Analysis
-
max time kernel
162s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 21:37
Behavioral task
behavioral1
Sample
1AF7DAEB2C2F549D0755C36956C599DA.exe
Resource
win7-20230831-en
General
-
Target
1AF7DAEB2C2F549D0755C36956C599DA.exe
-
Size
23KB
-
MD5
1af7daeb2c2f549d0755c36956c599da
-
SHA1
2081af2ec8abc78ee2f3a98dad74be4b23198d9d
-
SHA256
a0380cdbb6ed01cf08e65c66314c034eb710ed7bdb2e2235357ecf5ed0bb6a92
-
SHA512
f98a8f6fa3fd6d472a269f1f490f96db2b32f1714cf2f269d5fbe68c03d6b5c67ca40255059171ae87262f84f1e9dfb401bcb2d07f5ac87909ac705209ba64d8
-
SSDEEP
384:d3gexUw/L+JrgUon5b9uSDMwT9Pfg6NgrWoBYi51mRvR6JZlbw8hqIusZzZROO:xIAKG91DP1hPRpcnuo
Malware Config
Extracted
njrat
0.7d
Minecraft
0.tcp.sa.ngrok.io:12976
96f5ffbee5d6266c28eb6c0692cbc210
-
reg_key
96f5ffbee5d6266c28eb6c0692cbc210
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3008 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2656 Runtime Broker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Runtime Broker.exe 1AF7DAEB2C2F549D0755C36956C599DA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe Token: 33 2656 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 2656 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2656 1228 1AF7DAEB2C2F549D0755C36956C599DA.exe 30 PID 1228 wrote to memory of 2656 1228 1AF7DAEB2C2F549D0755C36956C599DA.exe 30 PID 1228 wrote to memory of 2656 1228 1AF7DAEB2C2F549D0755C36956C599DA.exe 30 PID 1228 wrote to memory of 2656 1228 1AF7DAEB2C2F549D0755C36956C599DA.exe 30 PID 2656 wrote to memory of 3008 2656 Runtime Broker.exe 31 PID 2656 wrote to memory of 3008 2656 Runtime Broker.exe 31 PID 2656 wrote to memory of 3008 2656 Runtime Broker.exe 31 PID 2656 wrote to memory of 3008 2656 Runtime Broker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1AF7DAEB2C2F549D0755C36956C599DA.exe"C:\Users\Admin\AppData\Local\Temp\1AF7DAEB2C2F549D0755C36956C599DA.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\Runtime Broker.exe"C:\Windows\Runtime Broker.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Runtime Broker.exe" "Runtime Broker.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD51af7daeb2c2f549d0755c36956c599da
SHA12081af2ec8abc78ee2f3a98dad74be4b23198d9d
SHA256a0380cdbb6ed01cf08e65c66314c034eb710ed7bdb2e2235357ecf5ed0bb6a92
SHA512f98a8f6fa3fd6d472a269f1f490f96db2b32f1714cf2f269d5fbe68c03d6b5c67ca40255059171ae87262f84f1e9dfb401bcb2d07f5ac87909ac705209ba64d8
-
Filesize
23KB
MD51af7daeb2c2f549d0755c36956c599da
SHA12081af2ec8abc78ee2f3a98dad74be4b23198d9d
SHA256a0380cdbb6ed01cf08e65c66314c034eb710ed7bdb2e2235357ecf5ed0bb6a92
SHA512f98a8f6fa3fd6d472a269f1f490f96db2b32f1714cf2f269d5fbe68c03d6b5c67ca40255059171ae87262f84f1e9dfb401bcb2d07f5ac87909ac705209ba64d8