Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 17:28
Behavioral task
behavioral1
Sample
23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe
Resource
win7-20240221-en
General
-
Target
23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe
-
Size
23KB
-
MD5
185798f33dbbe25c3fc48b808ce8460c
-
SHA1
80034d0bf3444eb14d2a3a1c45e393580c94213c
-
SHA256
23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9
-
SHA512
3351f5122fdb9442c73c175449975ffcc3b286e79331c0e4cdf35d814700745d5dba593842222f093ef5e1a129a5b2eca8c0594d4d1a9036519f9a3ed54ab619
-
SSDEEP
384:yc6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZ+a:lIU0tw3Rpcnue
Malware Config
Extracted
njrat
0.7d
max
lafiro8872-20597.portmap.host:20597
90784841b8a7d5d70cbd91c29f323ae6
-
reg_key
90784841b8a7d5d70cbd91c29f323ae6
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2640 netsh.exe -
Executes dropped EXE 1 IoCs
Processes:
IExperian.exepid process 840 IExperian.exe -
Loads dropped DLL 1 IoCs
Processes:
23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exepid process 1948 23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
IExperian.exedescription pid process Token: SeDebugPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe Token: 33 840 IExperian.exe Token: SeIncBasePriorityPrivilege 840 IExperian.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exeIExperian.exedescription pid process target process PID 1948 wrote to memory of 840 1948 23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe IExperian.exe PID 1948 wrote to memory of 840 1948 23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe IExperian.exe PID 1948 wrote to memory of 840 1948 23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe IExperian.exe PID 1948 wrote to memory of 840 1948 23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe IExperian.exe PID 840 wrote to memory of 2640 840 IExperian.exe netsh.exe PID 840 wrote to memory of 2640 840 IExperian.exe netsh.exe PID 840 wrote to memory of 2640 840 IExperian.exe netsh.exe PID 840 wrote to memory of 2640 840 IExperian.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe"C:\Users\Admin\AppData\Local\Temp\23910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IExperian.exe"C:\Users\Admin\AppData\Local\Temp\IExperian.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\IExperian.exe" "IExperian.exe" ENABLE3⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\IExperian.exeFilesize
23KB
MD5185798f33dbbe25c3fc48b808ce8460c
SHA180034d0bf3444eb14d2a3a1c45e393580c94213c
SHA25623910908180a95387a88c69fc0c39f677591cbb39e236c69270c16cde6b0e1f9
SHA5123351f5122fdb9442c73c175449975ffcc3b286e79331c0e4cdf35d814700745d5dba593842222f093ef5e1a129a5b2eca8c0594d4d1a9036519f9a3ed54ab619
-
memory/840-12-0x0000000000570000-0x00000000005B0000-memory.dmpFilesize
256KB
-
memory/840-11-0x0000000074710000-0x0000000074CBB000-memory.dmpFilesize
5.7MB
-
memory/840-13-0x0000000074710000-0x0000000074CBB000-memory.dmpFilesize
5.7MB
-
memory/1948-1-0x0000000074710000-0x0000000074CBB000-memory.dmpFilesize
5.7MB
-
memory/1948-2-0x0000000001D90000-0x0000000001DD0000-memory.dmpFilesize
256KB
-
memory/1948-0-0x0000000074710000-0x0000000074CBB000-memory.dmpFilesize
5.7MB
-
memory/1948-10-0x0000000074710000-0x0000000074CBB000-memory.dmpFilesize
5.7MB