Analysis

  • max time kernel
    102s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 13:48

General

  • Target

    9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe

  • Size

    33KB

  • MD5

    0d052a68cf7ca01c710d4ce7ea9dfe30

  • SHA1

    52a482036a75664add6e214e0986c1303a1933eb

  • SHA256

    9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31a

  • SHA512

    f9f995da76828ebc270b5d7c6468cd59647270e0d8e46be1341691fb32abe783982464a6531384780cc22b6ffe0313e7c3141cf2be9cf8f1a6637a569a156b28

  • SSDEEP

    768:VvTnv6kk5ftm4uw4yNUHOj3t+UG78iK1KB/9dZ:tv6kk5ftjuw4y+S9nG4TgBF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe
    "C:\Users\Admin\AppData\Local\Temp\9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\patsh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\patsh"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\patsh

    Filesize

    33KB

    MD5

    0d052a68cf7ca01c710d4ce7ea9dfe30

    SHA1

    52a482036a75664add6e214e0986c1303a1933eb

    SHA256

    9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31a

    SHA512

    f9f995da76828ebc270b5d7c6468cd59647270e0d8e46be1341691fb32abe783982464a6531384780cc22b6ffe0313e7c3141cf2be9cf8f1a6637a569a156b28

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fb314389270f90e4b9f015e8dae25a32

    SHA1

    377126b780fd9b8304cd4bd5071c4b5383d69ed0

    SHA256

    de078e51d1c05d046eafb47123d182a9da54dc53af8171e6624e224fed5cbfd1

    SHA512

    e07b32d89cac747cf8cd3a13385f7df01a076cb0028fe6e4ae2208d43841c745ab4e0fb7c65fcfd71cf1ec128827f229fcc0f6b93bedbe8b51bcacfaa4700417

  • memory/2688-0-0x000007FEF5BEE000-0x000007FEF5BEF000-memory.dmp

    Filesize

    4KB

  • memory/2688-1-0x0000000000270000-0x0000000000286000-memory.dmp

    Filesize

    88KB

  • memory/2688-2-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2688-5-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

    Filesize

    9.6MB