Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 09:31

General

  • Target

    NjRat 0.7D Horror Edition.rar

  • Size

    18.9MB

  • MD5

    3722a5d14e004bb1e90d0e850366e1ec

  • SHA1

    a98916f7add8e783d6646d37680651ca4412220c

  • SHA256

    a36807ff99bde01f1d887e6f73d92b1c21a2049726a7d7555845e8f8639c05c1

  • SHA512

    7caac7e5a40f88f6757b8beae3c35b1db536008224f9bd15bb67f45521c95c35b3e400a2c828e70a8caaf0d3e90357f5c38ff535b439958bc9eee2d809549724

  • SSDEEP

    393216:Bo88DkvZ+wNiWtRReJJB4PWjoNkcZ/aeeV97uVrr0mf26YiPqDKT9:BoVDYiQRRet46UC2fnYEqs9

Malware Config

Extracted

Family

xworm

Version

5.0

C2

html-nl.gl.at.ply.gg:38534

Mutex

cyG6dP3JpX7QpOYW

Attributes
  • Install_directory

    %Temp%

  • install_file

    XWorm V5.2.exe

aes.plain

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

127.0.0.1:6522

Mutex

b6f83ebf0bce1d5c2e2e278edaabc64b

Attributes
  • reg_key

    b6f83ebf0bce1d5c2e2e278edaabc64b

  • splitter

    Y262SUCZ4UJJ

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Horror Edition.rar"
    1⤵
    • Modifies registry class
    PID:4392
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1612
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2860
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\NjRat 0.7D Horror Edition.rar"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2252
    • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\NjRat 0.7D Horror Edition.exe
      "C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\NjRat 0.7D Horror Edition.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Users\Admin\AppData\Roaming\XClient.exe
        "C:\Users\Admin\AppData\Roaming\XClient.exe"
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:844
      • C:\Users\Admin\AppData\Roaming\NjRat 0.7D Horror Edition.exe
        "C:\Users\Admin\AppData\Roaming\NjRat 0.7D Horror Edition.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          dw20.exe -x -s 1392
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3456
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4476
    • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\NjRat 0.7D Horror Edition.exe
      "C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\NjRat 0.7D Horror Edition.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:704
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe" /alignment=512 /QUIET "C:\Users\Admin\AppData\Local\Temp\stub.il" /output:"C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\Payload.exe"
        2⤵
          PID:4708
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x448 0x2f8
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4996
      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\Payload.exe
        "C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\Payload.exe"
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\Payload.exe
          "C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\Payload.exe"
          2⤵
          • Executes dropped EXE
          PID:1928
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im Payload.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:8

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\stub.il

        Filesize

        564KB

        MD5

        cf4ed74aefc5cfa43d433c8019d50cef

        SHA1

        43b3351e224f760c15af17c7ad92824d6e13577d

        SHA256

        b6a15e953be8ef5bc5c75e335aef0446f7ae2edfd3863420f73b6509c48807ea

        SHA512

        bfcb350644f34f7013705f509e9e78d48cab34d1b8be4d02f15d16aa208cca30227d377892342a00805b21bb5fc153d33ab11c8fa9e49175d098394b7ddf4195

      • C:\Users\Admin\AppData\Roaming\NjRat 0.7D Horror Edition.exe

        Filesize

        15.4MB

        MD5

        0b8196e6cdd002fa10bfd50843b6b172

        SHA1

        2808af92f2136c2dcf06c8bc06dfa3c994dede32

        SHA256

        0b96fadaed63004ab89c43e790100bf0ac03aae66a10239263ae64a9f01819a8

        SHA512

        69c4c2fd64d6886c11eb797a6829e315faffcc0095a884215753632e544727f655838fc34c2a8183179d8db2fdb63183fe0f3b69b9526d5c1fc857ba23b8ea69

      • C:\Users\Admin\AppData\Roaming\XClient.exe

        Filesize

        66KB

        MD5

        0ee1db9797bf41800cfc7c502a52d1ea

        SHA1

        412c0525c66b6a0ebfad4519d81e9b397747ddb5

        SHA256

        ae6416d4bfcf5d1bb5c9f4ec0851d9e6464369be50c459f12cfbd615ae59aad8

        SHA512

        f7c6ab86bb21b77fdad832e09f037f2e9245b920f2edbc40857567c36bbccd3863d8a5b66f3e3b4286284741ac1e93d25a06d0f264e2e0b2f6c28f9eb0e9b213

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\GeoIP.dat

        Filesize

        1.1MB

        MD5

        a0a228c187329ad148f33c81ddb430bb

        SHA1

        d70ec83d1b15b3156df73802dd1bec024b1b9346

        SHA256

        b4bfd1ebc50f0eaab3d3f4c2152feae7aa8efad380b85064153a6bfd006c6210

        SHA512

        0fe0a62c07f7ade0e6bfac8843c13c055369177935d801488a993bc4bcdb9da220ba1b37df2027dab8af7c15e5cf00b3e8f223b12165d8a1b0b9c30dc9939332

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\NjRat 0.7D Horror Edition.exe

        Filesize

        15.5MB

        MD5

        23f3ea9746e052a4ea7a08b955575730

        SHA1

        be368be9931d2bc6f21da8c0064435f9aaca08d9

        SHA256

        9822384adf44368d8f2a42db17f76ab19c9e5ebdbe35bf65e22b3fcf7362f774

        SHA512

        c80fc29163cd17512b9e14979eec50ea14223c0aa5081ba5f6b69e825d683c32d1e1c995d9b8c38bf5a96e441393aee47592af7856c251ae25c85d9ddae35861

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\Payload.exe

        Filesize

        53KB

        MD5

        56c8de31759951eb1a92846095d6de82

        SHA1

        ec2005e7a2af524b920756f080675b054e4b603f

        SHA256

        bcd362c3755b9ed31193b0d1b5794e191a08650ea9dadb9c9eebe17ec2d9e71a

        SHA512

        80747831c294dbf23b85bd827452720ade8fa9b0e5767c53ea3bef0fe358c09d13f0d0d08a86aaf12590e6d68017273b6c7661e9b08e9bb270e16abb629be00f

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\Stub\Stub.il

        Filesize

        564KB

        MD5

        b5cd586057a0907047b726f0cf69a407

        SHA1

        412241bbb62fea6003741e4f65467babe419cb1f

        SHA256

        9d6e1d086d4dadeacce4e00174ff7bc42509dde100326c13522d934a41bac97b

        SHA512

        db6fe4a27aa2a3647d768a65a9347ff164d2bb7147b01527b13173a6f442e92ea8a2619599f250278fab03cb081fd24a0dce998d61924dbc175242cb16408e8d

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\Stub\Stub.manifest

        Filesize

        487B

        MD5

        4d18ac38a92d15a64e2b80447b025b7e

        SHA1

        5c34374c2dd5afa92e0489f1d6f86dde616aca6c

        SHA256

        835a00d6e7c43db49ae7b3fa12559f23c2920b7530f4d3f960fd285b42b1efb5

        SHA512

        72be79acd72366b495e0f625a50c9bdf01047bcf5f9ee1e3bdba10dab7bd721b0126f429a91d8c80c2434e8bc751defdf4c05bdc09d26a871df1bb2e22e923bf

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\WinMM.Net.dll

        Filesize

        43KB

        MD5

        d4b80052c7b4093e10ce1f40ce74f707

        SHA1

        2494a38f1c0d3a0aa9b31cf0650337cacc655697

        SHA256

        59e2ac1b79840274bdfcef412a10058654e42f4285d732d1487e65e60ffbfb46

        SHA512

        3813b81f741ae3adb07ae370e817597ed2803680841ccc7549babb727910c7bff4f8450670d0ca19a0d09e06f133a1aaefecf5b5620e1b0bdb6bcd409982c450

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\plugin\cam.dll

        Filesize

        99KB

        MD5

        8ce3060686462fc72ece2701caa13e3b

        SHA1

        19fc9892200de4db332ddd0c14b4b6fd9a35ccd4

        SHA256

        881d5afb9aa4799c73e75dcd28587dba85dd844e4137287ea48c6b66525e2638

        SHA512

        ef38e00b054240a0d4747bfd79db860015ed027735c360de58af6889a69482109ccf74770608a2750542457ac38aa79367431ff6ca77fae44d7e3a7023f33a17

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\plugin\ch.dll

        Filesize

        44KB

        MD5

        11fde8a47647c3bc98d57f3a9f3a97a3

        SHA1

        e813c17973e77b7aa22b9f539c3c97c624acafb1

        SHA256

        7032cb496f866ec1c9304f2c3cd8859472168838a11aba1571f51875a75074af

        SHA512

        1401f40569db7679014ab282477a5560b3bc6f51284e501e0e878881522db102b448566bae50ab6c1027a196de410a9ac8770dfa2208d14e5dfcc3c05e766763

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\plugin\fun.dll

        Filesize

        8KB

        MD5

        ddce53e6a021aa8e146d9fce35e97e53

        SHA1

        7a4c69888e821e1d775c899ec5b3fdab267c7fbd

        SHA256

        57b66a81716e1737e5b8ecff2c269f00e2ca6ffbff88960e973c02f5800037cc

        SHA512

        a644892e51a5f09b35b3a89fee6031eeb92eb3ed5e5d05b8e06a96f0348305366f211ee959f94aaedb6f0c59608e49a1c2efb157f09cf520c43fe5455abfee15

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\plugin\mic.dll

        Filesize

        77KB

        MD5

        9b376f0d44995ca15d43f7943a602fb2

        SHA1

        18a2bb7d13836256bd5f39089203f18d740669d5

        SHA256

        27528a77e27d02aadecabfdf658b2da638bb0ca2f2c60bdd9d0fd5338c1fc346

        SHA512

        4dfb0c49816e0d0c2f7d0d76081725bd48d3713506ec51ac6c06ae7092908d14e3683d707d6f332505163fb0ade0ee6b50a355cd69c25725e829ebb23a3e93b2

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\plugin\plg.dll

        Filesize

        65KB

        MD5

        c179e212316f26ce9325a8d80d936666

        SHA1

        14d08b3cda60341d1e9187fc14bd64ebefe4a5b6

        SHA256

        13043521ed6876edf2736fc46a7c49e6b639cfa7a866ca11de26f119796cd521

        SHA512

        1b5eb687a9932c82ab2e655dbc5df8ba667a023e7568dbbd13c503a54661763193bde11937f87e2e09b88d770c8357eda07589d526e6103db058038e3ce3b750

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\plugin\pw.dll

        Filesize

        284KB

        MD5

        ac43720c43dcf90b2d57d746464ad574

        SHA1

        eae39df1c717ca74f6f04d5ca8478ea55145535a

        SHA256

        ca6367d1ab873a55ced13d7024c530bbe4a6a703813225233e59041c7ce14eaa

        SHA512

        9082b3cd8b36031256923c8f2bed628e9331129bbf09d111d9d02268a49e493248e5638ddee5b02da66e9159a608f8f26499ca0f736d6a369a30f71950c60d40

      • C:\Users\Admin\Desktop\NjRat 0.7D Horror Edition\plugin\sc2.dll

        Filesize

        46KB

        MD5

        2d65bc3bff4a5d31b59f5bdf6e6311d7

        SHA1

        43962fbeb93fc267fb1c7036a12b8c5d6f40c28a

        SHA256

        010b1ec566be774a2d12146f9826aa31fd7eb6ffe7b45ce5e572b2d8c7f815c3

        SHA512

        b210d447cc9b4b89402a2a1d3d5e9cfe13ae897c47094be4110ed3aac109152c8a45ec138f73b703e7d3799934234cba4ca3f2439b3dd193a4cec671b9edaa6a

      • memory/704-212-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-218-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-197-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-196-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-181-0x00007FF946400000-0x00007FF946DA1000-memory.dmp

        Filesize

        9.6MB

      • memory/704-183-0x00007FF946400000-0x00007FF946DA1000-memory.dmp

        Filesize

        9.6MB

      • memory/704-205-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-211-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-182-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-214-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-217-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-184-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-219-0x0000000001B80000-0x0000000001B90000-memory.dmp

        Filesize

        64KB

      • memory/704-203-0x00007FF946400000-0x00007FF946DA1000-memory.dmp

        Filesize

        9.6MB

      • memory/704-186-0x000000001DC70000-0x000000001DC82000-memory.dmp

        Filesize

        72KB

      • memory/844-126-0x0000000000CC0000-0x0000000000CD8000-memory.dmp

        Filesize

        96KB

      • memory/844-171-0x00007FF94CE00000-0x00007FF94D8C1000-memory.dmp

        Filesize

        10.8MB

      • memory/844-125-0x00007FF94CE00000-0x00007FF94D8C1000-memory.dmp

        Filesize

        10.8MB

      • memory/844-157-0x0000000002C80000-0x0000000002C90000-memory.dmp

        Filesize

        64KB

      • memory/844-195-0x0000000002C80000-0x0000000002C90000-memory.dmp

        Filesize

        64KB

      • memory/1308-149-0x00000000017A0000-0x00000000017B0000-memory.dmp

        Filesize

        64KB

      • memory/1308-156-0x00007FF946400000-0x00007FF946DA1000-memory.dmp

        Filesize

        9.6MB

      • memory/1308-172-0x00000000017A0000-0x00000000017B0000-memory.dmp

        Filesize

        64KB

      • memory/1308-147-0x000000001CFA0000-0x000000001CFEC000-memory.dmp

        Filesize

        304KB

      • memory/1308-148-0x00000000017A0000-0x00000000017B0000-memory.dmp

        Filesize

        64KB

      • memory/1308-150-0x00000000017A0000-0x00000000017B0000-memory.dmp

        Filesize

        64KB

      • memory/1308-179-0x00007FF946400000-0x00007FF946DA1000-memory.dmp

        Filesize

        9.6MB

      • memory/1308-140-0x000000001C130000-0x000000001C1D6000-memory.dmp

        Filesize

        664KB

      • memory/1308-141-0x00007FF946400000-0x00007FF946DA1000-memory.dmp

        Filesize

        9.6MB

      • memory/1308-142-0x00000000017A0000-0x00000000017B0000-memory.dmp

        Filesize

        64KB

      • memory/1308-143-0x00007FF946400000-0x00007FF946DA1000-memory.dmp

        Filesize

        9.6MB

      • memory/1308-144-0x000000001C6C0000-0x000000001CB8E000-memory.dmp

        Filesize

        4.8MB

      • memory/1308-145-0x000000001CCF0000-0x000000001CD8C000-memory.dmp

        Filesize

        624KB

      • memory/1308-146-0x000000001C1E0000-0x000000001C1E8000-memory.dmp

        Filesize

        32KB

      • memory/1308-151-0x00000000017A0000-0x00000000017B0000-memory.dmp

        Filesize

        64KB

      • memory/1928-222-0x0000000074DC0000-0x0000000075371000-memory.dmp

        Filesize

        5.7MB

      • memory/1928-223-0x0000000001470000-0x0000000001480000-memory.dmp

        Filesize

        64KB

      • memory/1928-224-0x0000000074DC0000-0x0000000075371000-memory.dmp

        Filesize

        5.7MB

      • memory/2708-215-0x0000000074DC0000-0x0000000075371000-memory.dmp

        Filesize

        5.7MB

      • memory/2708-216-0x0000000074DC0000-0x0000000075371000-memory.dmp

        Filesize

        5.7MB

      • memory/2708-225-0x0000000074DC0000-0x0000000075371000-memory.dmp

        Filesize

        5.7MB

      • memory/2708-220-0x0000000000D60000-0x0000000000D70000-memory.dmp

        Filesize

        64KB

      • memory/4288-112-0x0000000000D40000-0x0000000001CCC000-memory.dmp

        Filesize

        15.5MB

      • memory/4288-113-0x00007FF94CE00000-0x00007FF94D8C1000-memory.dmp

        Filesize

        10.8MB

      • memory/4288-139-0x00007FF94CE00000-0x00007FF94D8C1000-memory.dmp

        Filesize

        10.8MB

      • memory/4476-165-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-167-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-166-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-158-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-164-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-160-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-168-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-169-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-170-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB

      • memory/4476-159-0x000001C2F4F30000-0x000001C2F4F31000-memory.dmp

        Filesize

        4KB