Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 08:36

General

  • Target

    Njrat.exe

  • Size

    3.1MB

  • MD5

    7bbb27a3b9ace5f7d403ba8d6ef58d28

  • SHA1

    5effbe830a93770824ee60f65eac790dda1ee807

  • SHA256

    d9dc76fcec48e47d8a10afa9ee40af17b856bff408bbc3eb36f5d362364a8d4c

  • SHA512

    32774b5efc9a4c771ed74cb59d6e4221d4cfb92e05d18cf9d3ad53b957005cce84892ef9e563d2c4c932127dac595394e23d8bc3e2a6ab3a654acef5e24e0327

  • SSDEEP

    49152:VbA3GVZoGDweuD4gWA7evLcjM3wwwZHFXIJ5nDWhVGUwwB3SNZts8zOqhsg:VbZDweuD4rcH9Vl65Dac7ssNj

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Njrat.exe
    "C:\Users\Admin\AppData\Local\Temp\Njrat.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\containerperf\9nepdzd6Yg.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\containerperf\MJF5L0LGrR45RopQV75MoqBbC.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\containerperf\Hyperblockport.exe
          "C:\containerperf\Hyperblockport.exe"
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2420
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2400
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1564
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/containerperf/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2156
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2148
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1468
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1464
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1472
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:860
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2248
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3036
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2884
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2192
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2232
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4DfXGwv2E7.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1432
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2372
              • C:\Program Files (x86)\Common Files\System.exe
                "C:\Program Files (x86)\Common Files\System.exe"
                6⤵
                • UAC bypass
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2424
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ac3bc6f9-68bd-4643-a669-7da7a499f83b.vbs"
                  7⤵
                    PID:296
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ec8480e4-6d73-40cb-96c6-f264dee01b1f.vbs"
                    7⤵
                      PID:2500
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Esl\lsm.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2500
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Esl\lsm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2712
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Esl\lsm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2764
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Windows\Setup\taskhost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2864
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Setup\taskhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:500
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Windows\Setup\taskhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2172
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Common Files\System.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1572
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\System.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2180
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\System.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1856
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\es-ES\dwm.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1940
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\es-ES\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1624
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\es-ES\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1492
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1228
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
            PID:832

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\4DfXGwv2E7.bat

            Filesize

            211B

            MD5

            3cb9887b538077a1611b282296a09d9d

            SHA1

            2d1c34031a1f746b35333d6061afda2b7257de12

            SHA256

            f15194d7c76a655b8cce070fa60741c9ab88c48b37f8e0d7b0ab0b3129c2f278

            SHA512

            6ee1f1ac266af8fa07d35f25363a34761ea356864060379af0505284744e87a99cf2fbb9344c555e04570dd02327752b3cd7c77347cd4f161c9a54786b8adbb0

          • C:\Users\Admin\AppData\Local\Temp\ac3bc6f9-68bd-4643-a669-7da7a499f83b.vbs

            Filesize

            722B

            MD5

            d70019e1604a8aa42386b54bf1d7a2e5

            SHA1

            b58d2a64516ff6a90b1eecbadc71ef69470fa65c

            SHA256

            e6a1ba976c3439bb3150ea4c9d587a13c5a52f302cca41b1550d5543e1ebf1f3

            SHA512

            1695d0d73e67da893bd8a4245bf7caaac317a2bee3b961c32817cb29cdb1a8cb60d8798195437b4f535b0404fba79ae639dfff0c56a390d422230606d9d7b166

          • C:\Users\Admin\AppData\Local\Temp\ec8480e4-6d73-40cb-96c6-f264dee01b1f.vbs

            Filesize

            498B

            MD5

            8016a76e01f600d8633bb9653e76aca8

            SHA1

            cab7f6f4b613ec308fc3adc6131009052ad2a968

            SHA256

            f9e495126ae41eb77fb3b8ddf0a9ea270bb7fc85a8e6c080690e6dfd218c8eda

            SHA512

            2a5c113acee91f557157687dc1e34f98d5296a4939aea5dfdd11e1fa60fcba4d6f360adb64a2f26462e2a3d6782bbaaf4da7e41e2ab99eb4dfd8b1e64b870dbe

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            1f666b42763bf9c045a5673ca9454b1d

            SHA1

            da090ce876ebaac64a8b53adf1fa67d8d3cce710

            SHA256

            70d6839455285e0568876c7fb72865a85511f2d8366f272ad9bdf599c06e356e

            SHA512

            5dca06e91a0f83207ac7a9c66116a2870f404fd0724d8a701416a467b21c441e62955e68c5cce5ccf9300796dadf99ca9795694060de9f1253f4f8e8f9d26f15

          • C:\containerperf\9nepdzd6Yg.vbe

            Filesize

            226B

            MD5

            fd73bba1ae261c1bde0a83ff425994c4

            SHA1

            7e9e51cef1374547c885b6e8bd62ed2a1dc6902b

            SHA256

            16f04c862e66dbdf8631baaa3c37e771281f59d68d60420d4dac89701c1fb732

            SHA512

            20644ded806f97cdd62b136fa4cd6bff7ed61d8c4f6d533dee3c71d3f12923243551e910f56d4504a0c67a89a3e50064fa8f53cb3b307150cf185c9016e004e4

          • C:\containerperf\Hyperblockport.exe

            Filesize

            2.9MB

            MD5

            a5eb91d9ffb09e43c86d3ac84354107f

            SHA1

            ab225fd443f3c209c4493e1dd823093c87364075

            SHA256

            13da0ed8f7f0cfbf7187ae5d3fe222a0aac5a0fad6e0c1f011f0ef3f8d126906

            SHA512

            3259e901d0347db552f658f89c11c711f328831a5da203b18e8383740a202b87aea4a2c84c33d3ca6d9a8200d1f933f8820379a7b77e094c005a004c9f3c59ee

          • C:\containerperf\MJF5L0LGrR45RopQV75MoqBbC.bat

            Filesize

            48B

            MD5

            7a122e2bf760c3ba657e5ba59337bce2

            SHA1

            e9ac1ad5c6b04628fdea1a0657f0e466a2a06261

            SHA256

            b9469f10268a8e4a44814d71f3eb6530f2a4970933b586f6dc5e3eebb2fe33f8

            SHA512

            89912e65857c9975e0c6ab2b3ea94f07547cba9e875b7db26dc87a6d2ec8ba79b9aa7421a78f8203587ffc70fe39df2c8fc95566c47d4681fa59f933129c6c64

          • memory/1468-67-0x000000001B630000-0x000000001B912000-memory.dmp

            Filesize

            2.9MB

          • memory/2400-68-0x0000000001D90000-0x0000000001D98000-memory.dmp

            Filesize

            32KB

          • memory/2420-26-0x0000000000DC0000-0x0000000000DCC000-memory.dmp

            Filesize

            48KB

          • memory/2420-31-0x0000000002540000-0x000000000254E000-memory.dmp

            Filesize

            56KB

          • memory/2420-21-0x00000000006D0000-0x00000000006DC000-memory.dmp

            Filesize

            48KB

          • memory/2420-22-0x0000000000AE0000-0x0000000000AE8000-memory.dmp

            Filesize

            32KB

          • memory/2420-23-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

            Filesize

            72KB

          • memory/2420-24-0x0000000000C10000-0x0000000000C1C000-memory.dmp

            Filesize

            48KB

          • memory/2420-25-0x0000000000C20000-0x0000000000C2C000-memory.dmp

            Filesize

            48KB

          • memory/2420-19-0x00000000006B0000-0x00000000006BC000-memory.dmp

            Filesize

            48KB

          • memory/2420-27-0x0000000000DD0000-0x0000000000DD8000-memory.dmp

            Filesize

            32KB

          • memory/2420-28-0x0000000000DE0000-0x0000000000DEA000-memory.dmp

            Filesize

            40KB

          • memory/2420-29-0x0000000000E30000-0x0000000000E3E000-memory.dmp

            Filesize

            56KB

          • memory/2420-20-0x00000000006C0000-0x00000000006C8000-memory.dmp

            Filesize

            32KB

          • memory/2420-30-0x0000000000E40000-0x0000000000E48000-memory.dmp

            Filesize

            32KB

          • memory/2420-32-0x0000000002550000-0x0000000002558000-memory.dmp

            Filesize

            32KB

          • memory/2420-33-0x0000000002580000-0x0000000002588000-memory.dmp

            Filesize

            32KB

          • memory/2420-34-0x000000001AA10000-0x000000001AA1C000-memory.dmp

            Filesize

            48KB

          • memory/2420-18-0x0000000000A90000-0x0000000000AE6000-memory.dmp

            Filesize

            344KB

          • memory/2420-17-0x00000000006A0000-0x00000000006AA000-memory.dmp

            Filesize

            40KB

          • memory/2420-16-0x0000000000690000-0x00000000006A0000-memory.dmp

            Filesize

            64KB

          • memory/2420-15-0x00000000003E0000-0x00000000003F6000-memory.dmp

            Filesize

            88KB

          • memory/2420-13-0x0000000000E50000-0x0000000001132000-memory.dmp

            Filesize

            2.9MB

          • memory/2420-14-0x00000000003C0000-0x00000000003DC000-memory.dmp

            Filesize

            112KB

          • memory/2424-116-0x0000000000310000-0x00000000005F2000-memory.dmp

            Filesize

            2.9MB