Overview
overview
10Static
static
106523.exe
windows7-x64
106523.exe
windows10-2004-x64
10Amdau.exe
windows7-x64
10Amdau.exe
windows10-2004-x64
10CLEP.exe
windows7-x64
10CLEP.exe
windows10-2004-x64
10DCKA.exe
windows7-x64
10DCKA.exe
windows10-2004-x64
10DEV.exe
windows7-x64
10DEV.exe
windows10-2004-x64
10DEVMin.exe
windows7-x64
10DEVMin.exe
windows10-2004-x64
10DevSt.exe
windows7-x64
1DevSt.exe
windows10-2004-x64
1Documents-...uz.exe
windows7-x64
7Documents-...uz.exe
windows10-2004-x64
5IqXYLXKzl6.exe
windows7-x64
IqXYLXKzl6.exe
windows10-2004-x64
1LEMON.exe
windows7-x64
10LEMON.exe
windows10-2004-x64
10LIMMin.exe
windows7-x64
10LIMMin.exe
windows10-2004-x64
10LIMSt.exe
windows7-x64
1LIMSt.exe
windows10-2004-x64
1LK2.exe
windows7-x64
10LK2.exe
windows10-2004-x64
10NINJA.exe
windows7-x64
7NINJA.exe
windows10-2004-x64
7PolymodXT.exe
windows7-x64
10PolymodXT.exe
windows10-2004-x64
10UM.exe
windows7-x64
10UM.exe
windows10-2004-x64
10Analysis
-
max time kernel
170s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 02:17
Behavioral task
behavioral1
Sample
6523.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6523.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Amdau.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Amdau.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
CLEP.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
CLEP.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
DCKA.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
DCKA.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
DEV.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
DEV.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
DEVMin.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
DEVMin.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
DevSt.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
DevSt.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
Documents-EnemyFrauz.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Documents-EnemyFrauz.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
IqXYLXKzl6.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
IqXYLXKzl6.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
LEMON.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
LEMON.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
LIMMin.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
LIMMin.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
LIMSt.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
LIMSt.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
LK2.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
LK2.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
NINJA.exe
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
NINJA.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
PolymodXT.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
PolymodXT.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
UM.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
UM.exe
Resource
win10v2004-20230915-en
General
-
Target
NINJA.exe
-
Size
817KB
-
MD5
9e870f801dd759298a34be67b104d930
-
SHA1
c770dab38fce750094a42b1d26311fe135e961ba
-
SHA256
6f1f83697d8caf1ac3cf0c3b05913633d49e756ed17189efc32cb0a6c3820e6b
-
SHA512
f0719d751e71229369ba9c49eee649e130f8eed7e7b662c724f8e7b25a950d77d4ba69aa967394d007561383ca64b95bcb0f466dfc7e1d4e00bf9e3829c957bf
-
SSDEEP
24576:5sGzuMNu2HWJD2U1zANRGTfllqapvYaqom:5tLezwRW3vJ
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SBADLH.lnk NINJA.exe -
Executes dropped EXE 2 IoCs
pid Process 2164 system.exe 2820 system.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 NINJA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\SBADLH = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\system.exe\"" NINJA.exe -
AutoIT Executable 17 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral27/memory/3068-9-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-10-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-12-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-13-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/2164-17-0x0000000000340000-0x00000000004FD000-memory.dmp autoit_exe behavioral27/memory/3068-18-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-19-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-20-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-22-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-23-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-24-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/2820-27-0x00000000001E0000-0x000000000039D000-memory.dmp autoit_exe behavioral27/memory/3068-28-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-29-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-30-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-31-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe behavioral27/memory/3068-32-0x00000000002F0000-0x00000000004AD000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2772 schtasks.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\root\SecurityCenter2 NINJA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe 3068 NINJA.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 NINJA.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2664 3068 NINJA.exe 29 PID 3068 wrote to memory of 2664 3068 NINJA.exe 29 PID 3068 wrote to memory of 2664 3068 NINJA.exe 29 PID 3068 wrote to memory of 2664 3068 NINJA.exe 29 PID 3068 wrote to memory of 2636 3068 NINJA.exe 31 PID 3068 wrote to memory of 2636 3068 NINJA.exe 31 PID 3068 wrote to memory of 2636 3068 NINJA.exe 31 PID 3068 wrote to memory of 2636 3068 NINJA.exe 31 PID 2664 wrote to memory of 2772 2664 cmd.exe 32 PID 2664 wrote to memory of 2772 2664 cmd.exe 32 PID 2664 wrote to memory of 2772 2664 cmd.exe 32 PID 2664 wrote to memory of 2772 2664 cmd.exe 32 PID 2132 wrote to memory of 2164 2132 taskeng.exe 35 PID 2132 wrote to memory of 2164 2132 taskeng.exe 35 PID 2132 wrote to memory of 2164 2132 taskeng.exe 35 PID 2132 wrote to memory of 2164 2132 taskeng.exe 35 PID 2132 wrote to memory of 2820 2132 taskeng.exe 36 PID 2132 wrote to memory of 2820 2132 taskeng.exe 36 PID 2132 wrote to memory of 2820 2132 taskeng.exe 36 PID 2132 wrote to memory of 2820 2132 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\NINJA.exe"C:\Users\Admin\AppData\Local\Temp\NINJA.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn SBADLH.exe /tr C:\Users\Admin\AppData\Roaming\Windata\system.exe /sc minute /mo 12⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn SBADLH.exe /tr C:\Users\Admin\AppData\Roaming\Windata\system.exe /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:2772
-
-
-
C:\Windows\SysWOW64\WSCript.exeWSCript C:\Users\Admin\AppData\Local\Temp\SBADLH.vbs2⤵PID:2636
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AE853C08-E844-40B0-BAE3-A883D7B4D197} S-1-5-21-686452656-3203474025-4140627569-1000:UUVOHKNL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\Windata\system.exeC:\Users\Admin\AppData\Roaming\Windata\system.exe2⤵
- Executes dropped EXE
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\Windata\system.exeC:\Users\Admin\AppData\Roaming\Windata\system.exe2⤵
- Executes dropped EXE
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830B
MD5d2060d8460f3e563679b861be3612622
SHA1c2b1f9eec2ed9958c3fd2bc30171a70cfe189324
SHA25607099ebf0bd52efd1718cfde37eed5fce833753fe43764ffeff22aa1393fd4e3
SHA512042d0350dac62d92402aa66ea8cc981a9ab3356a5472b63544d780757b8d890d1e9015d77318f22453bc447c09687fb30cca56c70d691a0e34acab51aa637b2e
-
Filesize
817KB
MD59e870f801dd759298a34be67b104d930
SHA1c770dab38fce750094a42b1d26311fe135e961ba
SHA2566f1f83697d8caf1ac3cf0c3b05913633d49e756ed17189efc32cb0a6c3820e6b
SHA512f0719d751e71229369ba9c49eee649e130f8eed7e7b662c724f8e7b25a950d77d4ba69aa967394d007561383ca64b95bcb0f466dfc7e1d4e00bf9e3829c957bf
-
Filesize
817KB
MD59e870f801dd759298a34be67b104d930
SHA1c770dab38fce750094a42b1d26311fe135e961ba
SHA2566f1f83697d8caf1ac3cf0c3b05913633d49e756ed17189efc32cb0a6c3820e6b
SHA512f0719d751e71229369ba9c49eee649e130f8eed7e7b662c724f8e7b25a950d77d4ba69aa967394d007561383ca64b95bcb0f466dfc7e1d4e00bf9e3829c957bf
-
Filesize
817KB
MD59e870f801dd759298a34be67b104d930
SHA1c770dab38fce750094a42b1d26311fe135e961ba
SHA2566f1f83697d8caf1ac3cf0c3b05913633d49e756ed17189efc32cb0a6c3820e6b
SHA512f0719d751e71229369ba9c49eee649e130f8eed7e7b662c724f8e7b25a950d77d4ba69aa967394d007561383ca64b95bcb0f466dfc7e1d4e00bf9e3829c957bf
-
Filesize
817KB
MD59e870f801dd759298a34be67b104d930
SHA1c770dab38fce750094a42b1d26311fe135e961ba
SHA2566f1f83697d8caf1ac3cf0c3b05913633d49e756ed17189efc32cb0a6c3820e6b
SHA512f0719d751e71229369ba9c49eee649e130f8eed7e7b662c724f8e7b25a950d77d4ba69aa967394d007561383ca64b95bcb0f466dfc7e1d4e00bf9e3829c957bf