Analysis

  • max time kernel
    59s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 19:55

General

  • Target

    957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33.exe

  • Size

    103KB

  • MD5

    592b110aba23427270059a6611c09c63

  • SHA1

    acf34b3bc9598e5a858034613bcc8fa6e1cd1371

  • SHA256

    957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33

  • SHA512

    af42d963f6dacd21e8f7145406fe097771016059d18ff8d5af5fd4ff4e1c4ef97f7949e957838471c445ac20acb70d52c1e9b2562b8ba057353a4fe6be61ca38

  • SSDEEP

    1536:0Z19QBTd/LklsfI/IEFljaYQQC0OpjH7zs82eAebfYMlBE6Qmm1:UO4lsgQE/FCtjHx2eAGYMlUmu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

64f5a500033a0279ebf3a243f9f3365c

Attributes
  • reg_key

    64f5a500033a0279ebf3a243f9f3365c

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33.exe
    "C:\Users\Admin\AppData\Local\Temp\957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Roaming\server.exe
      "C:\Users\Admin\AppData\Roaming\server.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\system32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\server.exe

    Filesize

    103KB

    MD5

    592b110aba23427270059a6611c09c63

    SHA1

    acf34b3bc9598e5a858034613bcc8fa6e1cd1371

    SHA256

    957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33

    SHA512

    af42d963f6dacd21e8f7145406fe097771016059d18ff8d5af5fd4ff4e1c4ef97f7949e957838471c445ac20acb70d52c1e9b2562b8ba057353a4fe6be61ca38

  • memory/2636-0-0x000007FEF429E000-0x000007FEF429F000-memory.dmp

    Filesize

    4KB

  • memory/2636-1-0x0000000000270000-0x000000000027C000-memory.dmp

    Filesize

    48KB

  • memory/2636-2-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB

  • memory/2636-3-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB

  • memory/2636-9-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB

  • memory/2684-10-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB

  • memory/2684-12-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB

  • memory/2684-11-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB

  • memory/2684-13-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB

  • memory/2684-14-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB

  • memory/2684-15-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

    Filesize

    9.6MB