Analysis Overview
SHA256
955e4696ea217d3ea0ad3bc5d33bdf31025c0741a041a63e451e287c946151e6
Threat Level: Known bad
The file e8ab30ce44b18c12e2a2798efd7a3040N.exe was found to be: Known bad.
Malicious Activity Summary
Njrat family
njRAT/Bladabindi
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
System Location Discovery: System Language Discovery
Enumerates physical storage devices
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-26 23:43
Signatures
Njrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-26 23:43
Reported
2024-08-26 23:45
Platform
win7-20240708-en
Max time kernel
120s
Max time network
118s
Command Line
Signatures
njRAT/Bladabindi
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 5.tcp.eu.ngrok.io | N/A | N/A |
| N/A | 5.tcp.eu.ngrok.io | N/A | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1660 wrote to memory of 2428 | N/A | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | C:\Users\Admin\AppData\Local\Temp\Client.exe |
| PID 1660 wrote to memory of 2428 | N/A | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | C:\Users\Admin\AppData\Local\Temp\Client.exe |
| PID 1660 wrote to memory of 2428 | N/A | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | C:\Users\Admin\AppData\Local\Temp\Client.exe |
| PID 1660 wrote to memory of 2428 | N/A | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | C:\Users\Admin\AppData\Local\Temp\Client.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe
"C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe"
C:\Users\Admin\AppData\Local\Temp\Client.exe
"C:\Users\Admin\AppData\Local\Temp\Client.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 18.158.58.205:13606 | 5.tcp.eu.ngrok.io | tcp |
Files
memory/1660-0-0x0000000074BB1000-0x0000000074BB2000-memory.dmp
memory/1660-1-0x0000000074BB0000-0x000000007515B000-memory.dmp
memory/1660-2-0x0000000074BB0000-0x000000007515B000-memory.dmp
\Users\Admin\AppData\Local\Temp\Client.exe
| MD5 | e8ab30ce44b18c12e2a2798efd7a3040 |
| SHA1 | 946f11aa3825d3ca676cd086530438bee2138286 |
| SHA256 | 955e4696ea217d3ea0ad3bc5d33bdf31025c0741a041a63e451e287c946151e6 |
| SHA512 | eaf344453dbb5a40802c4a329e6cf4315f095a484e21831e7b069791da32ed144d23ce37fd8a262d84463b50ef82afcd910630e703e5b40cb2940b6e603b02a3 |
memory/2428-11-0x0000000074BB0000-0x000000007515B000-memory.dmp
memory/1660-10-0x0000000074BB0000-0x000000007515B000-memory.dmp
memory/2428-12-0x0000000074BB0000-0x000000007515B000-memory.dmp
memory/2428-13-0x0000000074BB0000-0x000000007515B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-26 23:43
Reported
2024-08-26 23:45
Platform
win10v2004-20240802-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 5.tcp.eu.ngrok.io | N/A | N/A |
| N/A | 5.tcp.eu.ngrok.io | N/A | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Client.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4532 wrote to memory of 4504 | N/A | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | C:\Users\Admin\AppData\Local\Temp\Client.exe |
| PID 4532 wrote to memory of 4504 | N/A | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | C:\Users\Admin\AppData\Local\Temp\Client.exe |
| PID 4532 wrote to memory of 4504 | N/A | C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe | C:\Users\Admin\AppData\Local\Temp\Client.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe
"C:\Users\Admin\AppData\Local\Temp\e8ab30ce44b18c12e2a2798efd7a3040N.exe"
C:\Users\Admin\AppData\Local\Temp\Client.exe
"C:\Users\Admin\AppData\Local\Temp\Client.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 24.139.73.23.in-addr.arpa | udp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 45.19.74.20.in-addr.arpa | udp |
| DE | 3.67.161.133:13606 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 3.67.112.102:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.112.102:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.112.102:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.112.102:13606 | 5.tcp.eu.ngrok.io | tcp |
| DE | 3.67.112.102:13606 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| DE | 3.67.112.102:13606 | 5.tcp.eu.ngrok.io | tcp |
Files
memory/4532-0-0x00000000754B2000-0x00000000754B3000-memory.dmp
memory/4532-1-0x00000000754B0000-0x0000000075A61000-memory.dmp
memory/4532-2-0x00000000754B0000-0x0000000075A61000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Client.exe
| MD5 | e8ab30ce44b18c12e2a2798efd7a3040 |
| SHA1 | 946f11aa3825d3ca676cd086530438bee2138286 |
| SHA256 | 955e4696ea217d3ea0ad3bc5d33bdf31025c0741a041a63e451e287c946151e6 |
| SHA512 | eaf344453dbb5a40802c4a329e6cf4315f095a484e21831e7b069791da32ed144d23ce37fd8a262d84463b50ef82afcd910630e703e5b40cb2940b6e603b02a3 |
memory/4532-12-0x00000000754B0000-0x0000000075A61000-memory.dmp
memory/4504-13-0x00000000754B0000-0x0000000075A61000-memory.dmp
memory/4504-14-0x00000000754B0000-0x0000000075A61000-memory.dmp
memory/4504-15-0x00000000754B0000-0x0000000075A61000-memory.dmp
memory/4504-16-0x00000000754B0000-0x0000000075A61000-memory.dmp
memory/4504-17-0x00000000754B0000-0x0000000075A61000-memory.dmp