Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240508-en
General
-
Target
sample.exe
-
Size
137KB
-
MD5
22ae02a0257adbbf653910e99f3cf6cc
-
SHA1
1b610c0bca5caf1e5bdcd409949c269b7e51313d
-
SHA256
812464aa0dfc28db563abf6f12caba88f4c8998ad5813741b781c3ddbcba1eaf
-
SHA512
3c5abc665e103cc039edbc58ac3828d6a9cd44254616dd27bd4623e7aff6ba488440edb1732a521738ecfbd0918c1c1cdcf3c4169d1220f3f85a54db5aed4470
-
SSDEEP
3072:s59ZqNXGJoDAsdXMuhuz+bAd7j5+XpidGClihmQi:ccG2DAoIz3nFdBi
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
medallos.duckdns.org:2054
89a15ad405
-
reg_key
89a15ad405
-
splitter
@!#&^%$
Signatures
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/2392-4-0x0000000000410000-0x0000000000426000-memory.dmp rezer0 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sample.exedescription pid process target process PID 2392 set thread context of 1320 2392 sample.exe sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
sample.exedescription pid process Token: SeDebugPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe Token: 33 1320 sample.exe Token: SeIncBasePriorityPrivilege 1320 sample.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
sample.exedescription pid process target process PID 2392 wrote to memory of 2516 2392 sample.exe schtasks.exe PID 2392 wrote to memory of 2516 2392 sample.exe schtasks.exe PID 2392 wrote to memory of 2516 2392 sample.exe schtasks.exe PID 2392 wrote to memory of 2516 2392 sample.exe schtasks.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe PID 2392 wrote to memory of 1320 2392 sample.exe sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vRvlEEzoAS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp84A.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp84A.tmpFilesize
1KB
MD58e75d948b0d9f9e7dbedfafeae7d0699
SHA1e0f81dcb7840194baef6f0514e47769beefc87e1
SHA256f44dc667929a7ff54a775cf3c263eace862dd5bb1ff245867a5906ad03fac595
SHA512443c8ee7113781726143b4e68012b61550cde66a03008fc6e057e2841ee70005049def2f6aeb4867f51383028b01d31718c28285b43a3d3af113430ab05cfa74
-
memory/1320-13-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1320-9-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1320-21-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1320-23-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1320-19-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1320-15-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1320-11-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1320-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2392-2-0x00000000003E0000-0x00000000003F0000-memory.dmpFilesize
64KB
-
memory/2392-1-0x0000000000B60000-0x0000000000B88000-memory.dmpFilesize
160KB
-
memory/2392-5-0x0000000074E70000-0x000000007555E000-memory.dmpFilesize
6.9MB
-
memory/2392-0-0x0000000074E7E000-0x0000000074E7F000-memory.dmpFilesize
4KB
-
memory/2392-4-0x0000000000410000-0x0000000000426000-memory.dmpFilesize
88KB
-
memory/2392-3-0x0000000074E70000-0x000000007555E000-memory.dmpFilesize
6.9MB
-
memory/2392-24-0x0000000074E70000-0x000000007555E000-memory.dmpFilesize
6.9MB