Resubmissions

01-12-2024 17:18

241201-vvcala1nhl 10

02-03-2024 19:50

240302-ykm6wshc64 10

Analysis

  • max time kernel
    1049s
  • max time network
    1045s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-03-2024 19:50

General

  • Target

    Server.exe

  • Size

    37KB

  • MD5

    b3d12b297a856103adb57f5492cd6851

  • SHA1

    2a6ebc4e929ed73ecc3720ae01d3d16e8f7b6089

  • SHA256

    83b66e30244b1729ebbaf9f0921fd51c0337e638665fa1ab01e8d8237a7fe80c

  • SHA512

    54d38f293feb0cb43dbcd9c8ac3b787e087ce471ced0a0ce7aa72a24d43acdf4d5210633832a68def43fd5c6561069353fdb6eb29ced28cbebbf27c302481cb8

  • SSDEEP

    384:b1tcaCisx/WRdL5kyc/Tant5ngCmxorAF+rMRTyN/0L+EcoinblneHQM3epzXCNV:RtcmD5nc/TaPNmyrM+rMRa8Nucpt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

4elsnurikom

C2

6.tcp.eu.ngrok.io:12125

Mutex

c52f1e45400f62b1c170da017d840dd6

Attributes
  • reg_key

    c52f1e45400f62b1c170da017d840dd6

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 17 IoCs
  • Drops autorun.inf file 1 TTPs 5 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    "C:\Users\Admin\AppData\Local\Temp\Server.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Roaming\svhost.exe
      "C:\Users\Admin\AppData\Roaming\svhost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops autorun.inf file
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svhost.exe" "svhost.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:636
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\tmp9E3A.tmp.mp4"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:4052
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3f8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp9E3A.tmp.mp4

    Filesize

    2.1MB

    MD5

    e500ade62194de912397d1ff9e5ccdb4

    SHA1

    b07be605bff0014198b9f70566559fa1c076d4bc

    SHA256

    94852ff8c355d18981e87f7fc25146af5ad0df9303e4d634684b924b6c48581d

    SHA512

    766999d2c878bd4a8ef4b6caf521bd0cca73c4a22b05216ef4291a5aefd4f1598e2ad9db0f6bc993c1096ac025b387467c7bb8c542d54681c39f64177feb1cca

  • C:\Users\Admin\AppData\Roaming\svhost.exe

    Filesize

    37KB

    MD5

    b3d12b297a856103adb57f5492cd6851

    SHA1

    2a6ebc4e929ed73ecc3720ae01d3d16e8f7b6089

    SHA256

    83b66e30244b1729ebbaf9f0921fd51c0337e638665fa1ab01e8d8237a7fe80c

    SHA512

    54d38f293feb0cb43dbcd9c8ac3b787e087ce471ced0a0ce7aa72a24d43acdf4d5210633832a68def43fd5c6561069353fdb6eb29ced28cbebbf27c302481cb8

  • memory/2200-0-0x0000000073E80000-0x0000000074430000-memory.dmp

    Filesize

    5.7MB

  • memory/2200-1-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/2200-2-0x0000000073E80000-0x0000000074430000-memory.dmp

    Filesize

    5.7MB

  • memory/2200-10-0x0000000073E80000-0x0000000074430000-memory.dmp

    Filesize

    5.7MB

  • memory/3644-11-0x0000000002010000-0x0000000002020000-memory.dmp

    Filesize

    64KB

  • memory/3644-9-0x0000000073E80000-0x0000000074430000-memory.dmp

    Filesize

    5.7MB

  • memory/3644-12-0x0000000073E80000-0x0000000074430000-memory.dmp

    Filesize

    5.7MB

  • memory/3644-22-0x0000000073E80000-0x0000000074430000-memory.dmp

    Filesize

    5.7MB

  • memory/3644-23-0x0000000002010000-0x0000000002020000-memory.dmp

    Filesize

    64KB

  • memory/3644-24-0x0000000002010000-0x0000000002020000-memory.dmp

    Filesize

    64KB

  • memory/3644-25-0x0000000002010000-0x0000000002020000-memory.dmp

    Filesize

    64KB

  • memory/4052-38-0x00007FF6C44E0000-0x00007FF6C45D8000-memory.dmp

    Filesize

    992KB

  • memory/4052-39-0x00007FF854A80000-0x00007FF854AB4000-memory.dmp

    Filesize

    208KB

  • memory/4052-40-0x00007FF84F620000-0x00007FF84F8D4000-memory.dmp

    Filesize

    2.7MB

  • memory/4052-41-0x00007FF856090000-0x00007FF8560A8000-memory.dmp

    Filesize

    96KB

  • memory/4052-44-0x00007FF8549B0000-0x00007FF8549C7000-memory.dmp

    Filesize

    92KB

  • memory/4052-45-0x00007FF854990000-0x00007FF8549A1000-memory.dmp

    Filesize

    68KB

  • memory/4052-46-0x00007FF854970000-0x00007FF85498D000-memory.dmp

    Filesize

    116KB

  • memory/4052-48-0x00007FF84F270000-0x00007FF84F470000-memory.dmp

    Filesize

    2.0MB

  • memory/4052-49-0x00007FF854910000-0x00007FF85494F000-memory.dmp

    Filesize

    252KB

  • memory/4052-55-0x00007FF852980000-0x00007FF85299B000-memory.dmp

    Filesize

    108KB

  • memory/4052-57-0x00007FF852940000-0x00007FF852958000-memory.dmp

    Filesize

    96KB

  • memory/4052-58-0x00007FF852910000-0x00007FF852940000-memory.dmp

    Filesize

    192KB

  • memory/4052-59-0x00007FF84FB30000-0x00007FF84FB97000-memory.dmp

    Filesize

    412KB

  • memory/4052-56-0x00007FF852960000-0x00007FF852971000-memory.dmp

    Filesize

    68KB

  • memory/4052-54-0x00007FF8529A0000-0x00007FF8529B1000-memory.dmp

    Filesize

    68KB

  • memory/4052-53-0x00007FF8529C0000-0x00007FF8529D1000-memory.dmp

    Filesize

    68KB

  • memory/4052-52-0x00007FF852C60000-0x00007FF852C71000-memory.dmp

    Filesize

    68KB

  • memory/4052-51-0x00007FF852F80000-0x00007FF852F98000-memory.dmp

    Filesize

    96KB

  • memory/4052-50-0x00007FF852FA0000-0x00007FF852FC1000-memory.dmp

    Filesize

    132KB

  • memory/4052-47-0x00007FF854950000-0x00007FF854961000-memory.dmp

    Filesize

    68KB

  • memory/4052-43-0x00007FF8549D0000-0x00007FF8549E1000-memory.dmp

    Filesize

    68KB

  • memory/4052-42-0x00007FF8549F0000-0x00007FF854A07000-memory.dmp

    Filesize

    92KB

  • memory/4052-60-0x00007FF83E070000-0x00007FF83F11B000-memory.dmp

    Filesize

    16.7MB

  • memory/4052-61-0x00007FF84FAC0000-0x00007FF84FB2F000-memory.dmp

    Filesize

    444KB

  • memory/4052-63-0x00007FF84F210000-0x00007FF84F266000-memory.dmp

    Filesize

    344KB

  • memory/4052-64-0x00007FF84F090000-0x00007FF84F208000-memory.dmp

    Filesize

    1.5MB

  • memory/4052-66-0x00007FF84EF20000-0x00007FF84F090000-memory.dmp

    Filesize

    1.4MB

  • memory/4052-65-0x00007FF8528D0000-0x00007FF8528E7000-memory.dmp

    Filesize

    92KB

  • memory/4052-70-0x00007FF84ED10000-0x00007FF84EE7B000-memory.dmp

    Filesize

    1.4MB

  • memory/4052-71-0x00007FF84ECB0000-0x00007FF84ED07000-memory.dmp

    Filesize

    348KB

  • memory/4052-69-0x00007FF84EE80000-0x00007FF84EECC000-memory.dmp

    Filesize

    304KB

  • memory/4052-72-0x00007FF84EA60000-0x00007FF84ECAB000-memory.dmp

    Filesize

    2.3MB

  • memory/4052-68-0x00007FF84EED0000-0x00007FF84EF12000-memory.dmp

    Filesize

    264KB

  • memory/4052-67-0x00007FF8528B0000-0x00007FF8528C2000-memory.dmp

    Filesize

    72KB

  • memory/4052-62-0x00007FF8528F0000-0x00007FF852901000-memory.dmp

    Filesize

    68KB

  • memory/4052-75-0x00007FF852820000-0x00007FF85284F000-memory.dmp

    Filesize

    188KB

  • memory/4052-77-0x00007FF84FA80000-0x00007FF84FA96000-memory.dmp

    Filesize

    88KB

  • memory/4052-80-0x00007FF84DD50000-0x00007FF84DDB2000-memory.dmp

    Filesize

    392KB

  • memory/4052-82-0x00007FF84EA40000-0x00007FF84EA53000-memory.dmp

    Filesize

    76KB

  • memory/4052-83-0x00007FF84EA20000-0x00007FF84EA34000-memory.dmp

    Filesize

    80KB

  • memory/4052-86-0x00007FF84E160000-0x00007FF84E190000-memory.dmp

    Filesize

    192KB

  • memory/4052-88-0x00007FF84D620000-0x00007FF84D83D000-memory.dmp

    Filesize

    2.1MB

  • memory/4052-87-0x00007FF84E140000-0x00007FF84E155000-memory.dmp

    Filesize

    84KB

  • memory/4052-89-0x00007FF84DFB0000-0x00007FF84DFC5000-memory.dmp

    Filesize

    84KB

  • memory/4052-92-0x00007FF842C90000-0x00007FF842D84000-memory.dmp

    Filesize

    976KB

  • memory/4052-93-0x00007FF84CDE0000-0x00007FF84CE0A000-memory.dmp

    Filesize

    168KB

  • memory/4052-94-0x00007FF84CDC0000-0x00007FF84CDD3000-memory.dmp

    Filesize

    76KB

  • memory/4052-95-0x00007FF84C820000-0x00007FF84C83B000-memory.dmp

    Filesize

    108KB

  • memory/4052-101-0x00007FF84A290000-0x00007FF84A2A5000-memory.dmp

    Filesize

    84KB

  • memory/4052-100-0x00007FF84A2B0000-0x00007FF84A2C2000-memory.dmp

    Filesize

    72KB

  • memory/4052-99-0x00007FF84A2D0000-0x00007FF84A2E4000-memory.dmp

    Filesize

    80KB

  • memory/4052-98-0x00007FF84C500000-0x00007FF84C513000-memory.dmp

    Filesize

    76KB

  • memory/4052-97-0x00007FF84C520000-0x00007FF84C535000-memory.dmp

    Filesize

    84KB

  • memory/4052-96-0x00007FF84C800000-0x00007FF84C812000-memory.dmp

    Filesize

    72KB

  • memory/4052-91-0x00007FF84CF00000-0x00007FF84CF13000-memory.dmp

    Filesize

    76KB

  • memory/4052-90-0x00007FF84DE80000-0x00007FF84DEA3000-memory.dmp

    Filesize

    140KB

  • memory/4052-85-0x00007FF84DC20000-0x00007FF84DCDD000-memory.dmp

    Filesize

    756KB

  • memory/4052-84-0x00007FF84E4E0000-0x00007FF84E530000-memory.dmp

    Filesize

    320KB

  • memory/4052-81-0x00007FF84DCE0000-0x00007FF84DD4D000-memory.dmp

    Filesize

    436KB

  • memory/4052-79-0x00007FF84DEB0000-0x00007FF84DF25000-memory.dmp

    Filesize

    468KB

  • memory/4052-76-0x00007FF84FAA0000-0x00007FF84FAB1000-memory.dmp

    Filesize

    68KB

  • memory/4052-74-0x00007FF854900000-0x00007FF854910000-memory.dmp

    Filesize

    64KB

  • memory/4052-78-0x00007FF84DFF0000-0x00007FF84E0B5000-memory.dmp

    Filesize

    788KB

  • memory/4052-73-0x00007FF83C8C0000-0x00007FF83E070000-memory.dmp

    Filesize

    23.7MB