Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240508-en
General
-
Target
sample.exe
-
Size
137KB
-
MD5
22ae02a0257adbbf653910e99f3cf6cc
-
SHA1
1b610c0bca5caf1e5bdcd409949c269b7e51313d
-
SHA256
812464aa0dfc28db563abf6f12caba88f4c8998ad5813741b781c3ddbcba1eaf
-
SHA512
3c5abc665e103cc039edbc58ac3828d6a9cd44254616dd27bd4623e7aff6ba488440edb1732a521738ecfbd0918c1c1cdcf3c4169d1220f3f85a54db5aed4470
-
SSDEEP
3072:s59ZqNXGJoDAsdXMuhuz+bAd7j5+XpidGClihmQi:ccG2DAoIz3nFdBi
Malware Config
Extracted
njrat
0.7NC
NYAN CAT
medallos.duckdns.org:2054
89a15ad405
-
reg_key
89a15ad405
-
splitter
@!#&^%$
Signatures
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral2/memory/2388-7-0x0000000005330000-0x0000000005346000-memory.dmp rezer0 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
sample.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation sample.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sample.exedescription pid process target process PID 2388 set thread context of 1468 2388 sample.exe sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
sample.exedescription pid process Token: SeDebugPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe Token: 33 1468 sample.exe Token: SeIncBasePriorityPrivilege 1468 sample.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
sample.exedescription pid process target process PID 2388 wrote to memory of 428 2388 sample.exe schtasks.exe PID 2388 wrote to memory of 428 2388 sample.exe schtasks.exe PID 2388 wrote to memory of 428 2388 sample.exe schtasks.exe PID 2388 wrote to memory of 1468 2388 sample.exe sample.exe PID 2388 wrote to memory of 1468 2388 sample.exe sample.exe PID 2388 wrote to memory of 1468 2388 sample.exe sample.exe PID 2388 wrote to memory of 1468 2388 sample.exe sample.exe PID 2388 wrote to memory of 1468 2388 sample.exe sample.exe PID 2388 wrote to memory of 1468 2388 sample.exe sample.exe PID 2388 wrote to memory of 1468 2388 sample.exe sample.exe PID 2388 wrote to memory of 1468 2388 sample.exe sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vRvlEEzoAS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2834.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\sample.exe.logFilesize
507B
MD5ab4c71d3ff6255edd4e5c1e09540f49e
SHA122e06bf4e258741b5df918061871cba998c50cea
SHA2561690fec628f775dd3c3385b800eed126b37978ef2ffd592b024052724caafb5a
SHA5128fa7d0045796e6cda7c28e2b9a690ef550619828c1b5d0ebf8e8367aff4bf4d9f63121e5b4f199d30cb8006eb584c6767f4c59150749b8256dab9dd0ebd9f1af
-
C:\Users\Admin\AppData\Local\Temp\tmp2834.tmpFilesize
1KB
MD5e515bab079294cc82cf3833257b712c0
SHA107e967c45172b65dad55bcfe3cddcddc0d908375
SHA2568dbb50fc0d12f90be711c945f4439d3f856d17628785ae975d54ceebecfc9935
SHA51220af559fe36dca0b31db8f72d0833795fa10ddca247618cb358f6c2e52a76e7a18bdbbbdbc051fd23ccd117e840af9819543e5cfe23e906bd2e25913c6e04d55
-
memory/1468-18-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/1468-13-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1468-22-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/1468-21-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/1468-20-0x0000000005200000-0x0000000005266000-memory.dmpFilesize
408KB
-
memory/1468-19-0x0000000004FA0000-0x0000000004FAA000-memory.dmpFilesize
40KB
-
memory/1468-17-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/2388-7-0x0000000005330000-0x0000000005346000-memory.dmpFilesize
88KB
-
memory/2388-2-0x00000000051B0000-0x000000000524C000-memory.dmpFilesize
624KB
-
memory/2388-9-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/2388-1-0x00000000007F0000-0x0000000000818000-memory.dmpFilesize
160KB
-
memory/2388-16-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/2388-8-0x0000000005CB0000-0x0000000006254000-memory.dmpFilesize
5.6MB
-
memory/2388-0-0x0000000074FAE000-0x0000000074FAF000-memory.dmpFilesize
4KB
-
memory/2388-3-0x0000000002B30000-0x0000000002B40000-memory.dmpFilesize
64KB
-
memory/2388-6-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/2388-5-0x0000000074FAE000-0x0000000074FAF000-memory.dmpFilesize
4KB
-
memory/2388-4-0x0000000005360000-0x00000000053F2000-memory.dmpFilesize
584KB