Analysis
-
max time kernel
1s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 19:21
Behavioral task
behavioral1
Sample
378a4914e5bae07027c76524b9d9f7fe.exe
Resource
win7-20231215-en
General
-
Target
378a4914e5bae07027c76524b9d9f7fe.exe
-
Size
402KB
-
MD5
378a4914e5bae07027c76524b9d9f7fe
-
SHA1
b6bc0e5ae3c8de4ecc6e44d8c72fe683f28bec43
-
SHA256
bee0493124ea93b12b32dfa376355d2cae6d81ce736732ffbe091e33e1668f2f
-
SHA512
9e29333f3eeafa3c1f1e98d050e6aa125e347d11024e395ba17799772b454338451025f9c6fc219d030b5519cf020f2816af5ddd3b02fa87c6b5f9ba13cd60e5
-
SSDEEP
6144:amaKVBGmE84IMNv55giU0pKiFYHxfx15RvOagakZBxkTN2gmeGcFnVQb/DAYbDgl:jSmLAuEY71fviagATFmebVQDcYc5
Malware Config
Extracted
njrat
0.6.4
hhhmach.ddns.net:1177
5cd8f17f4086744065eb0992a09e05a2
-
reg_key
5cd8f17f4086744065eb0992a09e05a2
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3800 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 test.exe -
resource yara_rule behavioral2/memory/4216-0-0x0000000000400000-0x00000000004FB000-memory.dmp upx behavioral2/memory/4216-22-0x0000000000400000-0x00000000004FB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 840 4216 WerFault.exe 19 3580 4216 WerFault.exe 19 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4216 wrote to memory of 3704 4216 378a4914e5bae07027c76524b9d9f7fe.exe 30 PID 4216 wrote to memory of 3704 4216 378a4914e5bae07027c76524b9d9f7fe.exe 30 PID 4216 wrote to memory of 3704 4216 378a4914e5bae07027c76524b9d9f7fe.exe 30 PID 3704 wrote to memory of 1188 3704 cmd.exe 31 PID 3704 wrote to memory of 1188 3704 cmd.exe 31 PID 3704 wrote to memory of 1188 3704 cmd.exe 31
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4216 -ip 42161⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\378a4914e5bae07027c76524b9d9f7fe.exe"C:\Users\Admin\AppData\Local\Temp\378a4914e5bae07027c76524b9d9f7fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 2442⤵
- Program crash
PID:840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe3⤵
- Executes dropped EXE
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"4⤵PID:2304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 1642⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE1⤵
- Modifies Windows Firewall
PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4216 -ip 42161⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b589cda8941698c0328a7eba15af656e
SHA18dc480e34cdda64db1ee6d312324c3cd212d5c83
SHA256575e30db708b1c52ca9c038f27b24b07d2210dc8b79efe479ad579671ae08941
SHA512d1569243ea0aade7ce74061aafb9c29f5bd23e9f9d8ba05e42f7eb7af8afe39fed0db670cbd26f2a6b98156d7c3d2efcc92c89edb0ae93b86332ab43c202a274
-
Filesize
33KB
MD51c293961f8ac1f7ab77a1123773f9d30
SHA17ef6da0ea04e8cf7ed85c6d86f48b96fec0d7821
SHA25689d1c0383c6f5cf066bf51115fc318f355c0e802212269485d1b5d5073d6db5c
SHA5127cf4231719599a1e9899ad103a45ee11519459d414775036e4ba646cd9126200d489d7f738fefedfa3dfc5ada45b193dca3a5f91b564c1ac8a6bca3c963d8acc
-
Filesize
68KB
MD5195c352fd94623f47bf596b6beb0605f
SHA169c0cc275a3bf7e69b5c0624c919db6a7eae726c
SHA25627483de2dc70f44c855ecd2998a9dcbdf853070b85c2338adb6f6d687a43080b
SHA512fb1a603b7b411dd75583c8a220bcb406a45e2f6e3e70a8335c238f42ac1fef42eacf4f49b76d4c42f3d323df586ac1c4af9cc8a5bb1fd3d3261d2d0d3e23b062
-
Filesize
58KB
MD575ea7abcc30ed1c33559061dc85c72f7
SHA1d118205db1166c13b3bbbc2bb6cd248e519c72d2
SHA2568f5f5aa0c64b085746c13ff80a9a691070910af7c8651aa04dce2758ffb61ca2
SHA5128fdcd8d79dab3c42e385924e230503434e1037ab1a29672ec34d6c23abb0961516d95689b7f55166b08113a7c91e905f7e7eb4bd5aa9d666a33989ea662d0512
-
Filesize
9KB
MD5f53f841bb49937b64c3980f188c0bc1d
SHA15bcb1ddb613c63160944795d4704c7294d91da29
SHA2566e8a4a023d23348c99a7d7dcd323ac3f3537f50e75327c1290cd60ed2b0d7022
SHA512504e73f36256441c75b9b3150cffd0328afc4ab3aec9c8c0220c31959b6772cd4a1f311298c5a9222a07ae8538fbb9ec74f58016e157925265864d62a1401a06