Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 13:48

General

  • Target

    9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe

  • Size

    33KB

  • MD5

    0d052a68cf7ca01c710d4ce7ea9dfe30

  • SHA1

    52a482036a75664add6e214e0986c1303a1933eb

  • SHA256

    9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31a

  • SHA512

    f9f995da76828ebc270b5d7c6468cd59647270e0d8e46be1341691fb32abe783982464a6531384780cc22b6ffe0313e7c3141cf2be9cf8f1a6637a569a156b28

  • SSDEEP

    768:VvTnv6kk5ftm4uw4yNUHOj3t+UG78iK1KB/9dZ:tv6kk5ftjuw4y+S9nG4TgBF

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe
    "C:\Users\Admin\AppData\Local\Temp\9211a20e3c4a6f6fdbdaf69035686349ab47989585bbc9e36b7aa304c805a31aN.exe"
    1⤵
    • Modifies registry class
    PID:2636
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2636-0-0x00007FFFF9115000-0x00007FFFF9116000-memory.dmp

    Filesize

    4KB

  • memory/2636-2-0x000000001B470000-0x000000001B93E000-memory.dmp

    Filesize

    4.8MB

  • memory/2636-1-0x00007FFFF8E60000-0x00007FFFF9801000-memory.dmp

    Filesize

    9.6MB

  • memory/2636-3-0x000000001AF90000-0x000000001AFA6000-memory.dmp

    Filesize

    88KB

  • memory/2636-4-0x000000001BA60000-0x000000001BB06000-memory.dmp

    Filesize

    664KB

  • memory/2636-5-0x00007FFFF8E60000-0x00007FFFF9801000-memory.dmp

    Filesize

    9.6MB

  • memory/2636-9-0x00007FFFF8E60000-0x00007FFFF9801000-memory.dmp

    Filesize

    9.6MB