Analysis

  • max time kernel
    672s
  • max time network
    1828s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-es
  • resource tags

    arch:x64arch:x86image:win10-20231215-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    30/12/2023, 05:23

General

  • Target

    onetapcc - Copy.exe

  • Size

    23KB

  • MD5

    c7fe6461ab1eedc848c97887f7acc1fd

  • SHA1

    a1746acbe3c6a67a0b53cbf305f8f4e841d6a349

  • SHA256

    6864c95fa9fab28a45538743582fd8416d6dbd0220a5d18c3c9cdd7a3f89fa33

  • SHA512

    e14eb165ad9b98684ed99093da3d6ccf112c6d23fe3a2f2d9eb35cda58f477e12cf9271b9a5ae1a24365a5c8a125a5d2bfb09a64eabb2a0ae21bdc622fe46dc3

  • SSDEEP

    384:3c6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZGGa:MIU0tw3Rpcnu7d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

insurance-smith.gl.at.ply.gg:54779

Mutex

3dcef34885ca46282a173f90b56bcae7

Attributes
  • reg_key

    3dcef34885ca46282a173f90b56bcae7

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\onetapcc - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\onetapcc - Copy.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Users\Admin\AppData\Local\Temp\onetap.exe
      "C:\Users\Admin\AppData\Local\Temp\onetap.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\onetap.exe" "onetap.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:3268
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\onetap.exe"
        3⤵
        • Modifies Windows Firewall
        PID:4840
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\onetap.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Windows\SysWOW64\PING.EXE
          ping 0 -n 2
          4⤵
          • Runs ping.exe
          PID:3624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onetap.exe

    Filesize

    23KB

    MD5

    c7fe6461ab1eedc848c97887f7acc1fd

    SHA1

    a1746acbe3c6a67a0b53cbf305f8f4e841d6a349

    SHA256

    6864c95fa9fab28a45538743582fd8416d6dbd0220a5d18c3c9cdd7a3f89fa33

    SHA512

    e14eb165ad9b98684ed99093da3d6ccf112c6d23fe3a2f2d9eb35cda58f477e12cf9271b9a5ae1a24365a5c8a125a5d2bfb09a64eabb2a0ae21bdc622fe46dc3

  • memory/4168-9-0x0000000073D40000-0x00000000742F0000-memory.dmp

    Filesize

    5.7MB

  • memory/4168-1-0x0000000073D40000-0x00000000742F0000-memory.dmp

    Filesize

    5.7MB

  • memory/4168-2-0x00000000027F0000-0x0000000002800000-memory.dmp

    Filesize

    64KB

  • memory/4168-0-0x0000000073D40000-0x00000000742F0000-memory.dmp

    Filesize

    5.7MB

  • memory/4408-11-0x0000000002E50000-0x0000000002E60000-memory.dmp

    Filesize

    64KB

  • memory/4408-10-0x0000000073D40000-0x00000000742F0000-memory.dmp

    Filesize

    5.7MB

  • memory/4408-12-0x0000000073D40000-0x00000000742F0000-memory.dmp

    Filesize

    5.7MB

  • memory/4408-14-0x0000000073D40000-0x00000000742F0000-memory.dmp

    Filesize

    5.7MB

  • memory/4408-15-0x0000000002E50000-0x0000000002E60000-memory.dmp

    Filesize

    64KB

  • memory/4408-16-0x0000000002E50000-0x0000000002E60000-memory.dmp

    Filesize

    64KB

  • memory/4408-17-0x0000000002E50000-0x0000000002E60000-memory.dmp

    Filesize

    64KB

  • memory/4408-21-0x0000000073D40000-0x00000000742F0000-memory.dmp

    Filesize

    5.7MB