Analysis

  • max time kernel
    553s
  • max time network
    554s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2023, 09:03

General

  • Target

    Setup.exe

  • Size

    224KB

  • MD5

    f79f52b0bfe45c9639a0228a30e1f7ad

  • SHA1

    f4566cf5db3ee3fd8d61413b4366e0f01531c1b3

  • SHA256

    3b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795

  • SHA512

    4f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0

  • SSDEEP

    3072:yKsgyqI/cLLjGK0w7BSvwS24YGnFYYLd12rABAQnW49AMADn/Yh:V5Gw7EvwkXnFYC2r4dW49

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe
      "C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe" "aDbjYi97m19.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:2716
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\system32\desk.cpl desk,@Themes /Action:OpenTheme /file:"C:\Windows\Resources\Themes\aero.theme"
        3⤵
        • Modifies Control Panel
        PID:1620
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\4483425"
        3⤵
          PID:2112
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\4984827"
          3⤵
            PID:1680
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe"
            3⤵
            • Modifies Windows Firewall
            PID:660
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1168
            • C:\Windows\SysWOW64\PING.EXE
              ping 0 -n 2
              4⤵
              • Runs ping.exe
              PID:820
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
          PID:2664
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x520
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1100

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                Filesize

                1KB

                MD5

                020570a88c0692f7f3d1d42379058765

                SHA1

                bef5e581e4c7ef4f171c165911145dca9c68287e

                SHA256

                16efc91532dc5d3d151ce5bdb882e6831d562a54bf8592c31052159ce929cddb

                SHA512

                1f47d19f8f2dc77e7ab9fa12b096bb41600f84b67cc22fd41886b9a759c32c3565db23a1dfe039a1d376ffe7d510b3603f0acc5df14886d254235329e074ef9e

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                Filesize

                1KB

                MD5

                05471356f0ea1c0f5f5b8deb29c3ebd1

                SHA1

                12b14b737d1e0f76ca2494fb7a6841e5792a0504

                SHA256

                cf59479c75a8803468dd2a2c1d2803a2694c41992d5a0b3b65b1c69c28d1eac7

                SHA512

                942285259612792c2b3a45a65483e0775314841e397e815d447fd8f69f63f5de1ac48653a051c0121bd73415655c468772d39ce72bb1ba3d8ae367f78143502b

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                Filesize

                1KB

                MD5

                29e0e345438882a935d2c0baff457f6c

                SHA1

                aef4d88c8c81bc9d9440e1f94f792f6ab83e2b5a

                SHA256

                0c127592f7670047d0b1928fede6ecf7c827b9e8086500b23756e5c02d09a4c6

                SHA512

                8b87df27f7edc9328debeb3a0f68468d1d46615122e815d03330a9682776f85a47ef37889fc210fb28e56d91bf8cf0f0e594f90c3eaff5827dfd57b97a0b359b

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                Filesize

                1KB

                MD5

                159bd6a587f370f16522b2a6f690bcc3

                SHA1

                c07d14fc439997e2f65b982c0702a985b36b9cf8

                SHA256

                9193c9b28f4e19c5fbd00340dce578825fbc6ce6ab67b1c9082c0d8f64446993

                SHA512

                a1ddc058193d778b3935ef8f158bb06f014de72124d5561a4d7af99e77921bcfe5ffcb24a1375917d5e438e0f2a1dccb96c1bdc2fa5b6aaf75ca5cabe1788e46

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                Filesize

                1KB

                MD5

                7c048eaacd1820ac933dccc0b872fa05

                SHA1

                955999eb7463f7e4031d551e24fbd1e1fb812197

                SHA256

                614d7a9ca519b3aa741a512e95f6f99aedd25e8c1630d30d13dd9735b562b3be

                SHA512

                09f35a1a69344e64b13f0a54ecc82cd7dd1ee9124bfc274fcd5fe8af2a07e30bbf0841d9230591cbbe12bc8f066f5f36e1577b82d5d1f3f0eb6b9b5154ce5d4b

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                Filesize

                1KB

                MD5

                b65aeb1b3da0b96313cc6e10dde4afe0

                SHA1

                34039989280d6d5a45793deaab79665c79b74b8d

                SHA256

                0254d776e25aeb83f195aacc7d477cd37683932586b27fdb7f09836d08296a3c

                SHA512

                be5c22848ee3491061feaab9c8e708e04e5d34bc0d8b46e816e059e6616c0114cfe5f40aee935f9d5dee546a990efa3bca00bdec03bcc29fedad37d0dbda95ea

              • C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe

                Filesize

                224KB

                MD5

                f79f52b0bfe45c9639a0228a30e1f7ad

                SHA1

                f4566cf5db3ee3fd8d61413b4366e0f01531c1b3

                SHA256

                3b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795

                SHA512

                4f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0

              • C:\Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe

                Filesize

                224KB

                MD5

                f79f52b0bfe45c9639a0228a30e1f7ad

                SHA1

                f4566cf5db3ee3fd8d61413b4366e0f01531c1b3

                SHA256

                3b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795

                SHA512

                4f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\76e9fe4e3aaf999d0000ff4d09fc67e7.exe

                Filesize

                224KB

                MD5

                f79f52b0bfe45c9639a0228a30e1f7ad

                SHA1

                f4566cf5db3ee3fd8d61413b4366e0f01531c1b3

                SHA256

                3b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795

                SHA512

                4f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0

              • \Users\Admin\AppData\Local\Temp\aDbjYi97m19.exe

                Filesize

                224KB

                MD5

                f79f52b0bfe45c9639a0228a30e1f7ad

                SHA1

                f4566cf5db3ee3fd8d61413b4366e0f01531c1b3

                SHA256

                3b8aabaa56450c6ce788b83b09a1118317712ddecd3a49efceaad043f1ee5795

                SHA512

                4f0ec0541e56c7f07fa2fd90e5bf6b7c53f29f8c959eeff0aef2e7eb84a168b52eefed54d6656dbcefa7c8f50a7058d1f58567dacdf0d07271072562605983f0

              • memory/1680-707-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2096-14-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2096-12-0x0000000001FC0000-0x0000000002000000-memory.dmp

                Filesize

                256KB

              • memory/2096-17-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2096-18-0x0000000001FC0000-0x0000000002000000-memory.dmp

                Filesize

                256KB

              • memory/2096-19-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2096-20-0x0000000001FC0000-0x0000000002000000-memory.dmp

                Filesize

                256KB

              • memory/2096-21-0x0000000001FC0000-0x0000000002000000-memory.dmp

                Filesize

                256KB

              • memory/2096-11-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2096-711-0x0000000001FC0000-0x0000000002000000-memory.dmp

                Filesize

                256KB

              • memory/2096-710-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2112-681-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2112-679-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2112-693-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2112-685-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2112-687-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2112-683-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2112-691-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2112-692-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2112-689-0x0000000000400000-0x0000000000472000-memory.dmp

                Filesize

                456KB

              • memory/2932-15-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2932-0-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2932-13-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2932-10-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2932-1-0x00000000744F0000-0x0000000074A9B000-memory.dmp

                Filesize

                5.7MB

              • memory/2932-2-0x0000000002040000-0x0000000002080000-memory.dmp

                Filesize

                256KB