Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 17:23
Behavioral task
behavioral1
Sample
2fb7fc0949aa14070e5e5d1ec37d48e7.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2fb7fc0949aa14070e5e5d1ec37d48e7.exe
Resource
win10v2004-20240226-en
General
-
Target
2fb7fc0949aa14070e5e5d1ec37d48e7.exe
-
Size
65KB
-
MD5
2fb7fc0949aa14070e5e5d1ec37d48e7
-
SHA1
9b0043790d9881f690e11086004d3218648d9c22
-
SHA256
246ab25a7240d684c1a6bf5abd6bcd6f13e0d86c97940883bc249e2b7cb23853
-
SHA512
13a475df0962a72f8c817511dbda22efb07c41167ebac229c7b0193a88c0f6bf383025e1327732b152d8a53ab4358d4b40d3c6f4b09cc3881165bda826e16f3b
-
SSDEEP
1536:FIkoUoN36tSQviFw1gnRuBnvbLfLteF3nLrB9z3nNaF9bIS9vM:FIkoUoN36tSQviFC08BnHfWl9zdaF9bw
Malware Config
Extracted
njrat
Platinum
HacKed
127.0.0.1:11964
Exspa.exe
-
reg_key
Exspa.exe
-
splitter
|Ghost|
Signatures
-
Deletes itself 1 IoCs
pid Process 528 cmd.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Exspa.exe Exspa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Exspa.exe Exspa.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Exspa.url Exspa.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 Exspa.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\Exspa.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Exspa.exe\" .." Exspa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Exspa.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Exspa.exe\" .." Exspa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 6.tcp.eu.ngrok.io 15 6.tcp.eu.ngrok.io 31 6.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe Token: 33 2988 Exspa.exe Token: SeIncBasePriorityPrivilege 2988 Exspa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2988 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe 28 PID 2980 wrote to memory of 2988 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe 28 PID 2980 wrote to memory of 2988 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe 28 PID 2980 wrote to memory of 2988 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe 28 PID 2980 wrote to memory of 528 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe 29 PID 2980 wrote to memory of 528 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe 29 PID 2980 wrote to memory of 528 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe 29 PID 2980 wrote to memory of 528 2980 2fb7fc0949aa14070e5e5d1ec37d48e7.exe 29 PID 528 wrote to memory of 1164 528 cmd.exe 31 PID 528 wrote to memory of 1164 528 cmd.exe 31 PID 528 wrote to memory of 1164 528 cmd.exe 31 PID 528 wrote to memory of 1164 528 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fb7fc0949aa14070e5e5d1ec37d48e7.exe"C:\Users\Admin\AppData\Local\Temp\2fb7fc0949aa14070e5e5d1ec37d48e7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Exspa.exe"C:\Users\Admin\AppData\Local\Temp\Exspa.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\2fb7fc0949aa14070e5e5d1ec37d48e7.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 53⤵PID:1164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD52fb7fc0949aa14070e5e5d1ec37d48e7
SHA19b0043790d9881f690e11086004d3218648d9c22
SHA256246ab25a7240d684c1a6bf5abd6bcd6f13e0d86c97940883bc249e2b7cb23853
SHA51213a475df0962a72f8c817511dbda22efb07c41167ebac229c7b0193a88c0f6bf383025e1327732b152d8a53ab4358d4b40d3c6f4b09cc3881165bda826e16f3b