Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe
Resource
win10v2004-20240426-en
General
-
Target
c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe
-
Size
114KB
-
MD5
051fbfff157042910851c479f8f54069
-
SHA1
035006543e908813d46f5ee95fb0f3c54af7e701
-
SHA256
c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f
-
SHA512
ac582d3c3b666323aa29f96aa3574a1ffa3d7bca140608fbf8b22150accac8bd504e9dda4940694fcc2351b3099aa0c57b969438e949df5ae8dad4f6b57dcf4a
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDwT:P5eznsjsguGDFqGZ2rDwT
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 5332 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe -
Executes dropped EXE 3 IoCs
Processes:
chargeable.exechargeable.exechargeable.exepid process 4960 chargeable.exe 2476 chargeable.exe 5616 chargeable.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe" c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
chargeable.exedescription pid process target process PID 4960 set thread context of 2476 4960 chargeable.exe chargeable.exe PID 4960 set thread context of 5616 4960 chargeable.exe chargeable.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1184 5616 WerFault.exe chargeable.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
chargeable.exedescription pid process Token: SeDebugPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe Token: 33 2476 chargeable.exe Token: SeIncBasePriorityPrivilege 2476 chargeable.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exechargeable.exechargeable.exedescription pid process target process PID 5348 wrote to memory of 4960 5348 c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe chargeable.exe PID 5348 wrote to memory of 4960 5348 c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe chargeable.exe PID 5348 wrote to memory of 4960 5348 c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe chargeable.exe PID 4960 wrote to memory of 5616 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 5616 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 5616 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 2476 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 2476 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 2476 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 2476 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 2476 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 2476 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 2476 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 2476 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 5616 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 5616 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 5616 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 5616 4960 chargeable.exe chargeable.exe PID 4960 wrote to memory of 5616 4960 chargeable.exe chargeable.exe PID 2476 wrote to memory of 5332 2476 chargeable.exe netsh.exe PID 2476 wrote to memory of 5332 2476 chargeable.exe netsh.exe PID 2476 wrote to memory of 5332 2476 chargeable.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe"C:\Users\Admin\AppData\Local\Temp\c9ab1615da4eb661e347aed48b91b4b1490322bc6a3a743cf87657df38150d1f.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
PID:5616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5616 -s 804⤵
- Program crash
PID:1184
-
-
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:5332
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5616 -ip 56161⤵PID:5796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5756f5bf36df9f76914de98bcee0fcdf6
SHA1b1f0710728277e5afdd891c61b5914033d2d27a5
SHA256e6f26ac49b1bc298e851afae2e1c265718b8f4edacd0e135869a501480bde9fd
SHA5121173610673371b0100647d9d6233f3e3e4f99f5e3647ecaafdae9eb8c81aceba2e1d79914f91a5c3358bb9fdd8ce7e18c710e2fa6da2948f47eaa138fbd2832a