Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/09/2024, 18:36 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Follow Bot.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Follow Bot.exe
Resource
win10v2004-20240802-en
General
-
Target
Follow Bot.exe
-
Size
262KB
-
MD5
5004792993bebe85f15a201e52b96d82
-
SHA1
2f9b00a5cba3c5f8763529dd145ab9d292220bce
-
SHA256
6954f9517e8abb2fbbc90074bbbdf6aac2e28b6ea2a59b5e40b077bc287b139e
-
SHA512
4c451c07cde5449159ec39099d3ba437f8869410b745471b2c287fccbfe4d8dd80f75102fa397afb7f45f10b07cb3427cf70e1cb74779bc67aa3c684c7ff98f0
-
SSDEEP
6144:qNI5xXe91xOmkOHi8IvlmA4slVoWpvC9hd:jxSvavlmA4slVoWohd
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:80
1db1ae237e6f59ba4ea496d20bffd3b9
-
reg_key
1db1ae237e6f59ba4ea496d20bffd3b9
-
splitter
|'|'|
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2672 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1db1ae237e6f59ba4ea496d20bffd3b9.exe .exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1db1ae237e6f59ba4ea496d20bffd3b9.exe .exe -
Executes dropped EXE 3 IoCs
pid Process 1544 1.exe 2740 2.exe 2652 .exe -
Loads dropped DLL 1 IoCs
pid Process 2740 2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\1db1ae237e6f59ba4ea496d20bffd3b9 = "\"C:\\ProgramData\\.exe\" .." .exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1db1ae237e6f59ba4ea496d20bffd3b9 = "\"C:\\ProgramData\\.exe\" .." .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language .exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 1544 1.exe Token: SeDebugPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe Token: 33 2652 .exe Token: SeIncBasePriorityPrivilege 2652 .exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1544 2336 Follow Bot.exe 31 PID 2336 wrote to memory of 1544 2336 Follow Bot.exe 31 PID 2336 wrote to memory of 1544 2336 Follow Bot.exe 31 PID 2336 wrote to memory of 2740 2336 Follow Bot.exe 32 PID 2336 wrote to memory of 2740 2336 Follow Bot.exe 32 PID 2336 wrote to memory of 2740 2336 Follow Bot.exe 32 PID 2336 wrote to memory of 2740 2336 Follow Bot.exe 32 PID 2740 wrote to memory of 2652 2740 2.exe 33 PID 2740 wrote to memory of 2652 2740 2.exe 33 PID 2740 wrote to memory of 2652 2740 2.exe 33 PID 2740 wrote to memory of 2652 2740 2.exe 33 PID 2652 wrote to memory of 2672 2652 .exe 34 PID 2652 wrote to memory of 2672 2652 .exe 34 PID 2652 wrote to memory of 2672 2652 .exe 34 PID 2652 wrote to memory of 2672 2652 .exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Follow Bot.exe"C:\Users\Admin\AppData\Local\Temp\Follow Bot.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\ProgramData\.exe"C:\ProgramData\.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\.exe" ".exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
Network
-
Remote address:8.8.8.8:53Requestdiscordapp.comIN AResponsediscordapp.comIN A162.159.129.233discordapp.comIN A162.159.135.233discordapp.comIN A162.159.133.233discordapp.comIN A162.159.130.233discordapp.comIN A162.159.134.233
-
Remote address:8.8.8.8:53Requestcookiemuncher.x10host.comIN AResponse
-
348 B 219 B 5 5
-
348 B 219 B 5 5
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5e1fa4a0b04e72467f7925be5fabb8ca7
SHA14dd7f64452508e47767aeea1a90d933d3281ffce
SHA256b0d5d9b3379612296262314461de8796da41402fbe100c0239316efda6ae9e01
SHA5126651e037cef9b0748485b8177db7a63207b3e4745bcc1fd360d0b2653eb6f41ee233faebe4fb401920d7e04ffad12e9fd5e421ccdca896dd7b8e6b3cc8997b6e
-
Filesize
23KB
MD5940fa0a748f3856093c3e15c2f915f05
SHA1ece687288cade7d8c9d8b36ef01584ec842fa527
SHA2568346c2660d86630af67650d71e51c5ebac15d0dd62b62a071f3d3ac809387e44
SHA5126d10de2bb7bf42fcf37371b5846441d53447a370c05f773d788e1d23ee56c5fc688c5882a72494a021257334d79fc2d528ae64ebfb9c86cfff56fe5f162adf82