Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 00:19

General

  • Target

    573e4dd9ae6630d52702c4b9173b11c0N.exe

  • Size

    10KB

  • MD5

    573e4dd9ae6630d52702c4b9173b11c0

  • SHA1

    ab4b6e45d356ade72461faba5dbd5ec2a54ef7b6

  • SHA256

    084d25f64a21c6312f06a66b9bf921289df5bdc36d878ddb2202808ebcfdfc65

  • SHA512

    8c68554aedf5c9dc01f87cfc7b7f076cd912f22edacd27b888f145673e309b0ea9ad8feeccc031481b34201edbce5dc1afda9e1bd2bf12d83f04fd51885575be

  • SSDEEP

    96:bk9Ma5eRnWnmLMddMWTtGC6T1VVNCGOfBraJkR+GpwGf9EgKepZyZ6bc9kdzNt:CynqmLidtECY18fVaaRxqGf9EZSytqX

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/TheAirBlow/theairblow/blob/main/njrat.exe?raw=true

Extracted

Family

njrat

Version

im523

Botnet

school

C2

167.71.56.116:22764

Mutex

872de6721af0b6833a743205be97e089

Attributes
  • reg_key

    872de6721af0b6833a743205be97e089

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 5 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\573e4dd9ae6630d52702c4b9173b11c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\573e4dd9ae6630d52702c4b9173b11c0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • \??\c:\windows\SysWOW64\cmstp.exe
      "c:\windows\system32\cmstp.exe" /au C:\Users\Admin\AppData\Local\Temp\rundll32.inf
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3328
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start /min powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File C:\Users\Admin\AppData\Local\Temp\rundll32.ps1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3264
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -WindowStyle Hidden -File C:\Users\Admin\AppData\Local\Temp\rundll32.ps1
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Users\Admin\AppData\Roaming\njrat.exe
          "C:\Users\Admin\AppData\Roaming\njrat.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4480
          • C:\Windows\rundll32.exe
            "C:\Windows\rundll32.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops autorun.inf file
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4536
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\rundll32.exe" "rundll32.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:5032
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /IM cmstp.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_apa5tu4r.go0.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\rundll32.inf

    Filesize

    664B

    MD5

    b1fa15c3cb82b0a7684f4d3df4e2cd92

    SHA1

    130600b696381df73414f608e927fb4e7680cbfd

    SHA256

    65a54e2a08624eca8615a7e1077023e62aaf8d3a09b92dc6b84df06c7a0ba3c8

    SHA512

    d96fd7f436c52aa1d1c86e8ae624e5220cd61903a912e4536642bcb5ae4d56a6f9c6e7c75aeb68c8a32056caec72ca4924bf443b66f46180ecd37fcb93fb72a5

  • C:\Users\Admin\AppData\Local\Temp\rundll32.ps1

    Filesize

    290B

    MD5

    50e4cc9aad9954bcdc2b458fdebb0f63

    SHA1

    f01c7b76d4deaef3e247a4d9d74d70b563fac36b

    SHA256

    2b989b19becc028c4b54f1ee5b526ccc395c09d4666e6990fe0b55e1d7ff9fb1

    SHA512

    9a875e81691e2d3202acc2b0c51042fd1fbf1e441e07fe7656cd3458212f80c89444f975d1a9e94454e0c033a5afe22f366e6a64f0d97a2874bfee7c831af9a8

  • C:\Users\Admin\AppData\Roaming\njrat.exe

    Filesize

    37KB

    MD5

    4699bec8cd50aa7f2cecf0df8f0c26a0

    SHA1

    c7c6c85fc26189cf4c68d45b5f8009a7a456497d

    SHA256

    d6471589756f94a0908a7ec9f0e0e98149882ce6c1cf3da9852dc88fcc3d513d

    SHA512

    5701a107e8af1c89574274c8b585ddd87ae88332284fc18090bbcccf5d11b65486ccf70450d4451fec7c75474a62518dd3c5e2bedda98487085276ac51d7ac0e

  • memory/1928-6-0x0000000075140000-0x00000000758F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1928-7-0x0000000075140000-0x00000000758F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1928-8-0x0000000005570000-0x0000000005602000-memory.dmp

    Filesize

    584KB

  • memory/1928-9-0x0000000005560000-0x000000000556A000-memory.dmp

    Filesize

    40KB

  • memory/1928-53-0x0000000075140000-0x00000000758F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1928-3-0x0000000005920000-0x0000000005EC4000-memory.dmp

    Filesize

    5.6MB

  • memory/1928-33-0x0000000075140000-0x00000000758F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1928-32-0x000000007514E000-0x000000007514F000-memory.dmp

    Filesize

    4KB

  • memory/1928-0-0x000000007514E000-0x000000007514F000-memory.dmp

    Filesize

    4KB

  • memory/1928-1-0x00000000009E0000-0x00000000009E8000-memory.dmp

    Filesize

    32KB

  • memory/2236-16-0x0000000006110000-0x0000000006176000-memory.dmp

    Filesize

    408KB

  • memory/2236-27-0x0000000006770000-0x000000000678E000-memory.dmp

    Filesize

    120KB

  • memory/2236-28-0x0000000006800000-0x000000000684C000-memory.dmp

    Filesize

    304KB

  • memory/2236-26-0x0000000006180000-0x00000000064D4000-memory.dmp

    Filesize

    3.3MB

  • memory/2236-30-0x00000000080B0000-0x000000000872A000-memory.dmp

    Filesize

    6.5MB

  • memory/2236-31-0x0000000006C80000-0x0000000006C9A000-memory.dmp

    Filesize

    104KB

  • memory/2236-14-0x0000000005850000-0x0000000005872000-memory.dmp

    Filesize

    136KB

  • memory/2236-15-0x00000000058F0000-0x0000000005956000-memory.dmp

    Filesize

    408KB

  • memory/2236-35-0x0000000007C10000-0x0000000007CA6000-memory.dmp

    Filesize

    600KB

  • memory/2236-36-0x0000000007BA0000-0x0000000007BC2000-memory.dmp

    Filesize

    136KB

  • memory/2236-13-0x0000000005A70000-0x0000000006098000-memory.dmp

    Filesize

    6.2MB

  • memory/2236-12-0x0000000005370000-0x00000000053A6000-memory.dmp

    Filesize

    216KB