Analysis

  • max time kernel
    60s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 19:55

General

  • Target

    957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33.exe

  • Size

    103KB

  • MD5

    592b110aba23427270059a6611c09c63

  • SHA1

    acf34b3bc9598e5a858034613bcc8fa6e1cd1371

  • SHA256

    957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33

  • SHA512

    af42d963f6dacd21e8f7145406fe097771016059d18ff8d5af5fd4ff4e1c4ef97f7949e957838471c445ac20acb70d52c1e9b2562b8ba057353a4fe6be61ca38

  • SSDEEP

    1536:0Z19QBTd/LklsfI/IEFljaYQQC0OpjH7zs82eAebfYMlBE6Qmm1:UO4lsgQE/FCtjHx2eAGYMlUmu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

64f5a500033a0279ebf3a243f9f3365c

Attributes
  • reg_key

    64f5a500033a0279ebf3a243f9f3365c

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33.exe
    "C:\Users\Admin\AppData\Local\Temp\957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Users\Admin\AppData\Roaming\server.exe
      "C:\Users\Admin\AppData\Roaming\server.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Windows\SYSTEM32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\server.exe

    Filesize

    103KB

    MD5

    592b110aba23427270059a6611c09c63

    SHA1

    acf34b3bc9598e5a858034613bcc8fa6e1cd1371

    SHA256

    957655d92151bd1ef03ce89ccb67dc58aa86e6e91b0a87d64d2c0c44442cec33

    SHA512

    af42d963f6dacd21e8f7145406fe097771016059d18ff8d5af5fd4ff4e1c4ef97f7949e957838471c445ac20acb70d52c1e9b2562b8ba057353a4fe6be61ca38

  • memory/3236-3-0x0000000000E40000-0x0000000000E4C000-memory.dmp

    Filesize

    48KB

  • memory/3236-2-0x00007FFF21500000-0x00007FFF21EA1000-memory.dmp

    Filesize

    9.6MB

  • memory/3236-0-0x00007FFF217B5000-0x00007FFF217B6000-memory.dmp

    Filesize

    4KB

  • memory/3236-4-0x000000001B370000-0x000000001B416000-memory.dmp

    Filesize

    664KB

  • memory/3236-5-0x000000001B8F0000-0x000000001BDBE000-memory.dmp

    Filesize

    4.8MB

  • memory/3236-1-0x00007FFF21500000-0x00007FFF21EA1000-memory.dmp

    Filesize

    9.6MB

  • memory/3236-19-0x00007FFF21500000-0x00007FFF21EA1000-memory.dmp

    Filesize

    9.6MB

  • memory/4392-18-0x00007FFF21500000-0x00007FFF21EA1000-memory.dmp

    Filesize

    9.6MB

  • memory/4392-20-0x00007FFF21500000-0x00007FFF21EA1000-memory.dmp

    Filesize

    9.6MB

  • memory/4392-21-0x000000001C9B0000-0x000000001CA4C000-memory.dmp

    Filesize

    624KB

  • memory/4392-22-0x00000000015D0000-0x00000000015D8000-memory.dmp

    Filesize

    32KB

  • memory/4392-23-0x00007FFF21500000-0x00007FFF21EA1000-memory.dmp

    Filesize

    9.6MB

  • memory/4392-24-0x00007FFF21500000-0x00007FFF21EA1000-memory.dmp

    Filesize

    9.6MB