Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 22:16

General

  • Target

    fb73858ab13c8149347c31cc4c1e975dc1f9f34ab01078df74dd60b77f490bee.exe

  • Size

    93KB

  • MD5

    bd3b053452658056878a387afc32144e

  • SHA1

    fd07f4da3e7d3eed99cab4cc64de19d060a1fe2a

  • SHA256

    fb73858ab13c8149347c31cc4c1e975dc1f9f34ab01078df74dd60b77f490bee

  • SHA512

    35aa454e80ee5fb07fdf660bb697d125c352f8b21d30f363d6346ecd9ee0cddb9998cd062de25ffba4c04c26e91244db1480c9144ed3ad2c1d4325badb4040d2

  • SSDEEP

    1536:L+k1GkeUqZJO5iNSimjEwzGi1dDlD5gS:L+PUqZJOQAOi1d52

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

id-diesel.gl.at.ply.gg:35584

Mutex

3f091098c711642392fe49448b66f44b

Attributes
  • reg_key

    3f091098c711642392fe49448b66f44b

  • splitter

    |'|'|

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb73858ab13c8149347c31cc4c1e975dc1f9f34ab01078df74dd60b77f490bee.exe
    "C:\Users\Admin\AppData\Local\Temp\fb73858ab13c8149347c31cc4c1e975dc1f9f34ab01078df74dd60b77f490bee.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops autorun.inf file
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2372
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2684
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:612
      • C:\Users\Admin\AppData\Local\Temp\tmp6613.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp6613.tmp.exe"
        3⤵
        • Executes dropped EXE
        PID:1948
        • C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe
          "C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe"
          4⤵
            PID:1756
          • C:\Users\Admin\AppData\Local\Temp\Русский Гусь.exe
            "C:\Users\Admin\AppData\Local\Temp\Русский Гусь.exe"
            4⤵
              PID:1928

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\NVIDIA Container.exe

        Filesize

        1.8MB

        MD5

        531bf67134a7c1fb4096113ca58cc648

        SHA1

        99e0fc1fb7a07c0685e426b327921d3e6c34498c

        SHA256

        67942630366d114efa35f3f4a79741a4a4eb2c3b0c8ffaac07af527f84d4489a

        SHA512

        8facae8335a4f33f54e48c64814946eb8b480800b4453612fffcef64117946a35d493f433d4e27186ee864603da756319f816e70c3bfc08b8bb1861fc7030ff4

      • C:\Users\Admin\AppData\Local\Temp\Русский Гусь.exe

        Filesize

        1.0MB

        MD5

        04c87a2f53778fd46274b524914b9b79

        SHA1

        c5ce0043ca4011225044aa6fe1bef35f191efbd5

        SHA256

        6e494c08b426cf441f3e0146e7578b6eef41658bbf58b7ef5cb531ddc2f458a5

        SHA512

        18794701c80ac6e956f9733c76aaa9631dfab7ce3d5f1cfa5d5fac20012931fd4161f2dc83fddc4f9ca83f2223ca16862cfba34c3ea6b091d4cc6318d08d74fc

      • C:\Users\Admin\AppData\Local\Temp\Русский Гусь.exe

        Filesize

        960KB

        MD5

        3127981258169c0f7e4cfcc1519f6fc9

        SHA1

        a3fe35c39f26059e0844b4dd4701fdc3827b62ce

        SHA256

        1b1ca9c2292eba94b5b6657ae8fb381ac5c33ea7fca636a6b30f683b3e9944c1

        SHA512

        2a32902d1f3cc6a68cbdab37eec6debaf2514989682fd4eaa4766504339813838dd86f86132a962f12a6485ef42775d5ac61ca66dfecb17f2ecaa24f0499b2fb

      • C:\Users\Admin\AppData\Roaming\app

        Filesize

        5B

        MD5

        cac4598fdc0f92181616d12833eb6ca1

        SHA1

        80a7b7a46a0e8e674b782b9eb569e5430a69c84b

        SHA256

        275918973c23ad700f278c69cc03c9c82ec9f4d9ed0f53111ad22bec197ff440

        SHA512

        01a7556bfcce6d9d8251aadc7f6e6169fdd0477d487ce88729c44bfe8b85b2eee500985d553c0479765ef5b5c6dc3517c0305efb9089814c3f8a9ea6fc51c713

      • \Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        93KB

        MD5

        bd3b053452658056878a387afc32144e

        SHA1

        fd07f4da3e7d3eed99cab4cc64de19d060a1fe2a

        SHA256

        fb73858ab13c8149347c31cc4c1e975dc1f9f34ab01078df74dd60b77f490bee

        SHA512

        35aa454e80ee5fb07fdf660bb697d125c352f8b21d30f363d6346ecd9ee0cddb9998cd062de25ffba4c04c26e91244db1480c9144ed3ad2c1d4325badb4040d2

      • \Users\Admin\AppData\Local\Temp\tmp6613.tmp.exe

        Filesize

        4.5MB

        MD5

        cbe263551fead5f9f24537c26e2672e3

        SHA1

        93792371b1383f5e7abfba204dcb712942512baf

        SHA256

        d5e67f41a6a4da9d68c039c6abba98f9c4c80720e10ab32fda217430de97f27d

        SHA512

        c2c7c41c071eb082a8da2204b104954c31578bd8e28ff6de72dcc849f286405650321370c7b10cd844d3653ca2e16125ad3130c8f04852320f548622b554eacd

      • memory/1944-1-0x00000000748B0000-0x0000000074E5B000-memory.dmp

        Filesize

        5.7MB

      • memory/1944-2-0x00000000748B0000-0x0000000074E5B000-memory.dmp

        Filesize

        5.7MB

      • memory/1944-14-0x00000000748B0000-0x0000000074E5B000-memory.dmp

        Filesize

        5.7MB

      • memory/1944-0-0x00000000748B1000-0x00000000748B2000-memory.dmp

        Filesize

        4KB

      • memory/1948-40-0x0000000000C00000-0x000000000108E000-memory.dmp

        Filesize

        4.6MB

      • memory/2760-16-0x00000000748B0000-0x0000000074E5B000-memory.dmp

        Filesize

        5.7MB

      • memory/2760-33-0x00000000748B0000-0x0000000074E5B000-memory.dmp

        Filesize

        5.7MB

      • memory/2760-15-0x00000000748B0000-0x0000000074E5B000-memory.dmp

        Filesize

        5.7MB

      • memory/2760-17-0x00000000748B0000-0x0000000074E5B000-memory.dmp

        Filesize

        5.7MB