Analysis

  • max time kernel
    94s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 11:41

General

  • Target

    cryptedfile.exe

  • Size

    418KB

  • MD5

    4826f9695be9d30cc7ab41e08ef55219

  • SHA1

    565e8c2e3933f6410b14e20c2f80e9f3436977f2

  • SHA256

    4c426b57772aa2d212791ab542196910baf6c66120d0353b5bb2bfb6a5214717

  • SHA512

    705d2b02b1aaac665a4420b0c78e8328ad738634c3f0390c05a0d919205eb995687ceb5b57b7a2d36c8c0ac76d10fa45563ec7c32dd2937a98c533181e4eedc7

  • SSDEEP

    12288:OREkD5DFr/cp9gxh/xiAa5HLL4UYUdcpc3RrC2HvGjyuXAu:OR1vUbXKyup

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cryptedfile.exe
    "C:\Users\Admin\AppData\Local\Temp\cryptedfile.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\WindowsServices.exe
      "C:\Windows\WindowsServices.exe"
      2⤵
      • Executes dropped EXE
      PID:1480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\WindowsServices.exe

    Filesize

    418KB

    MD5

    4826f9695be9d30cc7ab41e08ef55219

    SHA1

    565e8c2e3933f6410b14e20c2f80e9f3436977f2

    SHA256

    4c426b57772aa2d212791ab542196910baf6c66120d0353b5bb2bfb6a5214717

    SHA512

    705d2b02b1aaac665a4420b0c78e8328ad738634c3f0390c05a0d919205eb995687ceb5b57b7a2d36c8c0ac76d10fa45563ec7c32dd2937a98c533181e4eedc7

  • memory/1480-18-0x00007FF9749F0000-0x00007FF9754B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1480-19-0x00007FF9749F0000-0x00007FF9754B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3036-0-0x000001FA4DD00000-0x000001FA4DD62000-memory.dmp

    Filesize

    392KB

  • memory/3036-1-0x000001FA4E100000-0x000001FA4E110000-memory.dmp

    Filesize

    64KB

  • memory/3036-2-0x000001FA4E150000-0x000001FA4E15E000-memory.dmp

    Filesize

    56KB

  • memory/3036-3-0x00007FF9749F0000-0x00007FF9754B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3036-4-0x000001FA4E160000-0x000001FA4E170000-memory.dmp

    Filesize

    64KB

  • memory/3036-17-0x00007FF9749F0000-0x00007FF9754B1000-memory.dmp

    Filesize

    10.8MB