Analysis

  • max time kernel
    114s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 10:08

General

  • Target

    bba4c0c2a93dbc278635a42900c34c30N.exe

  • Size

    116KB

  • MD5

    bba4c0c2a93dbc278635a42900c34c30

  • SHA1

    37ac6b90978a4d9988fd44a75bbcff62f69d3b18

  • SHA256

    15084977208ec22b853fc37c4bc732eaf27edbbef387b6d99d85cf861e94042e

  • SHA512

    4a7006a8c7d518d202f755e2333d2e14f4949d5b2634be4d2aee4e62d97c258413a3cd19a1739d051b5637a931e22039e915b9663951c82462bf53d4144e5d18

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVB:P5eznsjsguGDFqGZ2rDL7

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bba4c0c2a93dbc278635a42900c34c30N.exe
    "C:\Users\Admin\AppData\Local\Temp\bba4c0c2a93dbc278635a42900c34c30N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
      "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE

    Filesize

    1KB

    MD5

    e7122c733f9e37bba0ca4c985ce11d6d

    SHA1

    d661aa5b31ff7ef2df9bc4095279058c36499af2

    SHA256

    acc9932453f5aa68f4b95986668f5584f99e55bbe02eefc0d0960dab376df81a

    SHA512

    84cddf68a46f455b4ebbb8c0c70607fe60796cfc5eabdace12d0684a1323af9681700acbdbdc37e63d7806d0220fce9cba5213bb35cee056f9d71646f98711b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C0018BB1B5834735BFA60CD063B31956

    Filesize

    1KB

    MD5

    732cfeb76b91c4d13978a00b8c666ed7

    SHA1

    0c57f76436701f4d51397d1d4e86337dd9ab1964

    SHA256

    9fab9fc0a1da813e6ddb93904c1fcfa6546cfbe70747ff8468ddd14d2552dbd2

    SHA512

    2b8618e823355a4fa646d51a753f67d34bd7b14367d46fa187f2294af7c2794c6cdee664ea570862757a5f1c99dfcb67a7d4ddf8389d07dd8d696fe55aa538bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE

    Filesize

    264B

    MD5

    380881e66c31c66bd6a677360e5dfeff

    SHA1

    0025eb53c3198cd9604a58b2d820a5ffe331707b

    SHA256

    2b58fea39cdd5809da9f962b612dc2801683a6995baf0268c3c11b4c783c5865

    SHA512

    67cd3cd4d87be11b9f77df9880e57decbec6e4758fc2927692d248788e06e946c07fd77944d8ab6955539efedb28960a190590d2dc9f395a881f17d2ce02d35b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b4fa3c7a8a315b05a794e9477e0a1f4

    SHA1

    2ecec9abe8f689f2ae0f3f8808169a558ec38497

    SHA256

    88029d3940ce44e8d9b4b302d44e31929bdbbca99edb823695413102a067ee51

    SHA512

    168811f92eb5ed711c301d1609d4859225ea342aeaebcb6ae665d1c2b954ffd0285b907cdb8f7dd477e8a1d5628ef27fc5082382931ed4784c1a81b8cb78de60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fb86aa58425542b0c76720d8432202d

    SHA1

    1f9bec53a4e4d43a21f12907335aa2db525a8074

    SHA256

    06375f9ea7058056180a8b61e175e7b1ad789588c8cd879569c04ae51eddcf70

    SHA512

    29e3ff7be44c1d77467953cef98bcddc2e2e1b37cdd1df16782b263d7d3a6b22fc1ae4c7468628e0abd4331bcbbf660de18caa1b8a94a42076534f76d59710c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85b0a4f8a03349679579db6b7a9142f1

    SHA1

    19be2094646cdcd160759a5e94bf249c1fff0150

    SHA256

    9a70210dce88501e6f0abf07c3c4d1136ac937c375b0914ea19f854752387aba

    SHA512

    d92b9c14cd0057fa1175d7b56765237bd762925bfe9ca290054a5835f209fbd4256107e9305d99310f3fc2ee1303aa82c054338b6548420107679520a1151b78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0018BB1B5834735BFA60CD063B31956

    Filesize

    252B

    MD5

    87394ec158e257174394b3d6a52c1020

    SHA1

    fd62b040d823effe29ab275d2cb4867364df3b89

    SHA256

    e53f491b321b4ad26fa2d992b1ef3a2c39d44643695dff5ab1c4945985cd0fcd

    SHA512

    002a5b4a9c1908235dad0f32b83d05edd2fe5b109369cd52dca1ce310cee22477267f73ebdf534d851ed3d3a5bb10fb7bf0e5d5c2cbf41080cf151fab8e83ab0

  • C:\Users\Admin\AppData\Local\Temp\CabB656.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB678.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\confuse\chargeable.exe

    Filesize

    116KB

    MD5

    410d3218ab8c828d446b71ea13927789

    SHA1

    713a3465665e44c528d2411157c272b292ee44a3

    SHA256

    c61c6918ea3d88f1f878f1d6297997c3553d49e05322a9867c64c57e33321e4b

    SHA512

    9928318b1772b38da7cd77e264d2176ae3dfad8564f0df36e27d08064865aeed72617e31985d61530bef5fc0429bbf200a9ad850e1dede5eab2de2c1e9e18e33

  • memory/2012-348-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2012-350-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2012-351-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2308-0-0x00000000740E1000-0x00000000740E2000-memory.dmp

    Filesize

    4KB

  • memory/2308-188-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/2308-2-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/2308-1-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/2308-170-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB