Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 05:01

General

  • Target

    9e21262444644ed806b67c9c21bb89e8e5579ab1ef596ad08632bf744784f2ef.exe

  • Size

    270KB

  • MD5

    92224916dece7e83fe34e50756dc866b

  • SHA1

    ce1221fd9fd4f2373d1b2a69bcff3480da35ad23

  • SHA256

    9e21262444644ed806b67c9c21bb89e8e5579ab1ef596ad08632bf744784f2ef

  • SHA512

    f7beb58ae58662eba921e3f0c82b225417f3ab2970ae58050630fd336fddc64b68350dc33ca99405157fa50711f08155dac590e1fe6cdf39b6a81fe3898424be

  • SSDEEP

    6144:apFZywoS9KT/qXAtzF5jaaFqgDfZstH1Sb:8ZdPKXjaaFqist4b

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

اختراق الواي فاي

C2

hamza102.no-ip.biz:6543

Mutex

3e4e59d01ea7e23f9eec413d2bd64504

Attributes
  • reg_key

    3e4e59d01ea7e23f9eec413d2bd64504

  • splitter

    |'|'|

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • ModiLoader Second Stage 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e21262444644ed806b67c9c21bb89e8e5579ab1ef596ad08632bf744784f2ef.exe
    "C:\Users\Admin\AppData\Local\Temp\9e21262444644ed806b67c9c21bb89e8e5579ab1ef596ad08632bf744784f2ef.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2584
    • C:\Users\Admin\AppData\Local\Temp\Wifi Password Hack 2014.exe
      "C:\Users\Admin\AppData\Local\Temp\Wifi Password Hack 2014.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Extracted\Wifi.exe
        "C:\Extracted\Wifi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          dw20.exe -x -s 384
          4⤵
            PID:2744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\sfx.ini

      Filesize

      226B

      MD5

      6a313f19181d97d006898ad025d4ef6a

      SHA1

      c090484def4c90eee1d0c974c38940c4f669d771

      SHA256

      2cfc6311c0e60140a2b804b3bf5ebe2f6eac7e56c3c7c9cab97eba1e361178a6

      SHA512

      2ed531365117e9e263ace01e8be9780bd9644e3fded528e8508172d08ead753152aff690592afc8143031a62d21537382735c9a1bce795a201873b82eda02021

    • \Extracted\Wifi.exe

      Filesize

      69KB

      MD5

      d890349dbb670a7fcd7e293f5e55b6a5

      SHA1

      288ae6a90efad5da83dfa4fd3ce0d3981e267a96

      SHA256

      fd25a7082c8623f4b2397ae4d090d1bd441fee5331b064ff002af3ec13bd77fa

      SHA512

      b68c3a89482180f1bcc6b21f66e850e90ced6308d5e5618e33a09ff818686fc4c61706d28edefa44742dedc75630a3bee7bd7075828dae72916b82e29bd976aa

    • \Users\Admin\AppData\Local\Temp\Server.exe

      Filesize

      23KB

      MD5

      2361cd0f4e2639717d64832700337e5b

      SHA1

      990a35cc7012d4b6c3eb7bb7c167e113349ab6bd

      SHA256

      43357bcafd427aaf96fdf3495bf38ba402090b7ac9b46ba13520381f5027d1ad

      SHA512

      9d55edcc78e7547aea6f15b9439b6140adac6df2b1f3f0e45333a2337a9dffc9522525b1df27e25cfd56f451d3dcd8f44f5cd84a743fefc046467e170dbf2971

    • \Users\Admin\AppData\Local\Temp\Wifi Password Hack 2014.exe

      Filesize

      217KB

      MD5

      27a51cbe1f0290b27b5e936356446b58

      SHA1

      cfc304447b7f07774ede994ccecc9db69a95b978

      SHA256

      8128299e7b54c80d097ea7ee65a47d78bc45a5ff99f98fe59195d58fd94dceed

      SHA512

      1ded2a9b56565547b0280c8ef04db474e50adf3b030bbf12df88514781fb146afc38d0e87c66756bd654c5741c4f49ddacd041828a73213abcbf938edfb64112

    • memory/2260-16-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/2388-10-0x0000000074671000-0x0000000074672000-memory.dmp

      Filesize

      4KB

    • memory/2388-45-0x0000000074670000-0x0000000074C1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2388-46-0x0000000074670000-0x0000000074C1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2388-47-0x0000000074670000-0x0000000074C1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2388-48-0x0000000074670000-0x0000000074C1B000-memory.dmp

      Filesize

      5.7MB