Analysis

  • max time kernel
    159s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 21:37

General

  • Target

    491b1dfe9c3d8d0687339c3b12e07529d515f4bbaaa6c8def22032f223452bb0_JC.exe

  • Size

    26KB

  • MD5

    8ae7f841045aed1f381a68caa736d94b

  • SHA1

    8a4402abc3764dddbf0944da5bbf6e74394a6095

  • SHA256

    491b1dfe9c3d8d0687339c3b12e07529d515f4bbaaa6c8def22032f223452bb0

  • SHA512

    df25354666c46035552cdd60fbd90ea2ce57266782355a7ccb27da9600fd0ca1535f140da0fc6249d1ebd99dca7398173f59a52d24776a1c6286a2e94718b8cd

  • SSDEEP

    384:vLd6cufEYAA/XgWeyoHzCYe/iBY2OzRLTm3yilqr63+bJtVvGD:Dl8AA/6T5e/gsEsVvGD

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\491b1dfe9c3d8d0687339c3b12e07529d515f4bbaaa6c8def22032f223452bb0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\491b1dfe9c3d8d0687339c3b12e07529d515f4bbaaa6c8def22032f223452bb0_JC.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4256-0-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4256-1-0x0000000000820000-0x000000000082C000-memory.dmp

    Filesize

    48KB

  • memory/4256-2-0x00000000051B0000-0x000000000524C000-memory.dmp

    Filesize

    624KB

  • memory/4256-3-0x00000000058B0000-0x0000000005E54000-memory.dmp

    Filesize

    5.6MB

  • memory/4256-4-0x0000000005290000-0x00000000052A0000-memory.dmp

    Filesize

    64KB

  • memory/4256-5-0x00000000055A0000-0x0000000005632000-memory.dmp

    Filesize

    584KB

  • memory/4256-6-0x00000000058A0000-0x00000000058AA000-memory.dmp

    Filesize

    40KB

  • memory/4256-7-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4256-8-0x0000000005290000-0x00000000052A0000-memory.dmp

    Filesize

    64KB