Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 13:23

General

  • Target

    4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N.exe

  • Size

    543KB

  • MD5

    e0645a7fcb592dab2658f800888693a0

  • SHA1

    123bedbc6e4af12908f4ef59fca1ad1af262ffb9

  • SHA256

    4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2

  • SHA512

    62b5c98141db209a8f4f7c88be22893c85c8d23d838d1f65dcd9d3284b19bba737e75ab5e1fc41aab813f7348799d6d4ec5f5a5f49b1153328f5c3bfc93bcca0

  • SSDEEP

    12288:yVQIBRKed0Oa7JHveGg3bdd54VBwKEjA+8e5OXhOSJDVLlwHzz3k9Lac:yhBRKedW7JHveGg3bdv4VBwKEjJ8e5O/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

22.ip.gl.ply.gg:57731

Mutex

32ce84f74d25f1e71aac67667a2c8d24

Attributes
  • reg_key

    32ce84f74d25f1e71aac67667a2c8d24

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\java.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5004
      • C:\Windows\SysWOW64\wscript.exe
        wscript.exe "C:\Users\Admin\AppData\Roaming\invs.vbs" "C:\Users\Admin\AppData\Roaming\java2.bat
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\java2.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:852
    • C:\Windows\Temp\System.exe
      C:\Windows\Temp\System.exe
      2⤵
        PID:996
      • C:\Windows\Temp\System.exe
        C:\Windows\Temp\System.exe
        2⤵
          PID:1936
        • C:\Windows\Temp\System.exe
          C:\Windows\Temp\System.exe
          2⤵
            PID:2008
          • C:\Windows\Temp\System.exe
            C:\Windows\Temp\System.exe
            2⤵
              PID:2980
            • C:\Program Files\VideoLAN\VLC\vlc.exe
              "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Default.mp3"
              2⤵
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:2596
            • C:\Users\Admin\AppData\Local\Temp\%tmp%.exe
              "C:\Users\Admin\AppData\Local\Temp\%tmp%.exe"
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2496
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qxijfxps.cmdline"
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2240
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCE9B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCE9A.tmp"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2440
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4612
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                  dw20.exe -x -s 788
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3860
              • C:\Users\Admin\AppData\Roaming\77817.exe
                "C:\Users\Admin\AppData\Roaming\77817.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2904
                • C:\ProgramData\Dllhost.exe
                  "C:\ProgramData\Dllhost.exe"
                  4⤵
                  • Drops startup file
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4340
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall add allowedprogram "C:\ProgramData\Dllhost.exe" "Dllhost.exe" ENABLE
                    5⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2336
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                dw20.exe -x -s 1856
                3⤵
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:3084
            • C:\Windows\SysWOW64\REG.exe
              REG add HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1068
            • C:\Windows\SysWOW64\rEG.exe
              rEG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
              2⤵
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:1312

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\Windows\WER\Temp\WERD032.tmp.xml

            Filesize

            4KB

            MD5

            a2bd41d1add1e2c5857968466a0caf18

            SHA1

            a94b8812436801a3e4d6f414c5c015912702a300

            SHA256

            738a7601726e048c163b385099c3df29b9b53d19ef71ad2c0c29e2c2dd96f178

            SHA512

            3388fbeb5b94bdc2f7fb0f225c3ba787ab5eb3f65094dfd34ce47014bf508ef13d3ce127c640ef6fa73da78924e94d47f1816c17746b1f3448fcda7b1fd3025b

          • C:\Users\Admin\AppData\Local\Temp\%tmp%.exe

            Filesize

            132KB

            MD5

            6b97067ea717e5c72685a38a15109ecc

            SHA1

            0ec286ff24307650bcd1881106980d420c646610

            SHA256

            b62c4ffb4b0622b0dc2fcf684b86863a54636c3af773e71a036c3064075eaf17

            SHA512

            80613f0da03c01d5d35dedb4617e811a7b2e72032eeedc5ccdb2b8f6c6408ec9f66ad3f9a10f6e357e4ec85c9bb8374c3d64874a5d9699e6def23cdc9748fb7d

          • C:\Users\Admin\AppData\Local\Temp\Default.mp3

            Filesize

            27KB

            MD5

            071720d5f39c31b27711d70b09ef9b3b

            SHA1

            1fe68bf69c8418454a0d91ad321b99fe9065a1db

            SHA256

            f8bc97b18db5452e5be748390037c16e606aaf0f61f0896531528d0d5fd08cc7

            SHA512

            7db5e2039e075916874b071f30aef7c29133182b9bdbc2e3cb9c2296db8a67f2cfd4e49701d85126b6b58d59bd6198f2ce6c5f4eec382209a6576c628d354014

          • C:\Users\Admin\AppData\Local\Temp\RESCE9B.tmp

            Filesize

            1KB

            MD5

            e29b94ea23b64c7897c4542daaef2cab

            SHA1

            82bd20ef4c99181539350d2db332717f34765071

            SHA256

            1607cf4b9f4620f9150da5eb037f95cf87f3ad0f6de7e5dc1054ef9060d994e3

            SHA512

            0b4780666fd1ab7f9e62d5879245212d2325f37c023abbc243cfa1e3a57dfe12b262d5e1c3240e2d2389d3ebe5166fa865a0c5aed20557d7bf789f9881a62eb1

          • C:\Users\Admin\AppData\Local\Temp\qxijfxps.dll

            Filesize

            5KB

            MD5

            2d343dca9cb1480f2d83f69579176190

            SHA1

            4e2d75ab6c12e3b5da4983799679f560b7e7c5b3

            SHA256

            126b30ef504a56a83da0487ef0fe8152a1d79977ecbf741e41863bb66f1d76c2

            SHA512

            5a6694d7ff12b91f846b0b330153b11482305f545444261cbebe346c43070e25df7100333ebbc86fb0619b3b15a1a10117eafb11700853c27616582dec1f55aa

          • C:\Users\Admin\AppData\Roaming\invs.vbs

            Filesize

            78B

            MD5

            c578d9653b22800c3eb6b6a51219bbb8

            SHA1

            a97aa251901bbe179a48dbc7a0c1872e163b1f2d

            SHA256

            20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2

            SHA512

            3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

          • C:\Users\Admin\AppData\Roaming\java.bat

            Filesize

            53B

            MD5

            1896de26a454df8628034ca3e0649905

            SHA1

            76b98d95a85d043539706b89194c46cf14464abe

            SHA256

            d85e713743c7e622166fb0f79478de5eabd53d3fe92bd2011ab441bc85ef2208

            SHA512

            ef69dacd7e717dff05f8a70c5b9a94011f2df3201cc41d5f8cc030f350b069dc090c5b0d3d0bd19098a187977a82d570e1ee153849f609a65889ba789da953d2

          • C:\Users\Admin\AppData\Roaming\java2.bat

            Filesize

            160B

            MD5

            e8170b6565dfb34d114cfa398ba77296

            SHA1

            9079335b0ec9a509b7344cb98713fc0b52afa36e

            SHA256

            76ff7c88cc815c8acd61f835033baf5b92eee085e7316c7230f7c363d1e1974b

            SHA512

            1b473fe0a68642ff1741f4619f819b040f8d54696d40e74dd9ad692b56729e455bbe54cb76b382bb1fce5e1eae97dd8c99aeb762915f7147bba59d0ba60d004d

          • C:\Windows\Temp\System.exe

            Filesize

            1.1MB

            MD5

            d881de17aa8f2e2c08cbb7b265f928f9

            SHA1

            08936aebc87decf0af6e8eada191062b5e65ac2a

            SHA256

            b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

            SHA512

            5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCCE9A.tmp

            Filesize

            652B

            MD5

            ecb27c8b39b4e0e254727e0031e46930

            SHA1

            0279eebb9ddbc64d9b720efcc28f97461e54779b

            SHA256

            b4bf07135044bebe78ace5a68ba1a0762e02c6dcb22f69ff8374a0dbc7415b00

            SHA512

            1831790dbf6cc41c4cc7eab50932aff4277f2e42e917ab5a3ccecf7450f6dd6e520d15c4c1466f3918101953a4d47310b56be3589b61937df4569568d9786ae1

          • \??\c:\Users\Admin\AppData\Local\Temp\qxijfxps.0.cs

            Filesize

            4KB

            MD5

            b63430207638c1a36b9b27002e0da3da

            SHA1

            54356082f32c71498c4ac5f85f4588e0d1c57ad0

            SHA256

            fa125ed8e48d596788a8ad5589bc996b918de3fc27008bea888b9e1b5efa2193

            SHA512

            29ea956fb37628dac43693d5f234698510923d562ab22e53131b1919f788ed5fd3116ed501be79554e47113d795b06f5ad255c7dfee2bb9e021eb0ab14e9b737

          • \??\c:\Users\Admin\AppData\Local\Temp\qxijfxps.cmdline

            Filesize

            206B

            MD5

            7289a4f1542bb638af6d944d9043a140

            SHA1

            5282d95a51c8b0799373ad2dd1e995ea2f7d0fd9

            SHA256

            7c39adfaa1928144c27084af87044dd9be861f342f4c191f7be192386a743a56

            SHA512

            363ed543347743ee7526abc1fecea775bb561a81809ba6c9aa91c2bca7da8d14ecb4a5d712c50f1dfec20aa7f80f06bc3f52c68def841cfef451a83aef663647

          • memory/2296-81-0x0000000075070000-0x0000000075621000-memory.dmp

            Filesize

            5.7MB

          • memory/2296-3-0x0000000075070000-0x0000000075621000-memory.dmp

            Filesize

            5.7MB

          • memory/2296-2-0x0000000075070000-0x0000000075621000-memory.dmp

            Filesize

            5.7MB

          • memory/2296-111-0x0000000075070000-0x0000000075621000-memory.dmp

            Filesize

            5.7MB

          • memory/2296-1-0x0000000075070000-0x0000000075621000-memory.dmp

            Filesize

            5.7MB

          • memory/2296-80-0x0000000075072000-0x0000000075073000-memory.dmp

            Filesize

            4KB

          • memory/2296-0-0x0000000075072000-0x0000000075073000-memory.dmp

            Filesize

            4KB

          • memory/2596-96-0x00007FFE5DB80000-0x00007FFE5DB91000-memory.dmp

            Filesize

            68KB

          • memory/2596-93-0x00007FFE4F1E0000-0x00007FFE4F496000-memory.dmp

            Filesize

            2.7MB

          • memory/2596-100-0x00007FFE5A520000-0x00007FFE5A531000-memory.dmp

            Filesize

            68KB

          • memory/2596-99-0x00007FFE5AD60000-0x00007FFE5AD7D000-memory.dmp

            Filesize

            116KB

          • memory/2596-98-0x00007FFE5C260000-0x00007FFE5C271000-memory.dmp

            Filesize

            68KB

          • memory/2596-97-0x00007FFE5D9D0000-0x00007FFE5D9E7000-memory.dmp

            Filesize

            92KB

          • memory/2596-92-0x00007FFE5E5B0000-0x00007FFE5E5E4000-memory.dmp

            Filesize

            208KB

          • memory/2596-95-0x00007FFE5E730000-0x00007FFE5E747000-memory.dmp

            Filesize

            92KB

          • memory/2596-94-0x00007FFE5F580000-0x00007FFE5F598000-memory.dmp

            Filesize

            96KB

          • memory/2596-91-0x00007FF6A6050000-0x00007FF6A6148000-memory.dmp

            Filesize

            992KB

          • memory/2596-101-0x00007FFE4EDE0000-0x00007FFE4EFEB000-memory.dmp

            Filesize

            2.0MB

          • memory/2596-108-0x00007FFE4FB80000-0x00007FFE4FB91000-memory.dmp

            Filesize

            68KB

          • memory/2596-107-0x00007FFE54FE0000-0x00007FFE54FF1000-memory.dmp

            Filesize

            68KB

          • memory/2596-106-0x00007FFE55690000-0x00007FFE556A1000-memory.dmp

            Filesize

            68KB

          • memory/2596-105-0x00007FFE59DF0000-0x00007FFE59E08000-memory.dmp

            Filesize

            96KB

          • memory/2596-104-0x00007FFE56910000-0x00007FFE56931000-memory.dmp

            Filesize

            132KB

          • memory/2596-103-0x00007FFE556B0000-0x00007FFE556F1000-memory.dmp

            Filesize

            260KB

          • memory/2596-102-0x00007FFE4DD30000-0x00007FFE4EDE0000-memory.dmp

            Filesize

            16.7MB

          • memory/2596-141-0x00007FFE4DD30000-0x00007FFE4EDE0000-memory.dmp

            Filesize

            16.7MB

          • memory/4612-52-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB