Analysis

  • max time kernel
    159s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2024 10:06

General

  • Target

    4574bd93391feb09a4f2fb7feaa0f29d.exe

  • Size

    33KB

  • MD5

    4574bd93391feb09a4f2fb7feaa0f29d

  • SHA1

    8bf4ce7c275d6efb9470f617189d2945f9039935

  • SHA256

    cdc771adbd55add756c3fd400ae846c8b8d378c68feac22e0bcc96dc480a6dc4

  • SHA512

    f346a22c4b6b9dc3199300b591b40cfc54555b849e90fa38d3001c4a7f4d6ca3b139348b60409903ec3bd7fd9742a3e2ddba510485e4d68d7f5be43a029fadfa

  • SSDEEP

    768:VvTgsrbTI3IOTT95Hrg1XVbXBAQ/nvF8Nul2y:tJbaM7BHnmulZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

rxlwee.ddns.net:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4574bd93391feb09a4f2fb7feaa0f29d.exe
    "C:\Users\Admin\AppData\Local\Temp\4574bd93391feb09a4f2fb7feaa0f29d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SYSTEM32\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\4574bd93391feb09a4f2fb7feaa0f29d.exe" "4574bd93391feb09a4f2fb7feaa0f29d.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:3432

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1732-0-0x00007FFE09FF0000-0x00007FFE0A991000-memory.dmp
    Filesize

    9.6MB

  • memory/1732-1-0x00007FFE09FF0000-0x00007FFE0A991000-memory.dmp
    Filesize

    9.6MB

  • memory/1732-2-0x0000000001540000-0x0000000001550000-memory.dmp
    Filesize

    64KB

  • memory/1732-3-0x000000001C030000-0x000000001C4FE000-memory.dmp
    Filesize

    4.8MB

  • memory/1732-4-0x000000001BA80000-0x000000001BA96000-memory.dmp
    Filesize

    88KB

  • memory/1732-5-0x00007FFE09FF0000-0x00007FFE0A991000-memory.dmp
    Filesize

    9.6MB

  • memory/1732-6-0x000000001C5B0000-0x000000001C656000-memory.dmp
    Filesize

    664KB

  • memory/1732-7-0x00007FFE09FF0000-0x00007FFE0A991000-memory.dmp
    Filesize

    9.6MB

  • memory/1732-8-0x0000000001540000-0x0000000001550000-memory.dmp
    Filesize

    64KB

  • memory/1732-9-0x000000001C7F0000-0x000000001C88C000-memory.dmp
    Filesize

    624KB

  • memory/1732-10-0x000000001BAA0000-0x000000001BAA8000-memory.dmp
    Filesize

    32KB