Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 15:05

General

  • Target

    start.exe

  • Size

    93KB

  • MD5

    937286297fbc003e6a69fdc0f02ce8b0

  • SHA1

    2ebd595bbb357264649f17f8b066941f05befefb

  • SHA256

    35b46563f4d1ef02e7e2a315df8bbf0f8c2e49803856af0cf1418ea19fba58cf

  • SHA512

    9c26792ef5102c7215afae12264e2eca6c2a0f9ed67d9b84918b720f4ca81b5fa2cdb59a28f4089e25abb93243a3d90e98d45dda9862286e2e074708eaf405f4

  • SSDEEP

    1536:t8NBNvGfr2p4dTc/hDjEwzGi1dDmD4gS:t8Yfr2p4dI/Gi1dwh

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

dead-reviewer.gl.at.ply.gg:60161

Mutex

60742add55fe12a61a5fe6a3cf32e5c0

Attributes
  • reg_key

    60742add55fe12a61a5fe6a3cf32e5c0

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\start.exe
    "C:\Users\Admin\AppData\Local\Temp\start.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 236
      2⤵
        PID:2224
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1748
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          3⤵
          • Modifies Windows Firewall
          PID:3052
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
          3⤵
          • Modifies Windows Firewall
          PID:1860
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\server.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:964
          • C:\Windows\SysWOW64\PING.EXE
            ping 0 -n 2
            4⤵
            • Runs ping.exe
            PID:2804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      92KB

      MD5

      f2b3979cb5c827e34c5edff1beef5967

      SHA1

      bc8d214c05d33a20319cf31eafe39b2f2e26a186

      SHA256

      e42c3cac193d4e4b359b357e0e021ab15f66220fc2e231bfd1d59d7a157d1e02

      SHA512

      453fb6fdbfd7b37740c40912170a3f1c622b02e88d76017f2858a185b4c90d86d40eec7f30bb5dc14c01ab15c2189e8109d8ea850a7cc19ee18abef32466bf0e

    • \Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      93KB

      MD5

      937286297fbc003e6a69fdc0f02ce8b0

      SHA1

      2ebd595bbb357264649f17f8b066941f05befefb

      SHA256

      35b46563f4d1ef02e7e2a315df8bbf0f8c2e49803856af0cf1418ea19fba58cf

      SHA512

      9c26792ef5102c7215afae12264e2eca6c2a0f9ed67d9b84918b720f4ca81b5fa2cdb59a28f4089e25abb93243a3d90e98d45dda9862286e2e074708eaf405f4

    • memory/1748-17-0x0000000000B00000-0x0000000000B40000-memory.dmp

      Filesize

      256KB

    • memory/1748-18-0x0000000074C10000-0x00000000751BB000-memory.dmp

      Filesize

      5.7MB

    • memory/1748-16-0x0000000074C10000-0x00000000751BB000-memory.dmp

      Filesize

      5.7MB

    • memory/1748-56-0x0000000074C10000-0x00000000751BB000-memory.dmp

      Filesize

      5.7MB

    • memory/1748-57-0x0000000000B00000-0x0000000000B40000-memory.dmp

      Filesize

      256KB

    • memory/1748-60-0x0000000000B00000-0x0000000000B40000-memory.dmp

      Filesize

      256KB

    • memory/1748-59-0x0000000074C10000-0x00000000751BB000-memory.dmp

      Filesize

      5.7MB

    • memory/2224-3-0x0000000000480000-0x0000000000481000-memory.dmp

      Filesize

      4KB

    • memory/3040-15-0x0000000074C10000-0x00000000751BB000-memory.dmp

      Filesize

      5.7MB

    • memory/3040-0-0x0000000074C10000-0x00000000751BB000-memory.dmp

      Filesize

      5.7MB

    • memory/3040-2-0x0000000000600000-0x0000000000640000-memory.dmp

      Filesize

      256KB

    • memory/3040-1-0x0000000074C10000-0x00000000751BB000-memory.dmp

      Filesize

      5.7MB