Analysis

  • max time kernel
    100s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 13:57

General

  • Target

    NeverLoseByOxy.exe

  • Size

    667KB

  • MD5

    25a325fd2dbf83e97572593fe0529743

  • SHA1

    dff4df26a8a35e8bd606fab10940ec87ab6f4829

  • SHA256

    8db43b34a8067f3546ccebbbd40befbec842f3c03efed5057f90d60ef4f31cbc

  • SHA512

    4d1a757b7de770bd7ce5c735acfdf1abdf1a4835c99a57d72d75f424872b5e66e11d3b795d2fe44aaf391f24a28cc991e18b2f6fe538c94e6308be1813078b24

  • SSDEEP

    12288:/BdlwHRn+WlYV+rnxh1HTT78E/GYidhRto:/BkVdlYADRHL8E/GYyo

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Oxy green

C2

147.185.221.18:34879

147.185.221.18:35996

147.185.221.16:57808

Mutex

ca660fdb1372d3ef85f3f6ebae4aef22

Attributes
  • reg_key

    ca660fdb1372d3ef85f3f6ebae4aef22

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 28 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NeverLoseByOxy.exe
    "C:\Users\Admin\AppData\Local\Temp\NeverLoseByOxy.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Netfraemwork.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Netfraemwork.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Users\Admin\AppData\Roaming\Net Updater.exe
        "C:\Users\Admin\AppData\Roaming\Net Updater.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\CFC.tmp\antivirus disabler.bat""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2856
          • C:\Windows\SysWOW64\net.exe
            net stop ΓÇ£Security CenterΓÇ¥
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop ΓÇ£Security CenterΓÇ¥
              6⤵
                PID:1776
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall set opmode mode=disable
              5⤵
              • Modifies Windows Firewall
              PID:1788
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\smss.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\smss.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:2100
          • C:\Windows\smss.exe
            "C:\Windows\smss.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2704
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\smss.exe" "smss.exe" ENABLE
              5⤵
              • Modifies Windows Firewall
              PID:1312
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ntoskrnl.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\ntoskrnl.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Users\Admin\AppData\Local\Temp\ntoskrnl.exe
          "C:\Users\Admin\AppData\Local\Temp\ntoskrnl.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:2168
          • C:\Windows\ntoskrnl.exe
            "C:\Windows\ntoskrnl.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2120
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\ntoskrnl.exe" "ntoskrnl.exe" ENABLE
              5⤵
              • Modifies Windows Firewall
              PID:2948
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dwm.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\dwm.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:312
        • C:\Users\Admin\AppData\Local\Temp\dwm.exe
          "C:\Users\Admin\AppData\Local\Temp\dwm.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:932
          • C:\Windows\dwm.exe
            "C:\Windows\dwm.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2596
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\dwm.exe" "dwm.exe" ENABLE
              5⤵
              • Modifies Windows Firewall
              PID:1896

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\CFC.tmp\antivirus disabler.bat

            Filesize

            2KB

            MD5

            5ef1d6257ee69f8743b4035e713231a6

            SHA1

            6e516c82bd78d015fda2ccb92b91bec0eba52907

            SHA256

            7fcfeb47a9a3abb05bf6e617c1e4adb97519b7e2c09159579cd5413227f1075b

            SHA512

            47d93f98165bb1d219a78ea472448a3a0f14f6796c0de9370d5975f3b008c869fd0a86eef33a492e63234204fe6ff44a2c88d46db2c3d6fada889461758e4017

          • C:\Users\Admin\AppData\Local\Temp\ntoskrnl.exe

            Filesize

            37KB

            MD5

            60c0f939494821c0c86e4483330b343c

            SHA1

            8d5c9dd4ce62d45a164113836d097fc4d0fd5dd9

            SHA256

            bcc7b4fea8cfa7c987e7f3599bbcb9465dc92c9f05aef37655c44fd12a74b4af

            SHA512

            92d906bd32c88b42e80f82ae553bb8c123a154c3a104f1057318db60e727a292ee9f476b1cdf7b6e0e7c2d051eee10eb4e653df63981ca2ed19456e22cc3417a

          • \Users\Admin\AppData\Local\Temp\RarSFX0\Netfraemwork.exe

            Filesize

            37KB

            MD5

            f15bc9c5e9aa4c05aaeccf372dea34b3

            SHA1

            e1ab2d0e3b50ab699d601324004ce7c00073ed98

            SHA256

            cd1135b1d643b1853b0f256ae512c30178bfe9af8b718f7d6c6387fc97173f70

            SHA512

            fdcee460a23c6e520c80d5abbeb8c64b1f356627b0975e3d53770d7c75a52771f1c6a528f137b0bd996c7a193408b3cb893beabe4c62b8c83930f5981ec8fdd4

          • \Users\Admin\AppData\Local\Temp\RarSFX0\dwm.exe

            Filesize

            30KB

            MD5

            057bfaf0eb7e78de0155c25243082671

            SHA1

            9974b587117052deb63377b79c0ba218c692a0e6

            SHA256

            3341eb30f8fd5b6080f0a4f7894779b5e2039d01d0b121d1109c048fe4b6a3dc

            SHA512

            e0eac61684cd6bce58e2381f2db4badfd02a2225c25c5e943c8cbef45367a34153b111c16d87c03e4ad3aa213786ebe056782004aad05c48153cac5fcc0be1cd

          • \Users\Admin\AppData\Local\Temp\RarSFX0\ntoskrnl.exe

            Filesize

            29KB

            MD5

            e23b781f6c825fced66982044fe4727e

            SHA1

            6549ea9cdb521f7499ab310e056968ad6d699db9

            SHA256

            1350ebd53d624dcb8debf71125e54872dc2960b4185bcfff31945f3e38e3a7d2

            SHA512

            7cd48001c59e10ac2c5e11bbe52e93d4085e0674d0be5a1a2da230171f7bba5384eafdd37834794821578c04952203745edfd3975ab99811be33686572d26b07

          • \Users\Admin\AppData\Local\Temp\RarSFX0\smss.exe

            Filesize

            30KB

            MD5

            1d5b45d03762e2b8fee4920032bd4914

            SHA1

            52acc078b9cdcb54f3d19e446fe289e8de120459

            SHA256

            190f38141a742b30da3ad80687306fd8d9aae38db255466e2f10c7bc771b0024

            SHA512

            37106cc847ed54a220770aa8ed62d94fdfae6c7a2cbcb02fe8800c3376cd9cd950e4b27d53cfc7fe9eb2a487a8345949f491456ca7762a3995a041c4c8237db5

          • \Users\Admin\AppData\Local\Temp\dwm.exe

            Filesize

            37KB

            MD5

            5a05a9c792aa0efd0f1ded5bd64e55c9

            SHA1

            ec0effe3de6c9063f51bc1c80555ae1fbdd9f60a

            SHA256

            f44d812f7c488aff30371cd699bd6eb5c37a10e57be14f5aa1dcbb89019d8ba4

            SHA512

            f69b427c55650c4c825d41137da7f586951a2a1126354b68c339aa00bee9bda069390fd4af6707338d185c4db33f91fb10ea8c0b6a5925dfd34584e1e6cadc99

          • \Users\Admin\AppData\Local\Temp\smss.exe

            Filesize

            37KB

            MD5

            56cdc655a23c09aa55b89078cac0c34a

            SHA1

            bc06398a3bccb5c81ad2a70f85add98811059c90

            SHA256

            98925006f9aa3976d1e11489d1d7470ff360c995caa2822dfb30daf9a4b0b81f

            SHA512

            4f4faf6ec2ee345c9c1018bf4525378ca5aa8eaacce6c01d519f9fb75298ee10f2b5e4fed8607472bb130e074dd8726d690ad3abf18c360db4452ec16b4242a0

          • \Users\Admin\AppData\Roaming\Net Updater.exe

            Filesize

            40KB

            MD5

            d3cd49a5c4b68c4d613057b40e333581

            SHA1

            abe52d3f85838cd2cc72255f793651c9a2727331

            SHA256

            bde15c23cded3e6bf984bf76a05e7ffb40661fec7396aab6c0f8112ee286e1a2

            SHA512

            fba61a32370b40b242d67ebd8de31828c063fb2b7467b00a7d5d9d43a41e00cf654465db1083172c2a504c44f6c905478c883b16f01e86e9943af32e655689e5

          • memory/312-121-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/932-156-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/932-131-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/1376-89-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/1376-97-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/2100-155-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2100-124-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2100-132-0x00000000020C0000-0x0000000002100000-memory.dmp

            Filesize

            256KB

          • memory/2100-129-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2120-157-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2120-158-0x0000000001F90000-0x0000000001FD0000-memory.dmp

            Filesize

            256KB

          • memory/2120-165-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2120-166-0x0000000001F90000-0x0000000001FD0000-memory.dmp

            Filesize

            256KB

          • memory/2168-130-0x0000000001F30000-0x0000000001F70000-memory.dmp

            Filesize

            256KB

          • memory/2168-153-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2168-128-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2500-63-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/2596-168-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2596-167-0x0000000000440000-0x0000000000480000-memory.dmp

            Filesize

            256KB

          • memory/2596-170-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2596-159-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-154-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-152-0x0000000000220000-0x0000000000260000-memory.dmp

            Filesize

            256KB

          • memory/2704-169-0x0000000000220000-0x0000000000260000-memory.dmp

            Filesize

            256KB

          • memory/2704-163-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-164-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2704-151-0x00000000733A0000-0x000000007394B000-memory.dmp

            Filesize

            5.7MB

          • memory/2876-54-0x00000000023F0000-0x000000000240B000-memory.dmp

            Filesize

            108KB

          • memory/2876-55-0x00000000023F0000-0x000000000240B000-memory.dmp

            Filesize

            108KB

          • memory/2876-84-0x00000000023F0000-0x000000000240A000-memory.dmp

            Filesize

            104KB

          • memory/2876-85-0x00000000023F0000-0x000000000240A000-memory.dmp

            Filesize

            104KB

          • memory/2876-86-0x00000000023F0000-0x000000000240A000-memory.dmp

            Filesize

            104KB