Analysis

  • max time kernel
    108s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 06:53

General

  • Target

    2c57307860d41e2fe4c63eff46610984.exe

  • Size

    79KB

  • MD5

    2c57307860d41e2fe4c63eff46610984

  • SHA1

    fd4019909baf41a003cc105dd004d83bc21a6516

  • SHA256

    4f00f70a815773e39b5b0f4d9c85213bd905035c13adcddb7760220fe6f9833e

  • SHA512

    8c4e233c1d43bf2a8f59749f01049c72a9104d8ba84d067d57b142eb83879be2ccaa7fdadabecd8ebb2151c5f7e1b27bf3b0b8312e54124aeaf0400accb70f19

  • SSDEEP

    1536:8iYlBSVqR3TblSkWbWvrrKY/Xg8cb7yYot4w:/YOObaCLg8cbXod

Malware Config

Extracted

Family

njrat

Botnet

PISKA

Mutex

53$79$73$74$65$6d$33$32

Attributes
  • reg_key

    53$79$73$74$65$6d$33$32

  • splitter

    |-F-|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 11 IoCs
  • Checks computer location settings 2 TTPs 14 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 9 IoCs
  • Executes dropped EXE 16 IoCs
  • Adds Run key to start application 2 TTPs 41 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c57307860d41e2fe4c63eff46610984.exe
    "C:\Users\Admin\AppData\Local\Temp\2c57307860d41e2fe4c63eff46610984.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
      "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:2408
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
          "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2228
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            PID:748
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
            5⤵
              PID:5004
              • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                6⤵
                • Checks computer location settings
                • Drops startup file
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:4076
                • C:\Windows\SysWOW64\netsh.exe
                  netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                  7⤵
                  • Modifies Windows Firewall
                  PID:1068
                • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                  7⤵
                    PID:3400
                    • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                      "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                      8⤵
                      • Checks computer location settings
                      • Drops startup file
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:1296
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                        9⤵
                        • Modifies Windows Firewall
                        PID:1840
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious use of WriteProcessMemory
                        PID:3344
                        • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                          "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                          10⤵
                            PID:920
                            • C:\Windows\SysWOW64\netsh.exe
                              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                              11⤵
                              • Modifies Windows Firewall
                              PID:2308
                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                              11⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious use of WriteProcessMemory
                              PID:2716
                              • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                                "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                                12⤵
                                • Checks computer location settings
                                • Drops startup file
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Suspicious use of WriteProcessMemory
                                PID:1176
                                • C:\Windows\SysWOW64\netsh.exe
                                  netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                                  13⤵
                                  • Modifies Windows Firewall
                                  PID:4652
                                • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                                  13⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Suspicious use of WriteProcessMemory
                                  PID:4876
                                  • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                                    14⤵
                                    • Checks computer location settings
                                    • Drops startup file
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Suspicious use of WriteProcessMemory
                                    PID:1608
                                    • C:\Windows\SysWOW64\netsh.exe
                                      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                                      15⤵
                                      • Modifies Windows Firewall
                                      PID:3860
                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                                      15⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • Suspicious use of WriteProcessMemory
                                      PID:1840
                                      • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                                        16⤵
                                        • Checks computer location settings
                                        • Drops startup file
                                        • Executes dropped EXE
                                        • Adds Run key to start application
                                        PID:4260
                                        • C:\Windows\SysWOW64\netsh.exe
                                          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                                          17⤵
                                          • Modifies Windows Firewall
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Suspicious use of WriteProcessMemory
                                          PID:5004
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                                          17⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          PID:2200
                                          • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                                            "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                                            18⤵
                                              PID:4852
                                              • C:\Windows\SysWOW64\netsh.exe
                                                netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                                                19⤵
                                                • Modifies Windows Firewall
                                                PID:1504
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                                                19⤵
                                                  PID:3428
                                                  • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                                                    20⤵
                                                      PID:3860
                                                      • C:\Windows\SysWOW64\netsh.exe
                                                        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                                                        21⤵
                                                        • Modifies Windows Firewall
                                                        PID:4848
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                                                        21⤵
                                                          PID:5064
                                                          • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                                                            22⤵
                                                              PID:2460
                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe" "Qasim_Haxor.exe" ENABLE
                                                                23⤵
                                                                • Modifies Windows Firewall
                                                                PID:1028
                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
                                                                23⤵
                                                                • Checks computer location settings
                                                                • Drops startup file
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:920
                                                                • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe"
                                                                  24⤵
                                                                    PID:4316
                    • C:\Windows\System32\Conhost.exe
                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      1⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:3400

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Qasim_Haxor.exe.log

                            Filesize

                            411B

                            MD5

                            b5766774c3ec5c3c2bd98da37069b64a

                            SHA1

                            230ab2667e627ef2252bdd19a2eb39fc86aa521c

                            SHA256

                            e81508d529d4607729ea190c95e5bf809bad250638ed22fa58c307de7c8d0161

                            SHA512

                            23038bdddc0db8830608e5c440e825e675338c30d79833c5173499bee105bd8d92896a397cd138359485228b98369d122a19e4e24b1cec13ad1679a609a47d23

                          • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe

                            Filesize

                            68KB

                            MD5

                            81eabcea05a95d2f73e28e4934a6e129

                            SHA1

                            bd179800bcea72ec9c7ad06319193fb3a8c7f323

                            SHA256

                            4e1fdd6ee418aac5057dd7e48aaf5317e1ae222ab7a51df80337deecbf62f786

                            SHA512

                            b0cb9d3e496367e729d4f4decd8c7bc0edfebe9b494dee9c7c46033764e6973e02f0417d15ac85e9bbfb5431cdd72584e215c5855da43f6ea5bd8085d5d683a3

                          • C:\Users\Admin\AppData\Local\Temp\Qasim_Haxor.exe

                            Filesize

                            79KB

                            MD5

                            2c57307860d41e2fe4c63eff46610984

                            SHA1

                            fd4019909baf41a003cc105dd004d83bc21a6516

                            SHA256

                            4f00f70a815773e39b5b0f4d9c85213bd905035c13adcddb7760220fe6f9833e

                            SHA512

                            8c4e233c1d43bf2a8f59749f01049c72a9104d8ba84d067d57b142eb83879be2ccaa7fdadabecd8ebb2151c5f7e1b27bf3b0b8312e54124aeaf0400accb70f19

                          • C:\Users\Admin\AppData\Local\Temp\melt.txt

                            Filesize

                            49B

                            MD5

                            6f437bc96fabebf1dadbf7f68832a25e

                            SHA1

                            6f81628ac5952f3ce7025011ef919505a5261318

                            SHA256

                            8bfa57cd722328ae1b4b4394bfc535e615220432a66735127eb37b8e0556a94c

                            SHA512

                            42028606dd729faa1ae81dae737ec68a9f351f4b4fad8caceca64eeb566e2767648cfeac3bdd59e5a7f3b146708bd92db1ae392ed4110e08b52c93609cbe4cd9

                          • memory/920-135-0x00000000010C0000-0x00000000010D0000-memory.dmp

                            Filesize

                            64KB

                          • memory/920-134-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/920-152-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1176-165-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1176-182-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1176-163-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1176-164-0x0000000000EB0000-0x0000000000EC0000-memory.dmp

                            Filesize

                            64KB

                          • memory/1296-122-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1296-105-0x00000000001E0000-0x00000000001F0000-memory.dmp

                            Filesize

                            64KB

                          • memory/1296-104-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1608-212-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1608-195-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1608-194-0x0000000000C80000-0x0000000000C90000-memory.dmp

                            Filesize

                            64KB

                          • memory/1608-193-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1840-213-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/1840-222-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2200-243-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2200-252-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2228-63-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2228-45-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2228-44-0x0000000000CB0000-0x0000000000CC0000-memory.dmp

                            Filesize

                            64KB

                          • memory/2228-43-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2440-31-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2440-42-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2716-153-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/2716-162-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3344-124-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3344-123-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3344-133-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3400-103-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3400-92-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3400-94-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3428-282-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3428-273-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3860-297-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3860-283-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/3860-284-0x0000000001090000-0x00000000010A0000-memory.dmp

                            Filesize

                            64KB

                          • memory/3860-285-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4076-75-0x0000000000A50000-0x0000000000A60000-memory.dmp

                            Filesize

                            64KB

                          • memory/4076-74-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4076-93-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4260-223-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4260-225-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4260-224-0x0000000000DF0000-0x0000000000E00000-memory.dmp

                            Filesize

                            64KB

                          • memory/4260-242-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4852-272-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4852-254-0x0000000000970000-0x0000000000980000-memory.dmp

                            Filesize

                            64KB

                          • memory/4852-253-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4852-255-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4876-192-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4876-183-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4940-30-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4940-14-0x00000000011B0000-0x00000000011C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4940-15-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4940-13-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/5004-64-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/5004-73-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/5028-12-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/5028-1-0x00000000019D0000-0x00000000019E0000-memory.dmp

                            Filesize

                            64KB

                          • memory/5028-2-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/5028-0-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/5064-299-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/5064-298-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/5064-306-0x00000000753B0000-0x0000000075961000-memory.dmp

                            Filesize

                            5.7MB