Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 11:41

General

  • Target

    cryptedfile.exe

  • Size

    418KB

  • MD5

    4826f9695be9d30cc7ab41e08ef55219

  • SHA1

    565e8c2e3933f6410b14e20c2f80e9f3436977f2

  • SHA256

    4c426b57772aa2d212791ab542196910baf6c66120d0353b5bb2bfb6a5214717

  • SHA512

    705d2b02b1aaac665a4420b0c78e8328ad738634c3f0390c05a0d919205eb995687ceb5b57b7a2d36c8c0ac76d10fa45563ec7c32dd2937a98c533181e4eedc7

  • SSDEEP

    12288:OREkD5DFr/cp9gxh/xiAa5HLL4UYUdcpc3RrC2HvGjyuXAu:OR1vUbXKyup

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cryptedfile.exe
    "C:\Users\Admin\AppData\Local\Temp\cryptedfile.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\WindowsServices.exe
      "C:\Windows\WindowsServices.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1984 -s 524
        3⤵
          PID:2648

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\WindowsServices.exe

            Filesize

            418KB

            MD5

            4826f9695be9d30cc7ab41e08ef55219

            SHA1

            565e8c2e3933f6410b14e20c2f80e9f3436977f2

            SHA256

            4c426b57772aa2d212791ab542196910baf6c66120d0353b5bb2bfb6a5214717

            SHA512

            705d2b02b1aaac665a4420b0c78e8328ad738634c3f0390c05a0d919205eb995687ceb5b57b7a2d36c8c0ac76d10fa45563ec7c32dd2937a98c533181e4eedc7

          • memory/1984-10-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

            Filesize

            9.9MB

          • memory/1984-11-0x0000000001270000-0x00000000012D2000-memory.dmp

            Filesize

            392KB

          • memory/1984-13-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

            Filesize

            9.9MB

          • memory/2204-0-0x0000000000B40000-0x0000000000BA2000-memory.dmp

            Filesize

            392KB

          • memory/2204-1-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

            Filesize

            9.9MB

          • memory/2204-2-0x00000000003D0000-0x00000000003E0000-memory.dmp

            Filesize

            64KB

          • memory/2204-3-0x000000001B260000-0x000000001B2E0000-memory.dmp

            Filesize

            512KB

          • memory/2204-4-0x0000000000410000-0x000000000041E000-memory.dmp

            Filesize

            56KB

          • memory/2204-12-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

            Filesize

            9.9MB