Analysis
-
max time kernel
1561s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-20231215-it -
resource tags
arch:x64arch:x86image:win7-20231215-itlocale:it-itos:windows7-x64systemwindows -
submitted
17-02-2024 16:51
Behavioral task
behavioral1
Sample
Soundcloud Mp3 Downloader.exe
Resource
win7-20231215-it
Behavioral task
behavioral2
Sample
Soundcloud Mp3 Downloader.exe
Resource
win10-20240214-it
General
-
Target
Soundcloud Mp3 Downloader.exe
-
Size
34KB
-
MD5
10ca22a332f6acefb21a957e09e30608
-
SHA1
a048ee36ef2ba5dc9b676ba815df68b6d6188f60
-
SHA256
79f0aeca1d115dc298f302ad91b1762f3ef6aefe16b13f269aa6d211def3ff38
-
SHA512
4c751bc0923eed5f33bee95c706253704a40f838a45de7b35a34f3c330af399e98e37ed3c0f7c5d0a9333a911207e3ed5589b099838ffac2c029b86bc8441a91
-
SSDEEP
384:ZtZNYkRM94IIWsi7omXh2JfNFPIMeTuSblDTodg9TduS/EIGsJjwE7UMcrie48eC:nDSOComanqlouDuCEIGfRn+fw
Malware Config
Extracted
njrat
0.9d
Hacked By HiDDen PerSOn
0.tcp.eu.ngrok.io:10540
eb79d2041d670825ab1270eb43a4aa92
-
reg_key
eb79d2041d670825ab1270eb43a4aa92
-
splitter
|Vyrn|
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 2764 netsh.exe 1604 netsh.exe -
Drops startup file 2 IoCs
Processes:
System32.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eb79d2041d670825ab1270eb43a4aa92.exe System32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eb79d2041d670825ab1270eb43a4aa92.exe System32.exe -
Executes dropped EXE 1 IoCs
Processes:
System32.exepid process 1224 System32.exe -
Loads dropped DLL 1 IoCs
Processes:
Soundcloud Mp3 Downloader.exepid process 1324 Soundcloud Mp3 Downloader.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Processes:
resource yara_rule behavioral1/memory/1876-19-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral1/memory/1876-21-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral1/memory/1876-24-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral1/memory/1876-26-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral1/memory/1876-27-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral1/memory/1876-28-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral1/memory/1876-29-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral1/memory/1876-30-0x0000000000400000-0x0000000000472000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
System32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\eb79d2041d670825ab1270eb43a4aa92 = "\"C:\\Users\\Admin\\AppData\\Roaming\\System32.exe\" .." System32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\eb79d2041d670825ab1270eb43a4aa92 = "\"C:\\Users\\Admin\\AppData\\Roaming\\System32.exe\" .." System32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
System32.exedescription pid process target process PID 1224 set thread context of 1876 1224 System32.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2596 ipconfig.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
System32.exedescription pid process Token: SeDebugPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe Token: 33 1224 System32.exe Token: SeIncBasePriorityPrivilege 1224 System32.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
Soundcloud Mp3 Downloader.exeSystem32.execmd.execmd.exedescription pid process target process PID 1324 wrote to memory of 1224 1324 Soundcloud Mp3 Downloader.exe System32.exe PID 1324 wrote to memory of 1224 1324 Soundcloud Mp3 Downloader.exe System32.exe PID 1324 wrote to memory of 1224 1324 Soundcloud Mp3 Downloader.exe System32.exe PID 1324 wrote to memory of 1224 1324 Soundcloud Mp3 Downloader.exe System32.exe PID 1224 wrote to memory of 2764 1224 System32.exe netsh.exe PID 1224 wrote to memory of 2764 1224 System32.exe netsh.exe PID 1224 wrote to memory of 2764 1224 System32.exe netsh.exe PID 1224 wrote to memory of 2764 1224 System32.exe netsh.exe PID 1224 wrote to memory of 1876 1224 System32.exe vbc.exe PID 1224 wrote to memory of 1876 1224 System32.exe vbc.exe PID 1224 wrote to memory of 1876 1224 System32.exe vbc.exe PID 1224 wrote to memory of 1876 1224 System32.exe vbc.exe PID 1224 wrote to memory of 1876 1224 System32.exe vbc.exe PID 1224 wrote to memory of 1876 1224 System32.exe vbc.exe PID 1224 wrote to memory of 1876 1224 System32.exe vbc.exe PID 1224 wrote to memory of 1876 1224 System32.exe vbc.exe PID 1224 wrote to memory of 1480 1224 System32.exe cmd.exe PID 1224 wrote to memory of 1480 1224 System32.exe cmd.exe PID 1224 wrote to memory of 1480 1224 System32.exe cmd.exe PID 1224 wrote to memory of 1480 1224 System32.exe cmd.exe PID 1480 wrote to memory of 2596 1480 cmd.exe ipconfig.exe PID 1480 wrote to memory of 2596 1480 cmd.exe ipconfig.exe PID 1480 wrote to memory of 2596 1480 cmd.exe ipconfig.exe PID 1480 wrote to memory of 2596 1480 cmd.exe ipconfig.exe PID 1224 wrote to memory of 1604 1224 System32.exe netsh.exe PID 1224 wrote to memory of 1604 1224 System32.exe netsh.exe PID 1224 wrote to memory of 1604 1224 System32.exe netsh.exe PID 1224 wrote to memory of 1604 1224 System32.exe netsh.exe PID 1224 wrote to memory of 848 1224 System32.exe cmd.exe PID 1224 wrote to memory of 848 1224 System32.exe cmd.exe PID 1224 wrote to memory of 848 1224 System32.exe cmd.exe PID 1224 wrote to memory of 848 1224 System32.exe cmd.exe PID 848 wrote to memory of 1960 848 cmd.exe PING.EXE PID 848 wrote to memory of 1960 848 cmd.exe PING.EXE PID 848 wrote to memory of 1960 848 cmd.exe PING.EXE PID 848 wrote to memory of 1960 848 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Soundcloud Mp3 Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Soundcloud Mp3 Downloader.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Roaming\System32.exe"C:\Users\Admin\AppData\Roaming\System32.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\System32.exe" "System32.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2764
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\1024198"3⤵PID:1876
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/release3⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- Gathers network information
PID:2596
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\System32.exe"3⤵
- Modifies Windows Firewall
PID:1604
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Roaming\System32.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 24⤵
- Runs ping.exe
PID:1960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD510ca22a332f6acefb21a957e09e30608
SHA1a048ee36ef2ba5dc9b676ba815df68b6d6188f60
SHA25679f0aeca1d115dc298f302ad91b1762f3ef6aefe16b13f269aa6d211def3ff38
SHA5124c751bc0923eed5f33bee95c706253704a40f838a45de7b35a34f3c330af399e98e37ed3c0f7c5d0a9333a911207e3ed5589b099838ffac2c029b86bc8441a91