Analysis

  • max time kernel
    186s
  • max time network
    214s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 02:59

General

  • Target

    0c598e0a1d33a95614cda837f2d8cf55.exe

  • Size

    112KB

  • MD5

    0c598e0a1d33a95614cda837f2d8cf55

  • SHA1

    d125d2b68d6e9152c7de2bfccaff53cabd990e3a

  • SHA256

    89925e9162e4a7a2ec8cabed0da1d03552fbdf4d3efb1ffdb96407b66b959fbb

  • SHA512

    4a4e4887eb5f000ab60fca507af1de2a4ca74ac9e89b52e7bf7539655695d54918774a96b2781a17780e51d94902ede1b8b94fffc336fb08ee6ed23eca4b37dc

  • SSDEEP

    1536:UhWkvHfkmxUS2Bvsi4auMIofmSUbWkdnlJ6iHfLvg1pdtaXXbvihQQ3eNTespMDT:OHfkmxUSCVuMJ3UbvlYAjn7ov3saspMH

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

javaw

C2

kevinmitnick121.duckdns.org:1133

Mutex

7a793c9db4ef3df6f9918c45784e547f

Attributes
  • reg_key

    7a793c9db4ef3df6f9918c45784e547f

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c598e0a1d33a95614cda837f2d8cf55.exe
    "C:\Users\Admin\AppData\Local\Temp\0c598e0a1d33a95614cda837f2d8cf55.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Users\Admin\javaw.exe
      "C:\Users\Admin\javaw.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\javaw.exe" "javaw.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:2296

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\javaw.exe

          Filesize

          112KB

          MD5

          0c598e0a1d33a95614cda837f2d8cf55

          SHA1

          d125d2b68d6e9152c7de2bfccaff53cabd990e3a

          SHA256

          89925e9162e4a7a2ec8cabed0da1d03552fbdf4d3efb1ffdb96407b66b959fbb

          SHA512

          4a4e4887eb5f000ab60fca507af1de2a4ca74ac9e89b52e7bf7539655695d54918774a96b2781a17780e51d94902ede1b8b94fffc336fb08ee6ed23eca4b37dc

        • memory/2584-0-0x0000000000C30000-0x0000000000C4A000-memory.dmp

          Filesize

          104KB

        • memory/2584-1-0x00000000748F0000-0x0000000074FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/2584-2-0x0000000002280000-0x00000000022C0000-memory.dmp

          Filesize

          256KB

        • memory/2584-3-0x00000000002A0000-0x00000000002AC000-memory.dmp

          Filesize

          48KB

        • memory/2584-13-0x00000000748F0000-0x0000000074FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/2584-15-0x00000000748F0000-0x0000000074FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/2968-11-0x0000000000290000-0x00000000002AA000-memory.dmp

          Filesize

          104KB

        • memory/2968-12-0x00000000748F0000-0x0000000074FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/2968-14-0x0000000004680000-0x00000000046C0000-memory.dmp

          Filesize

          256KB

        • memory/2968-17-0x00000000748F0000-0x0000000074FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/2968-18-0x0000000004680000-0x00000000046C0000-memory.dmp

          Filesize

          256KB