Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2024, 18:36 UTC

General

  • Target

    Follow Bot.exe

  • Size

    262KB

  • MD5

    5004792993bebe85f15a201e52b96d82

  • SHA1

    2f9b00a5cba3c5f8763529dd145ab9d292220bce

  • SHA256

    6954f9517e8abb2fbbc90074bbbdf6aac2e28b6ea2a59b5e40b077bc287b139e

  • SHA512

    4c451c07cde5449159ec39099d3ba437f8869410b745471b2c287fccbfe4d8dd80f75102fa397afb7f45f10b07cb3427cf70e1cb74779bc67aa3c684c7ff98f0

  • SSDEEP

    6144:qNI5xXe91xOmkOHi8IvlmA4slVoWpvC9hd:jxSvavlmA4slVoWohd

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:80

Mutex

1db1ae237e6f59ba4ea496d20bffd3b9

Attributes
  • reg_key

    1db1ae237e6f59ba4ea496d20bffd3b9

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Follow Bot.exe
    "C:\Users\Admin\AppData\Local\Temp\Follow Bot.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1544
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\ProgramData\.exe
        "C:\ProgramData\.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\ProgramData\.exe" ".exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2672

Network

  • flag-us
    DNS
    discordapp.com
    1.exe
    Remote address:
    8.8.8.8:53
    Request
    discordapp.com
    IN A
    Response
    discordapp.com
    IN A
    162.159.129.233
    discordapp.com
    IN A
    162.159.135.233
    discordapp.com
    IN A
    162.159.133.233
    discordapp.com
    IN A
    162.159.130.233
    discordapp.com
    IN A
    162.159.134.233
  • flag-us
    DNS
    cookiemuncher.x10host.com
    1.exe
    Remote address:
    8.8.8.8:53
    Request
    cookiemuncher.x10host.com
    IN A
    Response
  • 162.159.129.233:443
    discordapp.com
    tls
    1.exe
    348 B
    219 B
    5
    5
  • 162.159.129.233:443
    discordapp.com
    tls
    1.exe
    348 B
    219 B
    5
    5
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 127.0.0.1:80
    .exe
  • 8.8.8.8:53
    discordapp.com
    dns
    1.exe
    60 B
    140 B
    1
    1

    DNS Request

    discordapp.com

    DNS Response

    162.159.129.233
    162.159.135.233
    162.159.133.233
    162.159.130.233
    162.159.134.233

  • 8.8.8.8:53
    cookiemuncher.x10host.com
    dns
    1.exe
    71 B
    131 B
    1
    1

    DNS Request

    cookiemuncher.x10host.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.exe

    Filesize

    174KB

    MD5

    e1fa4a0b04e72467f7925be5fabb8ca7

    SHA1

    4dd7f64452508e47767aeea1a90d933d3281ffce

    SHA256

    b0d5d9b3379612296262314461de8796da41402fbe100c0239316efda6ae9e01

    SHA512

    6651e037cef9b0748485b8177db7a63207b3e4745bcc1fd360d0b2653eb6f41ee233faebe4fb401920d7e04ffad12e9fd5e421ccdca896dd7b8e6b3cc8997b6e

  • C:\Users\Admin\AppData\Local\Temp\2.exe

    Filesize

    23KB

    MD5

    940fa0a748f3856093c3e15c2f915f05

    SHA1

    ece687288cade7d8c9d8b36ef01584ec842fa527

    SHA256

    8346c2660d86630af67650d71e51c5ebac15d0dd62b62a071f3d3ac809387e44

    SHA512

    6d10de2bb7bf42fcf37371b5846441d53447a370c05f773d788e1d23ee56c5fc688c5882a72494a021257334d79fc2d528ae64ebfb9c86cfff56fe5f162adf82

  • memory/1544-9-0x0000000001140000-0x0000000001172000-memory.dmp

    Filesize

    200KB

  • memory/1544-10-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

    Filesize

    9.9MB

  • memory/1544-11-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

    Filesize

    9.9MB

  • memory/1544-12-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

    Filesize

    9.9MB

  • memory/2336-0-0x000007FEF5873000-0x000007FEF5874000-memory.dmp

    Filesize

    4KB

  • memory/2336-1-0x0000000001090000-0x00000000010D6000-memory.dmp

    Filesize

    280KB

  • memory/2336-2-0x00000000001C0000-0x00000000001FA000-memory.dmp

    Filesize

    232KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.