Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 07:57

General

  • Target

    9379f1e58d0d7f133e27cbfdf4710590_NeikiAnalytics.exe

  • Size

    1.8MB

  • MD5

    9379f1e58d0d7f133e27cbfdf4710590

  • SHA1

    0c254261ea17e08d01e8e49bb3d4cdf45220b074

  • SHA256

    67f5a1d87e47110e64fcfcececb506d2ee6b8e6fb046b0661a1bf2a85d7f89d2

  • SHA512

    ed97bbaccc82abfb75cdaaa892c52547a381f3e27e52c8b236cab504e1d40f8abc82e2b8423472f492c4be87cbb40d39898250158f7777970f1d1ac10ad66d1c

  • SSDEEP

    12288:CxgVcc6Om524xhP5JJQPbtb3P1o0LlzyRRr5jdY/49eNs6PrZ9hDOILRwYG8etim:aO2K/a0hzy3cHoORwqetii6hsuiWY

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HACKED

C2

keuik2.ddns.net:1605

Mutex

5d34b6a4d3272cf71d9bb09e5bf002e2

Attributes
  • reg_key

    5d34b6a4d3272cf71d9bb09e5bf002e2

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9379f1e58d0d7f133e27cbfdf4710590_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9379f1e58d0d7f133e27cbfdf4710590_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Roaming\Encrypt.exe
      "C:\Users\Admin\AppData\Roaming\Encrypt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -windowstyle hidden (Start-Process -FilePath $env:Temp\explorer.exe)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Users\Admin\AppData\Local\Temp\explorer.exe
          "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Users\Admin\AppData\Roaming\explorer.exe
            "C:\Users\Admin\AppData\Roaming\explorer.exe"
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2956
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\explorer.exe" "explorer.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              PID:2448
    • C:\Users\Admin\AppData\Roaming\LoLAccountChecker.exe
      "C:\Users\Admin\AppData\Roaming\LoLAccountChecker.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2616 -s 640
        3⤵
          PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\explorer.exe

      Filesize

      23KB

      MD5

      81e1406ca01e0d1105191b8688dab29c

      SHA1

      8283103713a4eb9547fdf064e39666592f3ca996

      SHA256

      069bda4017024ec9a256b35368eea1adb78c5f8217539b1d53a5524d95ea149e

      SHA512

      3083ed940d87b752d215643d5de9662520e096cfea635db0e118cfe0abbb08eed97c5e29e4a786555ba4f824792fdfc7bc881fdc177f97a76b3b28ca7cff3f70

    • C:\Users\Admin\AppData\Roaming\Encrypt.exe

      Filesize

      80KB

      MD5

      692a64e9c0aec02722f6e522f567f4da

      SHA1

      c3e759a854ef38f4a94422d4f522878b1a7e447a

      SHA256

      574ffc835aaf913a40951304f5d9e034eab3774f9310fbcbaf59af65c9598249

      SHA512

      559a84026301f45771fed43057cc20f8765ad9d21b5d0904254eccb576ee9214e9adfbd0b1896cc84478db7b796831fe616f606a30f8273ea3bf9782ec19d719

    • \Users\Admin\AppData\Roaming\LoLAccountChecker.exe

      Filesize

      1.5MB

      MD5

      dfededea097d7689a15aec74f30c06d9

      SHA1

      95465cbe611634e1b9c8cf375a3c162ab581e987

      SHA256

      5bbca0556d6c3f8da0f92c2dad1a8d1f771c89cedaa1a90c3b8e54117c056188

      SHA512

      9a06d496973fd60a67eceeae0b679c82d8f4c65b163c58c4da51692c21720fa6978ccb06e68b1921cdf193cf7f466668947169ad0d88c7ff3001dbb1996b8833

    • memory/2216-19-0x0000000074671000-0x0000000074672000-memory.dmp

      Filesize

      4KB

    • memory/2216-21-0x0000000074670000-0x0000000074C1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2216-22-0x0000000074670000-0x0000000074C1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2216-24-0x0000000074670000-0x0000000074C1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2616-18-0x000007FEF5B73000-0x000007FEF5B74000-memory.dmp

      Filesize

      4KB

    • memory/2616-20-0x0000000000A60000-0x0000000000BF0000-memory.dmp

      Filesize

      1.6MB