Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-09-2024 23:20

General

  • Target

    hhhh77.exe

  • Size

    8.3MB

  • MD5

    9214afbf5645990e16a4935d4b66a2e1

  • SHA1

    ff88a1ba0e19d31f9ffbf0c5844709654d33a441

  • SHA256

    430365bd280fcc6e3a8f2912dad54c397e0c6dabd4dbf505cd95e53bdc8dc36a

  • SHA512

    21b8c7b9d28ddd745fa283cf449af7e248b7bde410217fa625a0654381247ad7012983a26b8f84d13cf610bb28180bd6e497a75368df637609d69f8f58e4ec31

  • SSDEEP

    196608:IIcwMCzK6VFMW/sd0PVVlMyELNCMgZsHcSCD:JNmyFW+Px0NIycf

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:4344

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hhhh77.exe
    "C:\Users\Admin\AppData\Local\Temp\hhhh77.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\Server_protected.sfx.exe
      "C:\Users\Admin\AppData\Local\Temp\Server_protected.sfx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Users\Admin\AppData\Local\Temp\Server_protected.exe
        "C:\Users\Admin\AppData\Local\Temp\Server_protected.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2804
    • C:\Users\Admin\AppData\Local\Temp\ngrok.exe
      "C:\Users\Admin\AppData\Local\Temp\ngrok.exe"
      2⤵
      • Executes dropped EXE
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Server_protected.exe

    Filesize

    1.1MB

    MD5

    d284ba1f09e8c41cd5cdfb0fdb6ec60a

    SHA1

    821908e7bbecc9944bb8c5c2c190c93e6ed40b42

    SHA256

    16a4198de8bdfbfbbf06ca8961d9a5735aa3dd5890d1cc38659ec329871e9b32

    SHA512

    5b7570751241b1974546cdf93d172d9aac9173c47f10ce49bcc2cedc52ab07da40303cf74cd7332ae9c5c8fa0d08344b02d00c5ba6667f67fb71bca22ce63c9c

  • \Users\Admin\AppData\Local\Temp\Server_protected.sfx.exe

    Filesize

    1.4MB

    MD5

    376851986979da63538461616c848b21

    SHA1

    0064b8eb1ae310829c80c6524e765338ff5894a8

    SHA256

    4603cbbf2c03fa34fe567f62b6a273566967c2203187c6ebc16b4c5fb71a965c

    SHA512

    d4c6b6e3a5ba49492484089c7660e7a702912e7b26d3d2c3e0f4b96ec1aa001d7f7859e7cb86ac3186d80c19bfe6ecb1cbfcba06ecf3ddb8c5388cec08dc4d3e

  • \Users\Admin\AppData\Local\Temp\ngrok.exe

    Filesize

    26.3MB

    MD5

    4135fe39c7a56d4d4e6a3a86d7ee3f77

    SHA1

    a2d7898d488b08294d659c88ed439bc5c8352d65

    SHA256

    9b18df84a96f68f8726d26bc661a86a984d8fda4e5e8c2641ad91d103d028b05

    SHA512

    b056ee468b3b6c4276be6cd185d677bedbd594a65fa1c283ddd035c5232c207a478e0a7e339bb4efaec9c0c2d86ce16547600e56bf93a4d69be4f91232361338

  • memory/1892-38-0x00000000039E0000-0x0000000003D58000-memory.dmp

    Filesize

    3.5MB

  • memory/1892-37-0x00000000039E0000-0x0000000003D58000-memory.dmp

    Filesize

    3.5MB

  • memory/2804-40-0x0000000000F70000-0x00000000012E8000-memory.dmp

    Filesize

    3.5MB

  • memory/2804-42-0x0000000000F70000-0x00000000012E8000-memory.dmp

    Filesize

    3.5MB