Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
News.exe
Resource
win7-20240705-en
General
-
Target
News.exe
-
Size
73KB
-
MD5
be488e5157902bc9d0b920863d4405e9
-
SHA1
c7fcb865c0591a3b095a6384a189882144d7dfe6
-
SHA256
7376d155a75df53c85fbea9d9576e1cb004352102c7266c0f0b8ef60f60c8a25
-
SHA512
f0a2caaa72d35b2faaa36e7347f3b46c545ea0bdcaf7589bb6af72d0df1cecab2bd7d2bbe5d1cad87fa36d9d39e8a17df4ffd472f680a47dc4373a0c817bdb9a
-
SSDEEP
1536:MhJq9QuBn6bcNr6KcHwRc3lbVbxKrUM3+6tkhE39pWIEHyv5JXH3W+DqVqHGKEY1:MW9QuBnYZIrTV+WtpPE4V3W+eVqHWYyY
Malware Config
Extracted
njrat
Platinum
Victim
kgb963.duckdns.org:1118
svchost.exe
-
reg_key
svchost.exe
-
splitter
|Ghost|
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\dllhost.exe" svchost.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file 3 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
Windows.exesvchost.exesvchost.exesvchost.exepid process 1936 Windows.exe 2860 svchost.exe 1856 svchost.exe 1812 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
Windows.exepid process 1936 Windows.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
TASKKILL.exesvchost.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exesvchost.exeTASKKILL.exeschtasks.exesvchost.exeWindows.exeschtasks.exeTASKKILL.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe -
Kills process with taskkill 8 IoCs
Processes:
TASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exepid process 2248 TASKKILL.exe 1536 TASKKILL.exe 1508 TASKKILL.exe 2424 TASKKILL.exe 2572 TASKKILL.exe 2508 TASKKILL.exe 2712 TASKKILL.exe 1264 TASKKILL.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeWindows.exesvchost.exepid process 2344 powershell.exe 1936 Windows.exe 1936 Windows.exe 1936 Windows.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe 2860 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 2860 svchost.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
Processes:
powershell.exeNews.exeWindows.exeTASKKILL.exeTASKKILL.exesvchost.exeTASKKILL.exeTASKKILL.exesvchost.exeTASKKILL.exeTASKKILL.exesvchost.exeTASKKILL.exeTASKKILL.exedescription pid process Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 3008 News.exe Token: SeDebugPrivilege 1936 Windows.exe Token: SeDebugPrivilege 2572 TASKKILL.exe Token: SeDebugPrivilege 2508 TASKKILL.exe Token: SeDebugPrivilege 2860 svchost.exe Token: SeDebugPrivilege 1264 TASKKILL.exe Token: SeDebugPrivilege 2712 TASKKILL.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: SeDebugPrivilege 1856 svchost.exe Token: SeDebugPrivilege 2248 TASKKILL.exe Token: SeDebugPrivilege 1536 TASKKILL.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: SeDebugPrivilege 1812 svchost.exe Token: SeDebugPrivilege 2424 TASKKILL.exe Token: SeDebugPrivilege 1508 TASKKILL.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe Token: 33 2860 svchost.exe Token: SeIncBasePriorityPrivilege 2860 svchost.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
News.exeWindows.exesvchost.exetaskeng.exesvchost.exesvchost.exedescription pid process target process PID 3008 wrote to memory of 2344 3008 News.exe powershell.exe PID 3008 wrote to memory of 2344 3008 News.exe powershell.exe PID 3008 wrote to memory of 2344 3008 News.exe powershell.exe PID 3008 wrote to memory of 1936 3008 News.exe Windows.exe PID 3008 wrote to memory of 1936 3008 News.exe Windows.exe PID 3008 wrote to memory of 1936 3008 News.exe Windows.exe PID 3008 wrote to memory of 1936 3008 News.exe Windows.exe PID 1936 wrote to memory of 2572 1936 Windows.exe TASKKILL.exe PID 1936 wrote to memory of 2572 1936 Windows.exe TASKKILL.exe PID 1936 wrote to memory of 2572 1936 Windows.exe TASKKILL.exe PID 1936 wrote to memory of 2572 1936 Windows.exe TASKKILL.exe PID 1936 wrote to memory of 2508 1936 Windows.exe TASKKILL.exe PID 1936 wrote to memory of 2508 1936 Windows.exe TASKKILL.exe PID 1936 wrote to memory of 2508 1936 Windows.exe TASKKILL.exe PID 1936 wrote to memory of 2508 1936 Windows.exe TASKKILL.exe PID 1936 wrote to memory of 2860 1936 Windows.exe svchost.exe PID 1936 wrote to memory of 2860 1936 Windows.exe svchost.exe PID 1936 wrote to memory of 2860 1936 Windows.exe svchost.exe PID 1936 wrote to memory of 2860 1936 Windows.exe svchost.exe PID 1936 wrote to memory of 1296 1936 Windows.exe cmd.exe PID 1936 wrote to memory of 1296 1936 Windows.exe cmd.exe PID 1936 wrote to memory of 1296 1936 Windows.exe cmd.exe PID 1936 wrote to memory of 1296 1936 Windows.exe cmd.exe PID 2860 wrote to memory of 1264 2860 svchost.exe TASKKILL.exe PID 2860 wrote to memory of 1264 2860 svchost.exe TASKKILL.exe PID 2860 wrote to memory of 1264 2860 svchost.exe TASKKILL.exe PID 2860 wrote to memory of 1264 2860 svchost.exe TASKKILL.exe PID 2860 wrote to memory of 2712 2860 svchost.exe TASKKILL.exe PID 2860 wrote to memory of 2712 2860 svchost.exe TASKKILL.exe PID 2860 wrote to memory of 2712 2860 svchost.exe TASKKILL.exe PID 2860 wrote to memory of 2712 2860 svchost.exe TASKKILL.exe PID 2860 wrote to memory of 356 2860 svchost.exe schtasks.exe PID 2860 wrote to memory of 356 2860 svchost.exe schtasks.exe PID 2860 wrote to memory of 356 2860 svchost.exe schtasks.exe PID 2860 wrote to memory of 356 2860 svchost.exe schtasks.exe PID 2860 wrote to memory of 1900 2860 svchost.exe schtasks.exe PID 2860 wrote to memory of 1900 2860 svchost.exe schtasks.exe PID 2860 wrote to memory of 1900 2860 svchost.exe schtasks.exe PID 2860 wrote to memory of 1900 2860 svchost.exe schtasks.exe PID 944 wrote to memory of 1856 944 taskeng.exe svchost.exe PID 944 wrote to memory of 1856 944 taskeng.exe svchost.exe PID 944 wrote to memory of 1856 944 taskeng.exe svchost.exe PID 944 wrote to memory of 1856 944 taskeng.exe svchost.exe PID 1856 wrote to memory of 2248 1856 svchost.exe TASKKILL.exe PID 1856 wrote to memory of 2248 1856 svchost.exe TASKKILL.exe PID 1856 wrote to memory of 2248 1856 svchost.exe TASKKILL.exe PID 1856 wrote to memory of 2248 1856 svchost.exe TASKKILL.exe PID 1856 wrote to memory of 1536 1856 svchost.exe TASKKILL.exe PID 1856 wrote to memory of 1536 1856 svchost.exe TASKKILL.exe PID 1856 wrote to memory of 1536 1856 svchost.exe TASKKILL.exe PID 1856 wrote to memory of 1536 1856 svchost.exe TASKKILL.exe PID 944 wrote to memory of 1812 944 taskeng.exe svchost.exe PID 944 wrote to memory of 1812 944 taskeng.exe svchost.exe PID 944 wrote to memory of 1812 944 taskeng.exe svchost.exe PID 944 wrote to memory of 1812 944 taskeng.exe svchost.exe PID 1812 wrote to memory of 1508 1812 svchost.exe TASKKILL.exe PID 1812 wrote to memory of 1508 1812 svchost.exe TASKKILL.exe PID 1812 wrote to memory of 1508 1812 svchost.exe TASKKILL.exe PID 1812 wrote to memory of 1508 1812 svchost.exe TASKKILL.exe PID 1812 wrote to memory of 2424 1812 svchost.exe TASKKILL.exe PID 1812 wrote to memory of 2424 1812 svchost.exe TASKKILL.exe PID 1812 wrote to memory of 2424 1812 svchost.exe TASKKILL.exe PID 1812 wrote to memory of 2424 1812 svchost.exe TASKKILL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\News.exe"C:\Users\Admin\AppData\Local\Temp\News.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionProcess "News.exe";Add-MpPreference -ExclusionProcess "svchost.exe";Add-MpPreference -ExclusionProcess "Windows.exe";Add-MpPreference -ExclusionPath "Windows.exe";Add-MpPreference -ExclusionPath "svchost.exe";Add-MpPreference -ExclusionProcess ".exe";Add-MpPreference -ExclusionProcess "exe";Add-MpPreference -ExclusionPath 'C:\';Add-MpPreference -ExclusionPath '%AppData%\Microsoft\Windows';Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp';Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows';Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup';Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Windows.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Windows.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Windows.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "ChromeUpdate" /f4⤵
- System Location Discovery: System Language Discovery
PID:356 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ChromeUpdate" /tr C:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Windows.exe"3⤵PID:1296
-
C:\Windows\system32\taskeng.exetaskeng.exe {F95D177F-BBFB-4A79-AB61-B92F66E2138B} S-1-5-21-2172136094-3310281978-782691160-1000:EXCFTDUU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2424
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD5de0a165d6020dd41386184bf1e101f5f
SHA11d6e966de8d4f0c9a1009d9b4050af9c63cce214
SHA2563fc3d2a5608216ba7c7a761d1fe103c78137d5f09c005b227ef146cfa21f6f10
SHA512a1c800dc9dd74e231e8dacc9976d3a69982a0c36ca9edbbc21947ef943ae02090baa465efc5474b48bc8f36e386fed063a69fb1cfb0168b1c5eb1a535f21a75f