Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 18:01

General

  • Target

    548A4036ED72D3479BA73BB16B540198.exe

  • Size

    1.1MB

  • MD5

    548a4036ed72d3479ba73bb16b540198

  • SHA1

    2f13d78e0a284eee8673aff586582050f72e4f82

  • SHA256

    f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f

  • SHA512

    97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a

  • SSDEEP

    24576:7gc2ZZ58NY+7pxrdVzZEUbIBd6U1EtuhgrSiDj2ni:7hFNY+7LdHPI91EagOi

Score
10/10

Malware Config

Extracted

Family

njrat

C2

hakim32.ddns.net:2000

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\548A4036ED72D3479BA73BB16B540198.exe
    "C:\Users\Admin\AppData\Local\Temp\548A4036ED72D3479BA73BB16B540198.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops autorun.inf file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:3856
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:5016
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Modifies Windows Firewall
        PID:3500

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          1.1MB

          MD5

          548a4036ed72d3479ba73bb16b540198

          SHA1

          2f13d78e0a284eee8673aff586582050f72e4f82

          SHA256

          f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f

          SHA512

          97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          1.1MB

          MD5

          548a4036ed72d3479ba73bb16b540198

          SHA1

          2f13d78e0a284eee8673aff586582050f72e4f82

          SHA256

          f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f

          SHA512

          97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          1.1MB

          MD5

          548a4036ed72d3479ba73bb16b540198

          SHA1

          2f13d78e0a284eee8673aff586582050f72e4f82

          SHA256

          f224e28066ac3cb24754bf423b368d28b720dc6889f86d2ce21df79f33982e5f

          SHA512

          97b72f7186233db4038caef8f4714fdcdec6da17d4c195d791381163dcd86f0b23c9b0c4dec39c1f0f2616615a77f53f18987b7faac8947283fe0b3fa97e6a9a

        • C:\Users\Admin\AppData\Roaming\app

          Filesize

          5B

          MD5

          02b81b0cbe1faaa1fa62d5fc876ab443

          SHA1

          d473cfe21fb1f188689415b0bdd239688f8fddd9

          SHA256

          e7e9e2c247bc872bacce77661c78f001a17d70ee3130a9016a5818da9da00cdb

          SHA512

          592ab5b200d4c560951cb70288dc1b7a562f0cbfaee01ce03076b6934d537b88575c2e1e0fedcc05db95e6c224ca739923e7d74f9165e683f3fbad7bbf641784

        • memory/1740-16-0x0000000000E40000-0x00000000011BE000-memory.dmp

          Filesize

          3.5MB

        • memory/1740-3-0x0000000003ED0000-0x0000000003EE0000-memory.dmp

          Filesize

          64KB

        • memory/1740-1-0x0000000074D40000-0x00000000752F1000-memory.dmp

          Filesize

          5.7MB

        • memory/1740-2-0x0000000074D40000-0x00000000752F1000-memory.dmp

          Filesize

          5.7MB

        • memory/1740-0-0x0000000000E40000-0x00000000011BE000-memory.dmp

          Filesize

          3.5MB

        • memory/1740-18-0x0000000074D40000-0x00000000752F1000-memory.dmp

          Filesize

          5.7MB

        • memory/4832-20-0x0000000074D40000-0x00000000752F1000-memory.dmp

          Filesize

          5.7MB

        • memory/4832-19-0x00000000031C0000-0x00000000031D0000-memory.dmp

          Filesize

          64KB

        • memory/4832-17-0x0000000074D40000-0x00000000752F1000-memory.dmp

          Filesize

          5.7MB

        • memory/4832-13-0x00000000000C0000-0x000000000043E000-memory.dmp

          Filesize

          3.5MB

        • memory/4832-36-0x00000000000C0000-0x000000000043E000-memory.dmp

          Filesize

          3.5MB

        • memory/4832-37-0x0000000074D40000-0x00000000752F1000-memory.dmp

          Filesize

          5.7MB

        • memory/4832-38-0x00000000031C0000-0x00000000031D0000-memory.dmp

          Filesize

          64KB

        • memory/4832-39-0x0000000074D40000-0x00000000752F1000-memory.dmp

          Filesize

          5.7MB