Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe
Resource
win10v2004-20240226-en
General
-
Target
31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe
-
Size
106KB
-
MD5
ed1ea689d80a7fab60271d8d24267a5b
-
SHA1
cbc58903e5ef9a21f32bd86c158039eead84c2e3
-
SHA256
31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2
-
SHA512
1ae6c5549c567994c14301f5808bb835084344574b604dbd6b8e0efc208a7b3b96da55030d9e2f406cabb8e0b486f46e87c670d36308006a0a5142e98f9134ec
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoe:w5eznsjsguGDFqGx8egoe
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2744 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
chargeable.exechargeable.exepid process 3056 chargeable.exe 2616 chargeable.exe -
Loads dropped DLL 2 IoCs
Processes:
31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exepid process 2240 31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe 2240 31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" 31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe" 31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
chargeable.exedescription pid process target process PID 3056 set thread context of 2616 3056 chargeable.exe chargeable.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
chargeable.exedescription pid process Token: SeDebugPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe Token: 33 2616 chargeable.exe Token: SeIncBasePriorityPrivilege 2616 chargeable.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exechargeable.exechargeable.exedescription pid process target process PID 2240 wrote to memory of 3056 2240 31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe chargeable.exe PID 2240 wrote to memory of 3056 2240 31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe chargeable.exe PID 2240 wrote to memory of 3056 2240 31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe chargeable.exe PID 2240 wrote to memory of 3056 2240 31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 3056 wrote to memory of 2616 3056 chargeable.exe chargeable.exe PID 2616 wrote to memory of 2744 2616 chargeable.exe netsh.exe PID 2616 wrote to memory of 2744 2616 chargeable.exe netsh.exe PID 2616 wrote to memory of 2744 2616 chargeable.exe netsh.exe PID 2616 wrote to memory of 2744 2616 chargeable.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe"C:\Users\Admin\AppData\Local\Temp\31f61628f0dbaf14ddacb7d271a91b281038d3c6120c7ee082cc00c30112f1d2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE4⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\confuse\chargeable.exeFilesize
106KB
MD5af15e82dcc3a8f173344dbcfeeca8c1a
SHA16187ffa0e9d0833819b535b7eb2bbdfc4c160c3d
SHA2567d6ba86b66f8af5317af5c22358421bfc7767968ee81a041457d860b6ff47516
SHA512141f8dc7eab9e51e1d6cbf7455a2bb508bff3a8a4e66a5c80a2b48b73bccb3bef1f0bd69c0c85f3e60cc50559127af07d02c5f4995e9ce4d0fb550d12104bc31
-
memory/2240-0-0x0000000074290000-0x000000007483B000-memory.dmpFilesize
5.7MB
-
memory/2240-1-0x0000000074290000-0x000000007483B000-memory.dmpFilesize
5.7MB
-
memory/2240-2-0x0000000000CB0000-0x0000000000CF0000-memory.dmpFilesize
256KB
-
memory/2240-15-0x0000000074290000-0x000000007483B000-memory.dmpFilesize
5.7MB
-
memory/2616-19-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2616-22-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2616-25-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2616-27-0x0000000000330000-0x0000000000370000-memory.dmpFilesize
256KB
-
memory/2616-26-0x0000000074290000-0x000000007483B000-memory.dmpFilesize
5.7MB
-
memory/2616-28-0x0000000074290000-0x000000007483B000-memory.dmpFilesize
5.7MB
-
memory/2616-29-0x0000000074290000-0x000000007483B000-memory.dmpFilesize
5.7MB
-
memory/2616-30-0x0000000000330000-0x0000000000370000-memory.dmpFilesize
256KB
-
memory/3056-17-0x0000000000420000-0x0000000000460000-memory.dmpFilesize
256KB
-
memory/3056-18-0x0000000000420000-0x0000000000460000-memory.dmpFilesize
256KB
-
memory/3056-16-0x0000000074290000-0x000000007483B000-memory.dmpFilesize
5.7MB
-
memory/3056-23-0x0000000074290000-0x000000007483B000-memory.dmpFilesize
5.7MB