Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-08-2024 18:53

General

  • Target

    DDOS TOOL.exe

  • Size

    5.3MB

  • MD5

    4356e6504e19b8a4014dbfacbc89493f

  • SHA1

    a4078eabcc6760e184259d694b7251b89569453a

  • SHA256

    e3a9ffb17c734d02950cdfcd38592549181d9f95220b8aaae69d6091480a8d42

  • SHA512

    83949b7422c6e2efcf6888e5c324ee8d536716f571156bdb4672e989aa68a1be5b7e6f0b5024e7c47af3f16ef0667045fda050f5dbc1272a491febdd249b7fe3

  • SSDEEP

    98304:9fIGp26lE8kKlr8iRqJxf+n/FHkLUfzv3QtRiBNyZWa8QEHE:9lEWrct+ntHkQfzPlpaz

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1260642913709199370/cN_Wnccw0kdFSTwqONW2fMDnifHoEhjQp9n_8tPGu3gI5coO14fm3gGZ1Q04Hstg1nAO

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

147.185.221.20:49236

Mutex

6a8a3b6e5450a823d542e748a454aa4c

Attributes
  • reg_key

    6a8a3b6e5450a823d542e748a454aa4c

  • splitter

    |'|'|

Extracted

Family

xworm

Version

5.0

C2

testarosa.duckdns.org:7110

Mutex

5ZpeoOe6AtQfr6wU

Attributes
  • Install_directory

    %AppData%

  • install_file

    Ondrive.exe

aes.plain

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DDOS TOOL.exe
    "C:\Users\Admin\AppData\Local\Temp\DDOS TOOL.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Users\Admin\AppData\Roaming\Server.exe
        "C:\Users\Admin\AppData\Roaming\Server.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          "C:\Users\Admin\AppData\Local\Temp\server.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4908
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4424
      • C:\Users\Admin\AppData\Roaming\conhost.exe
        "C:\Users\Admin\AppData\Roaming\conhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\conhost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4604
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'conhost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:5024
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Ondrive.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:4868
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Ondrive.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:660
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Ondrive" /tr "C:\Users\Admin\AppData\Roaming\Ondrive.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:316
    • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
      "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1796
    • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe
      "C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe
        "C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c title DDoS Tool by HʎDRΔ
          4⤵
            PID:5028
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            4⤵
              PID:2388
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              4⤵
                PID:2540
        • C:\Users\Admin\AppData\Roaming\Ondrive.exe
          C:\Users\Admin\AppData\Roaming\Ondrive.exe
          1⤵
          • Executes dropped EXE
          PID:3440
        • C:\Users\Admin\AppData\Roaming\Ondrive.exe
          C:\Users\Admin\AppData\Roaming\Ondrive.exe
          1⤵
          • Executes dropped EXE
          PID:4364

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\server.exe.log

          Filesize

          319B

          MD5

          9424b451803882d2fc76f5ef5c124991

          SHA1

          72132bc89bcf174fd4a40cfb99b309a365c8e4db

          SHA256

          2f7b91d8a056e89152222115fe01e54dfb3c925096efba7847a069f5d582405a

          SHA512

          9843c3ea376d72b7641ab7e583e88a1188e36aca6ada3a6912c6e44066bc49db673a692334a14e08bb42e7da3e2719d4decd1bc3effba928c108e1cc25c22fae

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Ondrive.exe.log

          Filesize

          654B

          MD5

          16c5fce5f7230eea11598ec11ed42862

          SHA1

          75392d4824706090f5e8907eee1059349c927600

          SHA256

          87ba77c13905298acbac72be90949c4fe0755b6eff9777615aa37f252515f151

          SHA512

          153edd6da59beea6cc411ed7383c32916425d6ebb65f04c65aab7c1d6b25443d143aa8449aa92149de0ad8a975f6ecaa60f9f7574536eec6b38fe5fd3a6c6adc

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          8592ba100a78835a6b94d5949e13dfc1

          SHA1

          63e901200ab9a57c7dd4c078d7f75dcd3b357020

          SHA256

          fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

          SHA512

          87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          602460aefd3cf1e3f0a088327eeea87d

          SHA1

          724924274b9eb7460ec6bd6aae4bd93dd8822992

          SHA256

          ae46384e0ef186b47c66963a40c84582222d1b43d5b23ef0319eacf35bc4be1b

          SHA512

          3e966b7798b7ee324376093d506275d1fe75c73332914bb4443376025de9bc6ed73751ae6e8a3e206661381e66fd2db56490b50fb39351b59b815c6dcb33a971

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          5bcb2c0c17f8fdd67f00535c6d4f7b34

          SHA1

          69f39021300701b22eb65ab8801a93003b2983ff

          SHA256

          fdeea6f3db533cc7f4fb48857ba597233a057716c236a7b9d2dbf1a492fff7c6

          SHA512

          c1d5b8667b790ad4067c2ee497cb7a33f829c257475147871a0b85210b85834779aa913f0ed34a03ec4cbc9da01ff4b9635b9a9c71e4b47bc64d3c8ff062cec7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          db00ee61164362beefc04ed686abbae8

          SHA1

          6c4ad788e34dd6f2e69aba9492911a3d913e6ff7

          SHA256

          0e9e85f57149887757b95cab224ee2add0ee23b95d32044d36cde7edf0d62c8b

          SHA512

          5d238c79c16b2d030429c43a15f7a52fd958389d82456ee2b7d2c191c0ec0e19d5ecf5595de6e092579c9e9486c3fcb2271dccc2a9e0477e1bbea5fbbad14d88

        • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe

          Filesize

          5.2MB

          MD5

          0b119327f1046d6917d7018312ac8e32

          SHA1

          3562ca03b61381ba727d8dac8da7bd24647eb9fc

          SHA256

          8adadd0edb3da0a3bebce706c8f8acd4a07c77abdf7e66c712fb61189a5c81ed

          SHA512

          dc087ba8e9603533bc780906b34f350728bda86c980e47fa9eaa1bf77baf4c4df75af514135665f99f99e4d475ed512a415ed756b30bae39e29813ca49ae3391

        • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe

          Filesize

          227KB

          MD5

          224f803df5b876b23c002f19f74aafac

          SHA1

          6b265b9921fed98a4d3b9a8e72f26914ed154de8

          SHA256

          f8d8aa95aa4205ac48cf654af602563bef92848b92129b07c5f402816d3d04dc

          SHA512

          2df0cd2db55fce534ac6b65afacc121c21b5c105d24d2c6c036b5225e86e97833b2281f205b1435e2c1800ddeeb0f597d0a0fdf83887421259043402487c43b2

        • C:\Users\Admin\AppData\Local\Temp\Server.exe

          Filesize

          71KB

          MD5

          f9b08bd21b40a938122b479095b7c70c

          SHA1

          eb925e3927b83c20d8d24bdab2e587c10d6ac8cd

          SHA256

          c96cde2e96021c266a202286d644ceb28543d6347e21006d72b29b8a72c505e8

          SHA512

          fcc5784936b7f85a550883c472b99b5edfa7e5c6fd3872fd806b81c2ce1f195ca34342b230a89456066885579fe55aea46d91074ac08af192fbd04ea158473ee

        • C:\Users\Admin\AppData\Local\Temp\_MEI23362\VCRUNTIME140.dll

          Filesize

          87KB

          MD5

          0e675d4a7a5b7ccd69013386793f68eb

          SHA1

          6e5821ddd8fea6681bda4448816f39984a33596b

          SHA256

          bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

          SHA512

          cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

        • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_ctypes.pyd

          Filesize

          129KB

          MD5

          2f21f50d2252e3083555a724ca57b71e

          SHA1

          49ec351d569a466284b8cc55ee9aeaf3fbf20099

          SHA256

          09887f07f4316057d3c87e3a907c2235dc6547e54ed4f5f9125f99e547d58bce

          SHA512

          e71ff1e63105f51a4516498cd09f8156d7208758c5dc9a74e7654844e5cefc6e84f8fe98a1f1bd7a459a98965fbe913cb5edb552fffa1e33dfda709f918dddeb

        • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_hashlib.pyd

          Filesize

          38KB

          MD5

          c3b19ad5381b9832e313a448de7c5210

          SHA1

          51777d53e1ea5592efede1ed349418345b55f367

          SHA256

          bdf4a536f783958357d2e0055debdc3cf7790ee28beb286452eec0354a346bdc

          SHA512

          7f8d3b79a58612e850d18e8952d14793e974483c688b5daee217baaa83120fd50d1e036ca4a1b59d748b22951744377257d2a8f094a4b4de1f79fecd4bf06afb

        • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_socket.pyd

          Filesize

          74KB

          MD5

          d7e7a7592338ce88e131f858a84deec6

          SHA1

          3add8cd9fbbf7f5fa40d8a972d9ac18282dcf357

          SHA256

          4ba5d0e236711bdcb29ce9c3138406f7321bd00587b6b362b4ace94379cf52d5

          SHA512

          96649296e8ccdc06d6787902185e21020a700436fc7007b2aa6464d0af7f9eb66a4485b3d46461106ac5f1d35403183daa1925e842e7df6f2db9e3e833b18fb4

        • C:\Users\Admin\AppData\Local\Temp\_MEI23362\base_library.zip

          Filesize

          766KB

          MD5

          c7f6b1e71737274de654099f1a483896

          SHA1

          6cf5965a8efb64443dc654c6b9953eacb314daca

          SHA256

          d982c24bbc242b3cc0094ee3685fba79297f3893d354293d4c33ccfd431dfb1d

          SHA512

          3b196ecb376f02b900b581d98d347d22d89d34b502a46770493663e48f9d7eee4b42acb16181b441026ae1634638faa14e4ebd814e05ccaf2b965aa2a5b5179c

        • C:\Users\Admin\AppData\Local\Temp\_MEI23362\libcrypto-1_1-x64.dll

          Filesize

          2.4MB

          MD5

          022a61849adab67e3a59bcf4d0f1c40b

          SHA1

          fca2e1e8c30767c88f7ab5b42fe2bd9abb644672

          SHA256

          2a57183839c3e9cc4618fb1994c40e47672a8b6daffaa76c5f89cf2542b02c2f

          SHA512

          94ac596181f0887af7bf02a7ce31327ad443bb7fe2d668217953e0f0c782d19296a80de965008118708afd9bda14fd8c78f49785ebf7abcc37d166b692e88246

        • C:\Users\Admin\AppData\Local\Temp\_MEI23362\python37.dll

          Filesize

          3.7MB

          MD5

          62125a78b9be5ac58c3b55413f085028

          SHA1

          46c643f70dd3b3e82ab4a5d1bc979946039e35b2

          SHA256

          17c29e6188b022f795092d72a1fb58630a7c723d70ac5bc3990b20cd2eb2a51f

          SHA512

          e63f4aa8fc5cd1569ae401e283bc8e1445859131eb0db76581b941f1085670c549cbc3fedf911a21c1237b0f3f66f62b10c60e88b923fa058f7fafee18dd0fa4

        • C:\Users\Admin\AppData\Local\Temp\_MEI23362\select.pyd

          Filesize

          26KB

          MD5

          c30e5eccf9c62b0b0bc57ed591e16cc0

          SHA1

          24aece32d4f215516ee092ab72471d1e15c3ba24

          SHA256

          56d1a971762a1a56a73bdf64727e416ffa9395b8af4efcd218f5203d744e1268

          SHA512

          3e5c58428d4c166a3d6d3e153b46c4a57cca2e402001932ec90052c4689b7f5ba4c5f122d1a66d282b2a0a0c9916dc5a5b5e5f6dfc952cdb62332ac29cb7b36a

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_efcslldx.t4y.ps1

          Filesize

          1B

          MD5

          c4ca4238a0b923820dcc509a6f75849b

          SHA1

          356a192b7913b04c54574d18c28d46e6395428ab

          SHA256

          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

          SHA512

          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

        • C:\Users\Admin\AppData\Roaming\Server.exe

          Filesize

          23KB

          MD5

          32fe01ccb93b0233503d0aaaa451f7b2

          SHA1

          58e5a63142150e8fb175dbb4dedea2ce405d7db0

          SHA256

          6988ee719a54c93a89303dcff277c62ae4890274cc45f074bc7effde315fbf43

          SHA512

          76945f23a49d594e325d80ffc0570341044ac0b97bd889c92f90bc56d3cdff5c1b29178be4f157c8c1bb9ce7cc311765309f2e6f7b08b24e7acf983ea67635a6

        • C:\Users\Admin\AppData\Roaming\conhost.exe

          Filesize

          37KB

          MD5

          b37dd1a1f0507baf993471ae1b7a314c

          SHA1

          9aff9d71492ffff8d51f8e8d67f5770755899882

          SHA256

          e58e8918a443c0061add029f8f211f6551a130202195cc2b9b529ea72553e0bc

          SHA512

          ac76d5b10540eb292341f30c7abfd81f03be65f6655c814aba6ac6a0ecf4f0f2c34c3b8e63ceef8c4579f98b7459e51b9fdd30d601c6d1930860ab7c154da460

        • memory/764-29-0x00000000000D0000-0x00000000000E0000-memory.dmp

          Filesize

          64KB

        • memory/1712-17-0x000001C077A30000-0x000001C077A70000-memory.dmp

          Filesize

          256KB

        • memory/1836-30-0x00007FFF097B0000-0x00007FFF0A19C000-memory.dmp

          Filesize

          9.9MB

        • memory/1836-11-0x0000000000790000-0x00000000007A8000-memory.dmp

          Filesize

          96KB

        • memory/1836-18-0x00007FFF097B0000-0x00007FFF0A19C000-memory.dmp

          Filesize

          9.9MB

        • memory/2944-34-0x00007FFF097B0000-0x00007FFF0A19C000-memory.dmp

          Filesize

          9.9MB

        • memory/2944-0-0x00007FFF097B3000-0x00007FFF097B4000-memory.dmp

          Filesize

          4KB

        • memory/2944-13-0x00007FFF097B0000-0x00007FFF0A19C000-memory.dmp

          Filesize

          9.9MB

        • memory/2944-1-0x0000000000CA0000-0x00000000011FC000-memory.dmp

          Filesize

          5.4MB

        • memory/4604-72-0x00000199F7270000-0x00000199F7292000-memory.dmp

          Filesize

          136KB

        • memory/4604-75-0x00000199F7550000-0x00000199F75C6000-memory.dmp

          Filesize

          472KB