesize
64KB
-
memory/1848-32-0x000002EBF65E0000-0x000002EBF65F0000-memory.dmpFilesize
64KB
-
memory/1848-30-0x00007FF982910000-0x00007FF9833D1000-memory.dmpFilesize
10.8MB
-
memory/1848-31-0x000002EBF3880000-0x000002EBF3D3A000-memory.dmpFilesize
4.7MB
-
memory/3416-14-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/3416-18-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/3416-12-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/4296-51-0x00007FF982910000-0x00007FF9833D1000-memory.dmpFilesize
10.8MB
-
memory/4296-52-0x0000022B7DAA0000-0x0000022B7DAB0000-memory.dmpFilesize
64KB
-
memory/4296-53-0x00007FF982910000-0x00007FF9833D1000-memory.dmpFilesize
10.8MB
-
memory/4296-54-0x0000022B7DAA0000-0x0000022B7DAB0000-memory.dmpFilesize
64KB
-
memory/4732-57-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/4732-58-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/4732-59-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB