Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 23:34
Behavioral task
behavioral1
Sample
bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe
Resource
win10v2004-20240709-en
General
-
Target
bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe
-
Size
31KB
-
MD5
9b4c2ca1f998c1d6fa8f7fa1721cf207
-
SHA1
5f01f93f79ec4824b7f063970b209e2a1df8be5d
-
SHA256
bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241
-
SHA512
d8a16ed2daa51b6bf204cafbca4fdbadd4ce9bf986a50c9c4ddfa54d3619e4654dbd3ede85b3048361fde863d87d38285f25f813fe4ba8c9cafef847e31b58c0
-
SSDEEP
768:bborDp8pdvXyzx9uFwna/5nW3TvanQmIDUu0tiecj:ww68nQbkQVkWj
Malware Config
Extracted
njrat
0.7d
MyBot
127.0.0.1:6522
6e9ac6497fc4975c4672b55f181b4e71
-
reg_key
6e9ac6497fc4975c4672b55f181b4e71
-
splitter
Y262SUCZ4UJJ
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2996 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1032 WindowsServices.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\WindowsServices.exe bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe Token: 33 1032 WindowsServices.exe Token: SeIncBasePriorityPrivilege 1032 WindowsServices.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1032 2644 bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe 30 PID 2644 wrote to memory of 1032 2644 bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe 30 PID 2644 wrote to memory of 1032 2644 bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe 30 PID 2644 wrote to memory of 1032 2644 bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe 30 PID 1032 wrote to memory of 2996 1032 WindowsServices.exe 31 PID 1032 wrote to memory of 2996 1032 WindowsServices.exe 31 PID 1032 wrote to memory of 2996 1032 WindowsServices.exe 31 PID 1032 wrote to memory of 2996 1032 WindowsServices.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe"C:\Users\Admin\AppData\Local\Temp\bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\WindowsServices.exe"C:\Windows\WindowsServices.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\WindowsServices.exe" "WindowsServices.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD59b4c2ca1f998c1d6fa8f7fa1721cf207
SHA15f01f93f79ec4824b7f063970b209e2a1df8be5d
SHA256bc1a3cd18c048cf17dd34ed7f1974e0dde782376747004f2aca231323efe3241
SHA512d8a16ed2daa51b6bf204cafbca4fdbadd4ce9bf986a50c9c4ddfa54d3619e4654dbd3ede85b3048361fde863d87d38285f25f813fe4ba8c9cafef847e31b58c0