Analysis

  • max time kernel
    9s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2024, 20:40

General

  • Target

    3cf7a73ff94fa6896f0818d26e5d7e9d68546e0f984b6280c441d8a39412489d.exe

  • Size

    115KB

  • MD5

    66fc20e0656c22a485daaf9db6f44a2c

  • SHA1

    af07a7a9e73d8643a51d8677742f2ea1c1ab1279

  • SHA256

    3cf7a73ff94fa6896f0818d26e5d7e9d68546e0f984b6280c441d8a39412489d

  • SHA512

    96ce7a2e3609ea766aa4ee9567f731a772c03239c5b156e34b67ab332dc839135b80dc58a4519466b575fe5e0d3f63198c4ac04ef8b965b94356e569fad19720

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL9:P5eznsjsguGDFqGZ2rDL9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cf7a73ff94fa6896f0818d26e5d7e9d68546e0f984b6280c441d8a39412489d.exe
    "C:\Users\Admin\AppData\Local\Temp\3cf7a73ff94fa6896f0818d26e5d7e9d68546e0f984b6280c441d8a39412489d.exe"
    1⤵
    • Adds Run key to start application
    PID:2168
    • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
      "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"
      2⤵
        PID:964
        • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
          C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
          3⤵
            PID:4664
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
              4⤵
              • Modifies Windows Firewall
              PID:1240

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

        Filesize

        116KB

        MD5

        624409b723faca850d71d6f32b395924

        SHA1

        4b3e092e169c73102c4dfba48e377a474a01c467

        SHA256

        43bd9d741fc95f1bb5e3c4462e2b367ef69f898a7d13ca60cf6618543660990f

        SHA512

        a32133212b2b0a911e938130657129c72ef92e3d9e1fcf4d40954c3cd6164b2a1eef5f07cc073bd80a3da507fc1140ae528373e5796b81e755159c8831fb485e

      • memory/964-19-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/964-18-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/964-24-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/2168-2-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/2168-1-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/2168-17-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/2168-0-0x0000000074E92000-0x0000000074E93000-memory.dmp

        Filesize

        4KB

      • memory/4664-23-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/4664-25-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/4664-20-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/4664-26-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB

      • memory/4664-27-0x0000000074E90000-0x0000000075441000-memory.dmp

        Filesize

        5.7MB