Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 03:32

General

  • Target

    307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ceN.exe

  • Size

    936KB

  • MD5

    4f66f2d3347a0466104e506a6d71f1b0

  • SHA1

    63d77b6043bfcfa477d743a30c3476997f6dcf09

  • SHA256

    307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ce

  • SHA512

    10c7a1e0477830cdcc40a385a40ef884e2bb9ab3e2d1ecebee1e9760d9615d035fc2b55d3b9c9c81b3aeddedbb1ab0c869a00d278653ca59344059feea3bc660

  • SSDEEP

    12288:9MdXQ94Gh9tkeWMsMQ3WmvekJTaS9ynMpx5hum+yw0DMdXQ94Gh9tkeWMsMQ3Wm9:af7XHuPf7XHu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

22.ip.gl.ply.gg:57731

Mutex

32ce84f74d25f1e71aac67667a2c8d24

Attributes
  • reg_key

    32ce84f74d25f1e71aac67667a2c8d24

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 8 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ceN.exe
    "C:\Users\Admin\AppData\Local\Temp\307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ceN.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\LocalfRDeAalfWC.exe
      "C:\Users\Admin\AppData\LocalfRDeAalfWC.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Roaming\java.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Windows\SysWOW64\wscript.exe
          wscript.exe "C:\Users\Admin\AppData\Roaming\invs.vbs" "C:\Users\Admin\AppData\Roaming\java2.bat
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Roaming\java2.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1180
      • C:\Windows\Temp\System.exe
        C:\Windows\Temp\System.exe
        3⤵
        • Executes dropped EXE
        PID:3044
      • C:\Windows\Temp\System.exe
        C:\Windows\Temp\System.exe
        3⤵
        • Executes dropped EXE
        PID:2332
      • C:\Windows\Temp\System.exe
        C:\Windows\Temp\System.exe
        3⤵
        • Executes dropped EXE
        PID:2840
      • C:\Windows\Temp\System.exe
        C:\Windows\Temp\System.exe
        3⤵
        • Executes dropped EXE
        PID:2880
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Default.mp3"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2972
      • C:\Users\Admin\AppData\Local\Temp\%tmp%.exe
        "C:\Users\Admin\AppData\Local\Temp\%tmp%.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cxyettkl.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2512
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF191.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF190.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2408
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1184
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
            dw20.exe -x -s 404
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1856
        • C:\Users\Admin\AppData\Roaming\88590.exe
          "C:\Users\Admin\AppData\Roaming\88590.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2028
          • C:\ProgramData\Dllhost.exe
            "C:\ProgramData\Dllhost.exe"
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2892
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\ProgramData\Dllhost.exe" "Dllhost.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2008
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 1108
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          PID:2480
      • C:\Windows\SysWOW64\REG.exe
        REG add HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1324
      • C:\Windows\SysWOW64\rEG.exe
        rEG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Default.mp3

    Filesize

    27KB

    MD5

    071720d5f39c31b27711d70b09ef9b3b

    SHA1

    1fe68bf69c8418454a0d91ad321b99fe9065a1db

    SHA256

    f8bc97b18db5452e5be748390037c16e606aaf0f61f0896531528d0d5fd08cc7

    SHA512

    7db5e2039e075916874b071f30aef7c29133182b9bdbc2e3cb9c2296db8a67f2cfd4e49701d85126b6b58d59bd6198f2ce6c5f4eec382209a6576c628d354014

  • C:\Users\Admin\AppData\Local\Temp\RESF191.tmp

    Filesize

    1KB

    MD5

    0dbdd307f04c80ea0dab3cb1f2cb8853

    SHA1

    3371a811e9fafe004da12c4b5e63c5c6dd09b42c

    SHA256

    da69fc919b81b7961da1ba0dd19afa70f0e7ab8a1d44ca96aa4e49887b351c30

    SHA512

    45ce70633888b3b54216ab9c5ec6f8d63036e34ba733709af35d00083dd813dba689fd82a01d227df7ab29f0be60ecfad4b12fc77c9e6e141e87a42af1d39569

  • C:\Users\Admin\AppData\Local\Temp\cxyettkl.dll

    Filesize

    5KB

    MD5

    b11cec678c53eeb81fba231d72a07b45

    SHA1

    f3d1938b40218eea584e71f552c291ac83dd016d

    SHA256

    ec116f031b8d6e8f4f2fe81376436198a605cd53181dd697819edf5f126825e0

    SHA512

    acb3bef7a0a5b343317d11d40a2e77c589a9fca650963c7a9883968272893875d0312e5ad15019d492ad87d7913620da9b3d9683f5fab9deee96bb505093cc9a

  • C:\Users\Admin\AppData\LocalfRDeAalfWC.exe

    Filesize

    461KB

    MD5

    97ae997014319227a2a3b08033fd81df

    SHA1

    95b7acd68273a81951ed13890ac6efd746258c42

    SHA256

    ef41566edb201f685cfedd097970f9b1edb4832c2dabb6309a79f0fb34ee0402

    SHA512

    103931d8c70e3d9a3f1757b81428b7313c7cda178f3d19ffb4c1ee169e3c642156468ea8d9a4c33802bc0afc0408bc81a6d248789c023565f31b8dd7f45c0fd1

  • C:\Users\Admin\AppData\Roaming\invs.vbs

    Filesize

    78B

    MD5

    c578d9653b22800c3eb6b6a51219bbb8

    SHA1

    a97aa251901bbe179a48dbc7a0c1872e163b1f2d

    SHA256

    20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2

    SHA512

    3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

  • C:\Users\Admin\AppData\Roaming\java.bat

    Filesize

    53B

    MD5

    1896de26a454df8628034ca3e0649905

    SHA1

    76b98d95a85d043539706b89194c46cf14464abe

    SHA256

    d85e713743c7e622166fb0f79478de5eabd53d3fe92bd2011ab441bc85ef2208

    SHA512

    ef69dacd7e717dff05f8a70c5b9a94011f2df3201cc41d5f8cc030f350b069dc090c5b0d3d0bd19098a187977a82d570e1ee153849f609a65889ba789da953d2

  • C:\Users\Admin\AppData\Roaming\java2.bat

    Filesize

    160B

    MD5

    e8170b6565dfb34d114cfa398ba77296

    SHA1

    9079335b0ec9a509b7344cb98713fc0b52afa36e

    SHA256

    76ff7c88cc815c8acd61f835033baf5b92eee085e7316c7230f7c363d1e1974b

    SHA512

    1b473fe0a68642ff1741f4619f819b040f8d54696d40e74dd9ad692b56729e455bbe54cb76b382bb1fce5e1eae97dd8c99aeb762915f7147bba59d0ba60d004d

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCF190.tmp

    Filesize

    652B

    MD5

    f70e631a1a44542dfc072c473d8b4965

    SHA1

    d854536a8555234bc2637810b365125575123184

    SHA256

    5fe10afb98c6f23fca1da0f10938e8fbee443d44faa4b72814c95725913d61a6

    SHA512

    4c6bcbb10f815817b80ffdab46bbf91851ca92429de9c6114d6c836db683de38509df19938afe347fd3af7fde30ed3ec885907db7ef5a6988892e1681f7909a5

  • \??\c:\Users\Admin\AppData\Local\Temp\cxyettkl.0.cs

    Filesize

    4KB

    MD5

    b63430207638c1a36b9b27002e0da3da

    SHA1

    54356082f32c71498c4ac5f85f4588e0d1c57ad0

    SHA256

    fa125ed8e48d596788a8ad5589bc996b918de3fc27008bea888b9e1b5efa2193

    SHA512

    29ea956fb37628dac43693d5f234698510923d562ab22e53131b1919f788ed5fd3116ed501be79554e47113d795b06f5ad255c7dfee2bb9e021eb0ab14e9b737

  • \??\c:\Users\Admin\AppData\Local\Temp\cxyettkl.cmdline

    Filesize

    206B

    MD5

    c773d7ef7586d1d257d99ca28b18cf0a

    SHA1

    7e23aceefaeacbb4e01d20e07465b18109d91ff0

    SHA256

    027380b2db8ece17d9ad88b2ce7004f54f55c6be11c188aa24aa51da291a2200

    SHA512

    5030e00272d531dbff6378ed3c90fb7e689c034ae7e02505013f81165f2f1eda769287a3755ce0d5aac237ec5cf2ac72ec3fce3ca6bc7a64526b550dd7ab7d81

  • \Users\Admin\AppData\Local\Temp\%tmp%.exe

    Filesize

    132KB

    MD5

    6b97067ea717e5c72685a38a15109ecc

    SHA1

    0ec286ff24307650bcd1881106980d420c646610

    SHA256

    b62c4ffb4b0622b0dc2fcf684b86863a54636c3af773e71a036c3064075eaf17

    SHA512

    80613f0da03c01d5d35dedb4617e811a7b2e72032eeedc5ccdb2b8f6c6408ec9f66ad3f9a10f6e357e4ec85c9bb8374c3d64874a5d9699e6def23cdc9748fb7d

  • \Windows\Temp\System.exe

    Filesize

    1.1MB

    MD5

    34aa912defa18c2c129f1e09d75c1d7e

    SHA1

    9c3046324657505a30ecd9b1fdb46c05bde7d470

    SHA256

    6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

    SHA512

    d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

  • memory/372-18-0x0000000074970000-0x0000000074F1B000-memory.dmp

    Filesize

    5.7MB

  • memory/372-13-0x0000000074972000-0x0000000074974000-memory.dmp

    Filesize

    8KB

  • memory/372-152-0x0000000074970000-0x0000000074F1B000-memory.dmp

    Filesize

    5.7MB

  • memory/372-111-0x0000000074970000-0x0000000074F1B000-memory.dmp

    Filesize

    5.7MB

  • memory/372-14-0x0000000074970000-0x0000000074F1B000-memory.dmp

    Filesize

    5.7MB

  • memory/372-109-0x00000000009D0000-0x0000000000A10000-memory.dmp

    Filesize

    256KB

  • memory/372-110-0x0000000074972000-0x0000000074974000-memory.dmp

    Filesize

    8KB

  • memory/372-12-0x00000000009D0000-0x0000000000A10000-memory.dmp

    Filesize

    256KB

  • memory/1184-87-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1184-86-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1184-88-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1184-85-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1184-83-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1184-81-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1184-79-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1184-77-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2808-16-0x000007FEF5850000-0x000007FEF61ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-11-0x000007FEF5850000-0x000007FEF61ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-10-0x000007FEF5850000-0x000007FEF61ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-15-0x0000000000AC0000-0x0000000000AD0000-memory.dmp

    Filesize

    64KB

  • memory/2808-0-0x000007FEF5B0E000-0x000007FEF5B0F000-memory.dmp

    Filesize

    4KB

  • memory/2972-116-0x000007FEF66E0000-0x000007FEF66F7000-memory.dmp

    Filesize

    92KB

  • memory/2972-131-0x000007FEF49C0000-0x000007FEF49D1000-memory.dmp

    Filesize

    68KB

  • memory/2972-114-0x000007FEF5F30000-0x000007FEF61E6000-memory.dmp

    Filesize

    2.7MB

  • memory/2972-113-0x000007FEF7980000-0x000007FEF79B4000-memory.dmp

    Filesize

    208KB

  • memory/2972-117-0x000007FEF65B0000-0x000007FEF65C1000-memory.dmp

    Filesize

    68KB

  • memory/2972-118-0x000007FEF6590000-0x000007FEF65A7000-memory.dmp

    Filesize

    92KB

  • memory/2972-119-0x000007FEF6570000-0x000007FEF6581000-memory.dmp

    Filesize

    68KB

  • memory/2972-120-0x000007FEF5DE0000-0x000007FEF5DFD000-memory.dmp

    Filesize

    116KB

  • memory/2972-121-0x000007FEF5DC0000-0x000007FEF5DD1000-memory.dmp

    Filesize

    68KB

  • memory/2972-123-0x000007FEF4B00000-0x000007FEF4D0B000-memory.dmp

    Filesize

    2.0MB

  • memory/2972-122-0x000007FEF4D10000-0x000007FEF5DC0000-memory.dmp

    Filesize

    16.7MB

  • memory/2972-124-0x000007FEF4AB0000-0x000007FEF4AF1000-memory.dmp

    Filesize

    260KB

  • memory/2972-125-0x000007FEF4A80000-0x000007FEF4AA1000-memory.dmp

    Filesize

    132KB

  • memory/2972-126-0x000007FEF4A60000-0x000007FEF4A78000-memory.dmp

    Filesize

    96KB

  • memory/2972-127-0x000007FEF4A40000-0x000007FEF4A51000-memory.dmp

    Filesize

    68KB

  • memory/2972-128-0x000007FEF4A20000-0x000007FEF4A31000-memory.dmp

    Filesize

    68KB

  • memory/2972-129-0x000007FEF4A00000-0x000007FEF4A11000-memory.dmp

    Filesize

    68KB

  • memory/2972-130-0x000007FEF49E0000-0x000007FEF49FB000-memory.dmp

    Filesize

    108KB

  • memory/2972-132-0x000007FEF49A0000-0x000007FEF49B8000-memory.dmp

    Filesize

    96KB

  • memory/2972-115-0x000007FEF68C0000-0x000007FEF68D8000-memory.dmp

    Filesize

    96KB

  • memory/2972-133-0x000007FEF4970000-0x000007FEF49A0000-memory.dmp

    Filesize

    192KB

  • memory/2972-134-0x000007FEF4900000-0x000007FEF4967000-memory.dmp

    Filesize

    412KB

  • memory/2972-135-0x000007FEF4880000-0x000007FEF48FC000-memory.dmp

    Filesize

    496KB

  • memory/2972-136-0x000007FEF4860000-0x000007FEF4871000-memory.dmp

    Filesize

    68KB

  • memory/2972-137-0x000007FEF4840000-0x000007FEF4858000-memory.dmp

    Filesize

    96KB

  • memory/2972-138-0x000007FEF4820000-0x000007FEF4831000-memory.dmp

    Filesize

    68KB

  • memory/2972-139-0x000007FEF47C0000-0x000007FEF4817000-memory.dmp

    Filesize

    348KB

  • memory/2972-140-0x000007FEF4790000-0x000007FEF47BF000-memory.dmp

    Filesize

    188KB

  • memory/2972-141-0x000007FEF4770000-0x000007FEF4783000-memory.dmp

    Filesize

    76KB

  • memory/2972-142-0x000007FEF4750000-0x000007FEF4761000-memory.dmp

    Filesize

    68KB

  • memory/2972-144-0x000007FEF4240000-0x000007FEF4268000-memory.dmp

    Filesize

    160KB

  • memory/2972-143-0x000007FEF4680000-0x000007FEF4745000-memory.dmp

    Filesize

    788KB

  • memory/2972-145-0x000007FEF4210000-0x000007FEF4234000-memory.dmp

    Filesize

    144KB

  • memory/2972-146-0x000007FEFB9F0000-0x000007FEFBA00000-memory.dmp

    Filesize

    64KB

  • memory/2972-147-0x000007FEF41F0000-0x000007FEF4206000-memory.dmp

    Filesize

    88KB

  • memory/2972-148-0x000007FEF41A0000-0x000007FEF41E2000-memory.dmp

    Filesize

    264KB

  • memory/2972-149-0x000007FEF4130000-0x000007FEF4192000-memory.dmp

    Filesize

    392KB

  • memory/2972-150-0x000007FEF40C0000-0x000007FEF412D000-memory.dmp

    Filesize

    436KB

  • memory/2972-112-0x000000013F320000-0x000000013F418000-memory.dmp

    Filesize

    992KB