Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 04:01

General

  • Target

    c65ca4f6d2c653e18e0d795ba0cb0c89.exe

  • Size

    65KB

  • MD5

    c65ca4f6d2c653e18e0d795ba0cb0c89

  • SHA1

    543c228d35fb48b5b147aa47cab2b76ef9e6c19b

  • SHA256

    d094b3e64b1ac779565c1819f7f1b4041b5fa901e74f0cad9d3d376c506635d9

  • SHA512

    b3e5b167372f41210c15f9907f4cbfdbb62cdec5b3334449b2e7d178b57a10f21cb189461080f1298d6bc9f7468acfab84dde6402184a8d5600458c2ac1a16e3

  • SSDEEP

    1536:jU+u2LoN36tcQviFw1A+HIBnvbwfLteF3nLrB9z3nUaF9bkS9vM:jU+uIoN36tcQviFC9oBn8fWl9zkaF9bU

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

njRat

C2

127.0.0.1:21679

Mutex

HDAudio.exe

Attributes
  • reg_key

    HDAudio.exe

  • splitter

    |Ghost|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c65ca4f6d2c653e18e0d795ba0cb0c89.exe
    "C:\Users\Admin\AppData\Local\Temp\c65ca4f6d2c653e18e0d795ba0cb0c89.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\HDAudio.exe
      "C:\Windows\HDAudio.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /delete /tn "RealtekHDAudio" /f
        3⤵
          PID:2432
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "RealtekHDAudio" /tr C:\Windows\HDAudio.exe
          3⤵
          • Creates scheduled task(s)
          PID:2804
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /delete /tn "RealtekHDAudio" /f
          3⤵
            PID:1892
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /sc minute /mo 1 /tn "RealtekHDAudio" /tr C:\Windows\HDAudio.exe
            3⤵
            • Creates scheduled task(s)
            PID:1860
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /delete /tn "RealtekHDAudio" /f
            3⤵
              PID:2368
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "RealtekHDAudio" /tr C:\Windows\HDAudio.exe
              3⤵
              • Creates scheduled task(s)
              PID:1584
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /delete /tn "RealtekHDAudio" /f
              3⤵
                PID:3056
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /sc minute /mo 1 /tn "RealtekHDAudio" /tr C:\Windows\HDAudio.exe
                3⤵
                • Creates scheduled task(s)
                PID:2640
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /delete /tn "RealtekHDAudio" /f
                3⤵
                  PID:1592
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "RealtekHDAudio" /tr C:\Windows\HDAudio.exe
                  3⤵
                  • Creates scheduled task(s)
                  PID:1792
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /delete /tn "RealtekHDAudio" /f
                  3⤵
                    PID:2896
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "RealtekHDAudio" /tr C:\Windows\HDAudio.exe
                    3⤵
                    • Creates scheduled task(s)
                    PID:2848
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {3342A362-33A4-400D-974D-726DF85656A1} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2832
                • C:\Windows\HDAudio.exe
                  C:\Windows\HDAudio.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2800
                • C:\Windows\HDAudio.exe
                  C:\Windows\HDAudio.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2132

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Windows\HDAudio.exe

                Filesize

                65KB

                MD5

                c65ca4f6d2c653e18e0d795ba0cb0c89

                SHA1

                543c228d35fb48b5b147aa47cab2b76ef9e6c19b

                SHA256

                d094b3e64b1ac779565c1819f7f1b4041b5fa901e74f0cad9d3d376c506635d9

                SHA512

                b3e5b167372f41210c15f9907f4cbfdbb62cdec5b3334449b2e7d178b57a10f21cb189461080f1298d6bc9f7468acfab84dde6402184a8d5600458c2ac1a16e3

              • memory/1640-0-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/1640-2-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/1640-1-0x0000000000520000-0x0000000000560000-memory.dmp

                Filesize

                256KB

              • memory/1640-12-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/2132-22-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/2132-25-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/2132-24-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/2132-23-0x0000000000B70000-0x0000000000BB0000-memory.dmp

                Filesize

                256KB

              • memory/2524-9-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/2524-17-0x0000000000280000-0x00000000002C0000-memory.dmp

                Filesize

                256KB

              • memory/2524-16-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/2524-11-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/2524-10-0x0000000000280000-0x00000000002C0000-memory.dmp

                Filesize

                256KB

              • memory/2800-19-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB

              • memory/2800-20-0x00000000741A0000-0x000000007474B000-memory.dmp

                Filesize

                5.7MB