Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe
Resource
win10v2004-20240508-en
General
-
Target
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe
-
Size
114KB
-
MD5
4be9986eb800ea45ff736671e9756ffe
-
SHA1
e30372bd80efe2da17d21e4026ab2a42b1572290
-
SHA256
5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6
-
SHA512
4fb83428ad5899f2134dad76fb4c098b5037d1c0e5d8924741fab9d75b003838b15756cd4016cdfd99da82ff6913d6d6efc7ae9f3beaa1995346ef0ef5d46d22
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMiat6QK:P5eznsjsguGDFqGZ2rih
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3088 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe -
Executes dropped EXE 4 IoCs
pid Process 2136 chargeable.exe 2196 chargeable.exe 1904 chargeable.exe 4424 chargeable.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" 5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe" 5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2136 set thread context of 2196 2136 chargeable.exe 107 PID 2136 set thread context of 1904 2136 chargeable.exe 106 PID 2136 set thread context of 4424 2136 chargeable.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3096 4424 WerFault.exe 105 548 1904 WerFault.exe 106 -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe Token: 33 2196 chargeable.exe Token: SeIncBasePriorityPrivilege 2196 chargeable.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3424 wrote to memory of 2136 3424 5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe 102 PID 3424 wrote to memory of 2136 3424 5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe 102 PID 3424 wrote to memory of 2136 3424 5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe 102 PID 2136 wrote to memory of 4424 2136 chargeable.exe 105 PID 2136 wrote to memory of 4424 2136 chargeable.exe 105 PID 2136 wrote to memory of 4424 2136 chargeable.exe 105 PID 2136 wrote to memory of 1904 2136 chargeable.exe 106 PID 2136 wrote to memory of 1904 2136 chargeable.exe 106 PID 2136 wrote to memory of 1904 2136 chargeable.exe 106 PID 2136 wrote to memory of 2196 2136 chargeable.exe 107 PID 2136 wrote to memory of 2196 2136 chargeable.exe 107 PID 2136 wrote to memory of 2196 2136 chargeable.exe 107 PID 2136 wrote to memory of 2196 2136 chargeable.exe 107 PID 2136 wrote to memory of 2196 2136 chargeable.exe 107 PID 2136 wrote to memory of 2196 2136 chargeable.exe 107 PID 2136 wrote to memory of 2196 2136 chargeable.exe 107 PID 2136 wrote to memory of 2196 2136 chargeable.exe 107 PID 2136 wrote to memory of 1904 2136 chargeable.exe 106 PID 2136 wrote to memory of 1904 2136 chargeable.exe 106 PID 2136 wrote to memory of 1904 2136 chargeable.exe 106 PID 2136 wrote to memory of 1904 2136 chargeable.exe 106 PID 2136 wrote to memory of 1904 2136 chargeable.exe 106 PID 2136 wrote to memory of 4424 2136 chargeable.exe 105 PID 2136 wrote to memory of 4424 2136 chargeable.exe 105 PID 2136 wrote to memory of 4424 2136 chargeable.exe 105 PID 2136 wrote to memory of 4424 2136 chargeable.exe 105 PID 2136 wrote to memory of 4424 2136 chargeable.exe 105 PID 2196 wrote to memory of 3088 2196 chargeable.exe 113 PID 2196 wrote to memory of 3088 2196 chargeable.exe 113 PID 2196 wrote to memory of 3088 2196 chargeable.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe"C:\Users\Admin\AppData\Local\Temp\5e0316581c455ebfae4775fe8b37bca0e7e451839553916920f20b3a7269e9c6.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 804⤵
- Program crash
PID:3096
-
-
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 804⤵
- Program crash
PID:548
-
-
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:3088
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4328,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:81⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4424 -ip 44241⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1904 -ip 19041⤵PID:2976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD55a8ff2b04ff3b2216152cac919377c84
SHA1ee4574d3fc8e2e63186052828a2cd364515dd81f
SHA2564d1d2569377e4dce9a40d6df7b01edffccef1b0c4767f1799634a80737762eaf
SHA512cd394858766510f9e18e6b27b7309a3d3a92e078c95e16b034712baa242bcbf180bc04a0070facaf430b36c07862afee0aeb96e8855f73676e556be7e6501f83