Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 01:15
Behavioral task
behavioral1
Sample
077080f44504cac19f738cb765d959b4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
077080f44504cac19f738cb765d959b4.exe
Resource
win10v2004-20231127-en
General
-
Target
077080f44504cac19f738cb765d959b4.exe
-
Size
37KB
-
MD5
077080f44504cac19f738cb765d959b4
-
SHA1
833c0b3bc188780932c88fb0159b77c4949eca72
-
SHA256
71edf4c407e25949a1900945e47911a0979694f019f106e74440542c49dc4013
-
SHA512
2852ac1fcc7c8cb43c285830dc5502af341ced1990e6ec2194fe5dab2153afcaaf57a58ca30f02ca88d95b37e7ea57f826d5e9e0458593e78c93190b6313c85c
-
SSDEEP
384:GdsvEiTbHvpWNcZ0y8f7CTvvrILkCwE3rAF+rMRTyN/0L+EcoinblneHQM3epzXC:AsXTZ38f7CTv8FwKrM+rMRa8NufIt
Malware Config
Extracted
njrat
im523
HacKed
6.tcp.eu.ngrok.io:12147
69e846a2b9fb06c56ab6d7b22452d9e9
-
reg_key
69e846a2b9fb06c56ab6d7b22452d9e9
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 2 IoCs
Processes:
Roblox.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\69e846a2b9fb06c56ab6d7b22452d9e9.exe Roblox.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\69e846a2b9fb06c56ab6d7b22452d9e9.exe Roblox.exe -
Executes dropped EXE 1 IoCs
Processes:
Roblox.exepid process 2308 Roblox.exe -
Loads dropped DLL 1 IoCs
Processes:
077080f44504cac19f738cb765d959b4.exepid process 2460 077080f44504cac19f738cb765d959b4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Roblox.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\69e846a2b9fb06c56ab6d7b22452d9e9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Roblox.exe\" .." Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\69e846a2b9fb06c56ab6d7b22452d9e9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Roblox.exe\" .." Roblox.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Roblox.exepid process 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe 2308 Roblox.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Roblox.exepid process 2308 Roblox.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
Roblox.exedescription pid process Token: SeDebugPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe Token: 33 2308 Roblox.exe Token: SeIncBasePriorityPrivilege 2308 Roblox.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
077080f44504cac19f738cb765d959b4.exeRoblox.exedescription pid process target process PID 2460 wrote to memory of 2308 2460 077080f44504cac19f738cb765d959b4.exe Roblox.exe PID 2460 wrote to memory of 2308 2460 077080f44504cac19f738cb765d959b4.exe Roblox.exe PID 2460 wrote to memory of 2308 2460 077080f44504cac19f738cb765d959b4.exe Roblox.exe PID 2460 wrote to memory of 2308 2460 077080f44504cac19f738cb765d959b4.exe Roblox.exe PID 2308 wrote to memory of 2756 2308 Roblox.exe netsh.exe PID 2308 wrote to memory of 2756 2308 Roblox.exe netsh.exe PID 2308 wrote to memory of 2756 2308 Roblox.exe netsh.exe PID 2308 wrote to memory of 2756 2308 Roblox.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\077080f44504cac19f738cb765d959b4.exe"C:\Users\Admin\AppData\Local\Temp\077080f44504cac19f738cb765d959b4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Roblox.exe"C:\Users\Admin\AppData\Local\Temp\Roblox.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Roblox.exe" "Roblox.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2756
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5077080f44504cac19f738cb765d959b4
SHA1833c0b3bc188780932c88fb0159b77c4949eca72
SHA25671edf4c407e25949a1900945e47911a0979694f019f106e74440542c49dc4013
SHA5122852ac1fcc7c8cb43c285830dc5502af341ced1990e6ec2194fe5dab2153afcaaf57a58ca30f02ca88d95b37e7ea57f826d5e9e0458593e78c93190b6313c85c
-
Filesize
37KB
MD5077080f44504cac19f738cb765d959b4
SHA1833c0b3bc188780932c88fb0159b77c4949eca72
SHA25671edf4c407e25949a1900945e47911a0979694f019f106e74440542c49dc4013
SHA5122852ac1fcc7c8cb43c285830dc5502af341ced1990e6ec2194fe5dab2153afcaaf57a58ca30f02ca88d95b37e7ea57f826d5e9e0458593e78c93190b6313c85c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\69e846a2b9fb06c56ab6d7b22452d9e9.exe
Filesize37KB
MD5077080f44504cac19f738cb765d959b4
SHA1833c0b3bc188780932c88fb0159b77c4949eca72
SHA25671edf4c407e25949a1900945e47911a0979694f019f106e74440542c49dc4013
SHA5122852ac1fcc7c8cb43c285830dc5502af341ced1990e6ec2194fe5dab2153afcaaf57a58ca30f02ca88d95b37e7ea57f826d5e9e0458593e78c93190b6313c85c
-
Filesize
37KB
MD5077080f44504cac19f738cb765d959b4
SHA1833c0b3bc188780932c88fb0159b77c4949eca72
SHA25671edf4c407e25949a1900945e47911a0979694f019f106e74440542c49dc4013
SHA5122852ac1fcc7c8cb43c285830dc5502af341ced1990e6ec2194fe5dab2153afcaaf57a58ca30f02ca88d95b37e7ea57f826d5e9e0458593e78c93190b6313c85c