Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 15:05
Behavioral task
behavioral1
Sample
start.exe
Resource
win7-20231129-en
General
-
Target
start.exe
-
Size
93KB
-
MD5
937286297fbc003e6a69fdc0f02ce8b0
-
SHA1
2ebd595bbb357264649f17f8b066941f05befefb
-
SHA256
35b46563f4d1ef02e7e2a315df8bbf0f8c2e49803856af0cf1418ea19fba58cf
-
SHA512
9c26792ef5102c7215afae12264e2eca6c2a0f9ed67d9b84918b720f4ca81b5fa2cdb59a28f4089e25abb93243a3d90e98d45dda9862286e2e074708eaf405f4
-
SSDEEP
1536:t8NBNvGfr2p4dTc/hDjEwzGi1dDmD4gS:t8Yfr2p4dI/Gi1dwh
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
dead-reviewer.gl.at.ply.gg:60161
60742add55fe12a61a5fe6a3cf32e5c0
-
reg_key
60742add55fe12a61a5fe6a3cf32e5c0
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 1860 netsh.exe 3052 netsh.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\60742add55fe12a61a5fe6a3cf32e5c0Windows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\60742add55fe12a61a5fe6a3cf32e5c0Windows Update.exe server.exe -
Executes dropped EXE 1 IoCs
pid Process 1748 server.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 start.exe 3040 start.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf server.exe File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe File created C:\autorun.inf server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Explower.exe server.exe File opened for modification C:\Windows\SysWOW64\Explower.exe server.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Explower.exe server.exe File opened for modification C:\Program Files (x86)\Explower.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2804 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe 1748 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1748 server.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe Token: 33 1748 server.exe Token: SeIncBasePriorityPrivilege 1748 server.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2224 3040 start.exe 28 PID 3040 wrote to memory of 2224 3040 start.exe 28 PID 3040 wrote to memory of 2224 3040 start.exe 28 PID 3040 wrote to memory of 2224 3040 start.exe 28 PID 3040 wrote to memory of 1748 3040 start.exe 29 PID 3040 wrote to memory of 1748 3040 start.exe 29 PID 3040 wrote to memory of 1748 3040 start.exe 29 PID 3040 wrote to memory of 1748 3040 start.exe 29 PID 1748 wrote to memory of 3052 1748 server.exe 31 PID 1748 wrote to memory of 3052 1748 server.exe 31 PID 1748 wrote to memory of 3052 1748 server.exe 31 PID 1748 wrote to memory of 3052 1748 server.exe 31 PID 1748 wrote to memory of 1860 1748 server.exe 35 PID 1748 wrote to memory of 1860 1748 server.exe 35 PID 1748 wrote to memory of 1860 1748 server.exe 35 PID 1748 wrote to memory of 1860 1748 server.exe 35 PID 1748 wrote to memory of 964 1748 server.exe 37 PID 1748 wrote to memory of 964 1748 server.exe 37 PID 1748 wrote to memory of 964 1748 server.exe 37 PID 1748 wrote to memory of 964 1748 server.exe 37 PID 964 wrote to memory of 2804 964 cmd.exe 39 PID 964 wrote to memory of 2804 964 cmd.exe 39 PID 964 wrote to memory of 2804 964 cmd.exe 39 PID 964 wrote to memory of 2804 964 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 2362⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:3052
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Modifies Windows Firewall
PID:1860
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 24⤵
- Runs ping.exe
PID:2804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5f2b3979cb5c827e34c5edff1beef5967
SHA1bc8d214c05d33a20319cf31eafe39b2f2e26a186
SHA256e42c3cac193d4e4b359b357e0e021ab15f66220fc2e231bfd1d59d7a157d1e02
SHA512453fb6fdbfd7b37740c40912170a3f1c622b02e88d76017f2858a185b4c90d86d40eec7f30bb5dc14c01ab15c2189e8109d8ea850a7cc19ee18abef32466bf0e
-
Filesize
93KB
MD5937286297fbc003e6a69fdc0f02ce8b0
SHA12ebd595bbb357264649f17f8b066941f05befefb
SHA25635b46563f4d1ef02e7e2a315df8bbf0f8c2e49803856af0cf1418ea19fba58cf
SHA5129c26792ef5102c7215afae12264e2eca6c2a0f9ed67d9b84918b720f4ca81b5fa2cdb59a28f4089e25abb93243a3d90e98d45dda9862286e2e074708eaf405f4