Analysis

  • max time kernel
    157s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 22:04

General

  • Target

    NinjaCS_v1.3.exe

  • Size

    3.5MB

  • MD5

    dcc565d6f70566ee2f78f7dff6131fdf

  • SHA1

    08dc0ad8713fac148cbf65d8ab7125ace4690252

  • SHA256

    06dc0a4a2e8a4c02c72be5872f0df88dc3f830619a470c2ede90eef86afae5d2

  • SHA512

    0983fc136a995ac9bdc3ca43477a45f10a817d53e91152a82214a8e4394a1a1edb737df7b66ce79104fba3b9bfbb7a9d90eac3e6e9be8626690fa3c7ce0aa8c3

  • SSDEEP

    98304:Fcb+6Lsjo5fE4I1o712g2WjHYHrPdFnOLUambXnAzWpcZqrg:FcRL15EwUglj4rbO0XnXcV

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NinjaCS_v1.3.exe
    "C:\Users\Admin\AppData\Local\Temp\NinjaCS_v1.3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\NinjaCS.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\NinjaCS.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HandyControl.dll

    Filesize

    1024KB

    MD5

    cafd56d57c9cbe7c0d207b5e3197c1e6

    SHA1

    ffd534d6e80c8f7c099e2b301dd67ff1ffd0b8d7

    SHA256

    a9c9f398ae3c02653bfcac22678366889c7c7cf25625c7389f6c9a4b8cb332aa

    SHA512

    d497fb537cebd61f91f8c6e11114dc6fd068d80bb8d8ea531ec481afcc7955a6d97720817d9c6a413f502d6b0c8ee0cddbf9b55e3070e413e42cbc1299eec75b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\NinjaCS.exe

    Filesize

    2.4MB

    MD5

    4ba686b396ead7bebf25909b5d633dcf

    SHA1

    6757a9c40b0c37b160d38828a325c0c968a8d209

    SHA256

    829fa5f5338d20eb6677b4bd579f0d7a90179d37792506bc5b79a14322312cc0

    SHA512

    c33019c25ca10871437955a2e7c29b0e431c098ab537a2df1a9cebd3ea806d86775968188c7b0338cfefef949c264cf7e47b30deb4ca73cc17cd62630daa0b0a

  • memory/1788-33-0x000002534A510000-0x000002534A5CA000-memory.dmp

    Filesize

    744KB

  • memory/1788-30-0x000002534A600000-0x000002534A610000-memory.dmp

    Filesize

    64KB

  • memory/1788-29-0x00007FFE7D590000-0x00007FFE7E051000-memory.dmp

    Filesize

    10.8MB

  • memory/1788-32-0x000002534A7D0000-0x000002534A990000-memory.dmp

    Filesize

    1.8MB

  • memory/1788-28-0x000002532EDF0000-0x000002532F058000-memory.dmp

    Filesize

    2.4MB

  • memory/1788-34-0x000002534A600000-0x000002534A610000-memory.dmp

    Filesize

    64KB

  • memory/1788-35-0x000002534A720000-0x000002534A728000-memory.dmp

    Filesize

    32KB

  • memory/1788-36-0x000002534A600000-0x000002534A610000-memory.dmp

    Filesize

    64KB

  • memory/1788-37-0x000002534AB00000-0x000002534AB38000-memory.dmp

    Filesize

    224KB

  • memory/1788-38-0x000002534A7C0000-0x000002534A7CE000-memory.dmp

    Filesize

    56KB

  • memory/1788-40-0x00007FFE7D590000-0x00007FFE7E051000-memory.dmp

    Filesize

    10.8MB

  • memory/1788-41-0x000002534A600000-0x000002534A610000-memory.dmp

    Filesize

    64KB

  • memory/1788-42-0x000002534A600000-0x000002534A610000-memory.dmp

    Filesize

    64KB