Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 01:13
Behavioral task
behavioral1
Sample
3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe
Resource
win7-20240215-en
General
-
Target
3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe
-
Size
93KB
-
MD5
59bc430c7e94eda88ba59fc1fa3d2c0c
-
SHA1
7af6f4bd5d7c38ad87432785344f3016e873b151
-
SHA256
3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498
-
SHA512
578f3b0c79a83bf85ed945dd6ff8e3f6469ce40bfbf7058849f6901a64e12719c73a98fedb3d877ac9b8e7a4fb1aa72186431f7ad933c1e705d6298d33ff2b07
-
SSDEEP
768:8Y3Jwmm6h1ychQVHwUM7k+rhHX9/NhUQBi0yXxrjEtCdnl2pi1Rz4Rk39sGdpTgM:Nw76rCHwB4+r9ptcjEwzGi1dDtDTgS
Malware Config
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
7.tcp.eu.ngrok.io:10250
bd45e682ad8a06dcb9168f1be41d3129
-
reg_key
bd45e682ad8a06dcb9168f1be41d3129
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2208 netsh.exe -
Drops startup file 4 IoCs
Processes:
server.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe server.exe -
Executes dropped EXE 1 IoCs
Processes:
server.exepid process 2556 server.exe -
Loads dropped DLL 2 IoCs
Processes:
3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exepid process 2876 3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe 2876 3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
server.exedescription ioc process File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
server.exepid process 2556 server.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
server.exedescription pid process Token: SeDebugPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe Token: 33 2556 server.exe Token: SeIncBasePriorityPrivilege 2556 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exeserver.exedescription pid process target process PID 2876 wrote to memory of 2556 2876 3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe server.exe PID 2876 wrote to memory of 2556 2876 3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe server.exe PID 2876 wrote to memory of 2556 2876 3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe server.exe PID 2876 wrote to memory of 2556 2876 3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe server.exe PID 2556 wrote to memory of 2208 2556 server.exe netsh.exe PID 2556 wrote to memory of 2208 2556 server.exe netsh.exe PID 2556 wrote to memory of 2208 2556 server.exe netsh.exe PID 2556 wrote to memory of 2208 2556 server.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe"C:\Users\Admin\AppData\Local\Temp\3477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops autorun.inf file
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD57eb860abfe2281298575b5216ef42bc6
SHA1d4dfd7ac22dcd07da34306c40b4e5367a969cda5
SHA25683d46461bf45f00cb4fc5df9679b2bd82dbf54eeb022ca1711eefb4b2e7b7689
SHA512427bfc41f0514ee10d400eea38f22f6fac6f9d5ecd84ad7adb1161ff9355e47c04ff411e172fafcd23c137ad1528ed2f2cb95d247613ae5550c089633f18994d
-
Filesize
93KB
MD559bc430c7e94eda88ba59fc1fa3d2c0c
SHA17af6f4bd5d7c38ad87432785344f3016e873b151
SHA2563477c51b4db8004874eeb950fced5e89d636b4ad123595ca403f8fca5c430498
SHA512578f3b0c79a83bf85ed945dd6ff8e3f6469ce40bfbf7058849f6901a64e12719c73a98fedb3d877ac9b8e7a4fb1aa72186431f7ad933c1e705d6298d33ff2b07