Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 02:12

General

  • Target

    b5e1be77b9170945e5281f262cd2b9ab72043a4295b5606eb43eb8362f8cc34c.exe

  • Size

    876KB

  • MD5

    53d77338b57f7f73ede130799c828c78

  • SHA1

    fde1433b3e1d764c4418e028c37fd75be95f7908

  • SHA256

    b5e1be77b9170945e5281f262cd2b9ab72043a4295b5606eb43eb8362f8cc34c

  • SHA512

    f1c315c410581172dd6c52564f172c45203cde2c5e18f7287065fa4023f444b0399f23a1cb6d0ea1ffa861739ae0cdac6ee46b3500a1639298b5fa80b56970b3

  • SSDEEP

    24576:R4lavt0LkLL9IMixoEgeaoyXPwq9MmCS:gkwkn9IMHeaolaPCS

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5e1be77b9170945e5281f262cd2b9ab72043a4295b5606eb43eb8362f8cc34c.exe
    "C:\Users\Admin\AppData\Local\Temp\b5e1be77b9170945e5281f262cd2b9ab72043a4295b5606eb43eb8362f8cc34c.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\2610\2610.exe
      "C:\Users\Admin\AppData\Local\Temp\2610\2610.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:796
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2610\2610.exe
    Filesize

    23KB

    MD5

    4abf570a817c250b77a9b4fce234d4f0

    SHA1

    ab826fabada5c2893043c8ad2daa321032d85727

    SHA256

    665c9c1e0fc46f97e902ac8046d9719661dd4b2e0a685b5e041c9a66c584c1b1

    SHA512

    a507011626379501e3b876249c82be446298b394993a70d66cf03205607233781414170d1042e0faa6efb67971b07c4b9dd41ec30648e6f5e0eec0508a153425

  • memory/796-29-0x0000000073A00000-0x0000000073FB1000-memory.dmp
    Filesize

    5.7MB

  • memory/796-30-0x0000000073A00000-0x0000000073FB1000-memory.dmp
    Filesize

    5.7MB

  • memory/796-31-0x0000000073A00000-0x0000000073FB1000-memory.dmp
    Filesize

    5.7MB

  • memory/904-16-0x0000000073A02000-0x0000000073A03000-memory.dmp
    Filesize

    4KB

  • memory/904-17-0x0000000073A00000-0x0000000073FB1000-memory.dmp
    Filesize

    5.7MB

  • memory/904-18-0x0000000073A00000-0x0000000073FB1000-memory.dmp
    Filesize

    5.7MB

  • memory/904-28-0x0000000073A00000-0x0000000073FB1000-memory.dmp
    Filesize

    5.7MB