Malware Analysis Report

2024-10-19 08:03

Sample ID 240817-fj7vssyarh
Target c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2
SHA256 c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2
Tags
njrat neuf discovery evasion persistence privilege_escalation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2

Threat Level: Known bad

The file c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2 was found to be: Known bad.

Malicious Activity Summary

njrat neuf discovery evasion persistence privilege_escalation trojan

njRAT/Bladabindi

Modifies Windows Firewall

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Event Triggered Execution: Netsh Helper DLL

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-17 04:55

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-17 04:55

Reported

2024-08-17 04:57

Platform

win7-20240729-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe"

Signatures

njRAT/Bladabindi

trojan njrat

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe" C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2620 set thread context of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

Enumerates physical storage devices

Event Triggered Execution: Netsh Helper DLL

persistence privilege_escalation
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\netsh.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1924 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 1924 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 1924 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 1924 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 2620 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 1920 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Windows\SysWOW64\netsh.exe
PID 1920 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Windows\SysWOW64\netsh.exe
PID 1920 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Windows\SysWOW64\netsh.exe
PID 1920 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Windows\SysWOW64\netsh.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe

"C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe"

C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"

C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE

Network

Country Destination Domain Proto
US 8.8.8.8:53 doddyfire.linkpc.net udp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp

Files

memory/1924-0-0x00000000747F1000-0x00000000747F2000-memory.dmp

memory/1924-1-0x00000000747F0000-0x0000000074D9B000-memory.dmp

memory/1924-9-0x00000000747F0000-0x0000000074D9B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabF115.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarF127.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9ef2ab9ddbb02a046c466e6e40e9d7ad
SHA1 f394ffe441c6fe1b98e243d983eff9a2a35b1f5c
SHA256 f3e0bfe74526846f920e5ce7b6777d47326520487930378008126bb5d7e31170
SHA512 d0451fa20ff2c43bf99e75fedeb4eb0db5b6c4c8cc4c6b0bdc842c0ce4607cac4ac67e6f5cde6021df96366dc6ed75516e7d8dea06580bd1ac3498d5c0b96b1d

memory/1924-163-0x00000000747F0000-0x0000000074D9B000-memory.dmp

memory/1924-165-0x00000000747F0000-0x0000000074D9B000-memory.dmp

\Users\Admin\AppData\Roaming\confuse\chargeable.exe

MD5 00f8d30a0dab94d62c93385d36eba896
SHA1 1a6296463a94d6d77e0f8c3544413b4e97d77ac7
SHA256 1c37288fb9b745834849f49cec8217c6a7dfe1237a8ee320d65fbf7b35484875
SHA512 7c01b59aff7a06343131c35226c6c1d52e10a0fa63c872c81362ebd60fda5bb276dadd13393ab7096bb6af359f2017c6dc845f5eb5b9b3908889daaa415bda7f

memory/1924-176-0x00000000747F0000-0x0000000074D9B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9940cc4db802094951af5e6346aea269
SHA1 b793ebccfe931dce5c031ef17717277ff3c8334f
SHA256 2cf7648f557e15da7a98643e7bd312cab988db6c2ef9b83b1466b2a4d72ca121
SHA512 9346b494cfdd32343469ae19c7ec523142f322e8ebb55fd550dab96f01f222f51575724bc93313ffd67f5665cc39dba4835910f46cb33da2d56bfcd30bcb2537

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d04a2d6214915902cc2f8f5719f356a3
SHA1 9c0852ddde588e63a8fda1477f569034a47504d7
SHA256 96806755118bb1b9aeaea647176a6f3942bdd34363d28e45e8c1e465c465798d
SHA512 1bc57a31710f5ee41abb2dde44efffca95709cd84678707f39f5f87b1f56243fd25f4a371592a474757ddeb470374c2372d871ac4e5fb967278962f7c058ee2c

memory/1920-339-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1920-342-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1920-341-0x0000000000400000-0x000000000040C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-17 04:55

Reported

2024-08-17 04:57

Platform

win10v2004-20240802-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe"

Signatures

njRAT/Bladabindi

trojan njrat

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe" C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3580 set thread context of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

Enumerates physical storage devices

Event Triggered Execution: Netsh Helper DLL

persistence privilege_escalation
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\netsh.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4368 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 4368 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 4368 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3580 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3580 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3580 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3580 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3580 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3580 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3580 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3580 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
PID 3116 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Windows\SysWOW64\netsh.exe
PID 3116 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Windows\SysWOW64\netsh.exe
PID 3116 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe C:\Windows\SysWOW64\netsh.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe

"C:\Users\Admin\AppData\Local\Temp\c5c3169cf4c8132f94a8ce8346745c67d1cb1164d0bca05e355da8733dc6f3a2.exe"

C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"

C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE

Network

Country Destination Domain Proto
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 doddyfire.linkpc.net udp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp
IT 151.89.128.37:10000 doddyfire.linkpc.net tcp

Files

memory/4368-0-0x00000000752B2000-0x00000000752B3000-memory.dmp

memory/4368-1-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/4368-2-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/4368-6-0x00000000752B2000-0x00000000752B3000-memory.dmp

memory/4368-7-0x00000000752B0000-0x0000000075861000-memory.dmp

C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

MD5 5c856e40df0cc27ddac127168517f382
SHA1 641449c0d9f80d8bf1d6426aa4edc5c65e906715
SHA256 23eaa57b406942f3980bf8afb46aa91152e12a422a57bdbacf81a22a8819d3d3
SHA512 4987c9f37165064b9bdc4734bf4e4dd1028b539af176a37b67dd90be0f44dad47eed1244eb3bcec7e5620727fb99a73a5d8d83e25203150647b9c67798eb8e25

memory/4368-20-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/4368-19-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/3580-21-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/3580-22-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/3580-23-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/3116-24-0x0000000000400000-0x000000000040C000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log

MD5 0a9b4592cd49c3c21f6767c2dabda92f
SHA1 f534297527ae5ccc0ecb2221ddeb8e58daeb8b74
SHA256 c7effe9cb81a70d738dee863991afefab040290d4c4b78b4202383bcb9f88fcd
SHA512 6b878df474e5bbfb8e9e265f15a76560c2ef151dcebc6388c82d7f6f86ffaf83f5ade5a09f1842e493cb6c8fd63b0b88d088c728fd725f7139f965a5ee332307

memory/3116-28-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/3580-29-0x00000000752B0000-0x0000000075861000-memory.dmp

memory/3116-30-0x00000000752B0000-0x0000000075861000-memory.dmp