Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
1e7da62945110b7089e04aaf6e5a51a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1e7da62945110b7089e04aaf6e5a51a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
1e7da62945110b7089e04aaf6e5a51a0N.exe
-
Size
118KB
-
MD5
1e7da62945110b7089e04aaf6e5a51a0
-
SHA1
f93f93be654fb638c5088a23f964624d4c5f8cb9
-
SHA256
f93a07b9db9e6b6b8b9a33764bbdbbc94de3c0f964adad8a75afc10e5af7de45
-
SHA512
ca5398546830cdeb579daab62eab74971ec27918b60b53d6d016705d48fc10108c5e35087455dc10b98e759699b478fc61113d4a2ab8d613d6065e968b1b3a4d
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL143T:P5eznsjsguGDFqGZ2rDL143T
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2916 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1452 chargeable.exe 1156 chargeable.exe -
Loads dropped DLL 2 IoCs
pid Process 2128 1e7da62945110b7089e04aaf6e5a51a0N.exe 2128 1e7da62945110b7089e04aaf6e5a51a0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" 1e7da62945110b7089e04aaf6e5a51a0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1e7da62945110b7089e04aaf6e5a51a0N.exe" 1e7da62945110b7089e04aaf6e5a51a0N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1452 set thread context of 1156 1452 chargeable.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe Token: 33 1156 chargeable.exe Token: SeIncBasePriorityPrivilege 1156 chargeable.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1452 2128 1e7da62945110b7089e04aaf6e5a51a0N.exe 30 PID 2128 wrote to memory of 1452 2128 1e7da62945110b7089e04aaf6e5a51a0N.exe 30 PID 2128 wrote to memory of 1452 2128 1e7da62945110b7089e04aaf6e5a51a0N.exe 30 PID 2128 wrote to memory of 1452 2128 1e7da62945110b7089e04aaf6e5a51a0N.exe 30 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1452 wrote to memory of 1156 1452 chargeable.exe 31 PID 1156 wrote to memory of 2916 1156 chargeable.exe 33 PID 1156 wrote to memory of 2916 1156 chargeable.exe 33 PID 1156 wrote to memory of 2916 1156 chargeable.exe 33 PID 1156 wrote to memory of 2916 1156 chargeable.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e7da62945110b7089e04aaf6e5a51a0N.exe"C:\Users\Admin\AppData\Local\Temp\1e7da62945110b7089e04aaf6e5a51a0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed6fdd45a4f4c2e9fee3ba845b4b61e
SHA1ea0a327a0dea653157bdc9085dc44a1318d2f605
SHA25647d1d895441485b9071e3add12570d43e2c958734b8eb5eeedae167d036b0592
SHA51226f7cf993756e83373790115123e6aa6b8b12f45612fcf9d386edb6ea15ba7b0eeb906c33e7380e5f1c1d99bfd949c673b3f846cbba22e931d6a654ab411dd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8326763838a15b14c5afbdd28f8208
SHA133ee4a6a41a930e99506a597a4556b1607dd9066
SHA25668bb927d307af68a08667f5eb6ee598728de0c36409bd8394bb72725f9f0e29d
SHA51292dc707a8d6419233e5611b88cc99b40e8d6e8700279353d5b0e8208bfef813c12e09298b7ab2c10ba19917f675e8a58b517e24be9c3753a85f78b8bc085745c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca35045669892e52d86fafc0b8dc251
SHA1e291209849a4e05bdc2c96f69cb561abba67c38b
SHA256795eb5ce1f63d8c6331a0a81fa5a46befa2d9b15adb915ed58446fb55a7485f4
SHA5127809460fb693ca05a61730924e65f94f3b8816bee24aff257bb67a7a229385e31951a44d1b53792d7abf547c8cbcd74327d0cb0d5cd95da12dcc87d1573ca170
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
118KB
MD536126ba45ac7721cdff6311b6a641bc6
SHA1ebf19da7bda3f30d710ed988c5ea75bb67de8697
SHA25650b5c43c220f383546a22cd6d77b7344f5d3b276fd0e1f2435787384098824dc
SHA5127ccf0b49d53fae6ad91268194fc60d94430dbda2219b77611e8a620ac84360b62ece3466298ab3143ce548e16e63756a14089593e8db116ff22de610fe5c1a5e