Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 10:36

General

  • Target

    534a46e4d4b274dfd5366ceba0e5ce88.exe

  • Size

    339KB

  • MD5

    534a46e4d4b274dfd5366ceba0e5ce88

  • SHA1

    425805bb6f46b4496cd8234c8fb34c420f62f9a1

  • SHA256

    1223f6a7ef9f4838631c9640c9552c66d61023283711f7e9b63b4d59014a0014

  • SHA512

    53a88fa01aa85c0b174856ac4c5414053d9f774764920d5d32f82354e366014f636d85add9acabe13f7034139a1732ece045d782dfd70a80e58f4b49ddfb9849

  • SSDEEP

    768:LevMNOunYSLjLEOHEn6fM1kF8amfIT3r5Wn/wZLkne43tgem4Kgo:ivA3LBixaZTdM/+gneGa66

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\534a46e4d4b274dfd5366ceba0e5ce88.exe
    "C:\Users\Admin\AppData\Local\Temp\534a46e4d4b274dfd5366ceba0e5ce88.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Roaming\sim.exe
      "C:\Users\Admin\AppData\Roaming\sim.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\sim.exe" "sim.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:4356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3781B4A3713292956206932165FA4132_247C447D981AB87548C17087CA562739

    Filesize

    471B

    MD5

    3bff57aeb78538d4f19dd6669330ec49

    SHA1

    e935d48489a2b71dfe644e8a28fb89efadf0cf50

    SHA256

    1f557a76094314ed6b49a99c2b48ea9ecec9aa77cb4cabf71bcef742c2a69616

    SHA512

    34424fb0ecc0ad2566535700281f440e7c689d256b8709bc89a719ee6c4526869194057039545cbb84f125ca30ee513501723146edb1711fdd7e65e15e815c05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_E1EDEF0C21AE75D448F7327475DF4C9E

    Filesize

    471B

    MD5

    55301526ec0e5c9c98127a0552c7314e

    SHA1

    efa3232f6efeafd0ffb7546c7998ca448d003c9f

    SHA256

    8aab71269bbe608ebb84a0ac82bc25ee46909a895747fb1d5252351770f0eee0

    SHA512

    1488377e7450f28cebdf68982482903c83e600932984e1a358dff8b98e13f2b5b5ea1a003e84af15081952e76a4f04fb5e699471d224482493afccb09d97d6ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3781B4A3713292956206932165FA4132_247C447D981AB87548C17087CA562739

    Filesize

    408B

    MD5

    70acfe6264c323cba95f8c091be2b696

    SHA1

    bebee9c7e37a3c8f982e60111a1df0c7d35d5226

    SHA256

    28d3af85b48e40c347b655ad89cdabb56a440e78560d11c1c73375b33175da40

    SHA512

    7e2b2455379625327bdd3d8767860392d52d58816fbcebc1cc1eac6c3b0de03f5e41e1a2f5fc55b98aa6bfbd22e3f3d620390cc6033b123a82c2854340cb5a18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_E1EDEF0C21AE75D448F7327475DF4C9E

    Filesize

    400B

    MD5

    56558ded0d8262bb19b1a25f347cea62

    SHA1

    fe26176bf783e3f331701a04ce6e86c7398e2ce9

    SHA256

    9d733d2ec58c9104068f0b8bd8aa9720367f0b676ad484968f24be0d6628f078

    SHA512

    6820cb1139243f8c2bd97b3a2c1655128735b67c860775c8808ff286b54892b3786278ab17f0be57370b0777753ef0d14d31bc1d5585827d5472d54dc13b2515

  • C:\Users\Admin\AppData\Roaming\sim.exe

    Filesize

    339KB

    MD5

    534a46e4d4b274dfd5366ceba0e5ce88

    SHA1

    425805bb6f46b4496cd8234c8fb34c420f62f9a1

    SHA256

    1223f6a7ef9f4838631c9640c9552c66d61023283711f7e9b63b4d59014a0014

    SHA512

    53a88fa01aa85c0b174856ac4c5414053d9f774764920d5d32f82354e366014f636d85add9acabe13f7034139a1732ece045d782dfd70a80e58f4b49ddfb9849

  • memory/1664-24-0x0000000001520000-0x0000000001530000-memory.dmp

    Filesize

    64KB

  • memory/1664-30-0x0000000074EE0000-0x0000000075491000-memory.dmp

    Filesize

    5.7MB

  • memory/1664-23-0x0000000074EE0000-0x0000000075491000-memory.dmp

    Filesize

    5.7MB

  • memory/1664-31-0x0000000074EE0000-0x0000000075491000-memory.dmp

    Filesize

    5.7MB

  • memory/1664-32-0x0000000001520000-0x0000000001530000-memory.dmp

    Filesize

    64KB

  • memory/4380-25-0x0000000074EE0000-0x0000000075491000-memory.dmp

    Filesize

    5.7MB

  • memory/4380-0-0x0000000074EE0000-0x0000000075491000-memory.dmp

    Filesize

    5.7MB

  • memory/4380-2-0x0000000000950000-0x0000000000960000-memory.dmp

    Filesize

    64KB

  • memory/4380-1-0x0000000074EE0000-0x0000000075491000-memory.dmp

    Filesize

    5.7MB