Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 03:32

General

  • Target

    307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ceN.exe

  • Size

    936KB

  • MD5

    4f66f2d3347a0466104e506a6d71f1b0

  • SHA1

    63d77b6043bfcfa477d743a30c3476997f6dcf09

  • SHA256

    307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ce

  • SHA512

    10c7a1e0477830cdcc40a385a40ef884e2bb9ab3e2d1ecebee1e9760d9615d035fc2b55d3b9c9c81b3aeddedbb1ab0c869a00d278653ca59344059feea3bc660

  • SSDEEP

    12288:9MdXQ94Gh9tkeWMsMQ3WmvekJTaS9ynMpx5hum+yw0DMdXQ94Gh9tkeWMsMQ3Wm9:af7XHuPf7XHu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

22.ip.gl.ply.gg:57731

Mutex

32ce84f74d25f1e71aac67667a2c8d24

Attributes
  • reg_key

    32ce84f74d25f1e71aac67667a2c8d24

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ceN.exe
    "C:\Users\Admin\AppData\Local\Temp\307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ceN.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\LocalfRDeAalfWC.exe
      "C:\Users\Admin\AppData\LocalfRDeAalfWC.exe"
      2⤵
      • Drops file in Drivers directory
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\java.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:60
        • C:\Windows\SysWOW64\wscript.exe
          wscript.exe "C:\Users\Admin\AppData\Roaming\invs.vbs" "C:\Users\Admin\AppData\Roaming\java2.bat
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3120
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\java2.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:544
      • C:\Windows\Temp\System.exe
        C:\Windows\Temp\System.exe
        3⤵
          PID:2268
        • C:\Windows\Temp\System.exe
          C:\Windows\Temp\System.exe
          3⤵
            PID:1944
          • C:\Windows\Temp\System.exe
            C:\Windows\Temp\System.exe
            3⤵
              PID:1092
            • C:\Windows\Temp\System.exe
              C:\Windows\Temp\System.exe
              3⤵
                PID:1484
              • C:\Program Files\VideoLAN\VLC\vlc.exe
                "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Default.mp3"
                3⤵
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:4432
              • C:\Users\Admin\AppData\Local\Temp\%tmp%.exe
                "C:\Users\Admin\AppData\Local\Temp\%tmp%.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3732
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\l_yjabx1.cmdline"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:452
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8DBA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8DB9.tmp"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2764
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1536
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                    dw20.exe -x -s 788
                    5⤵
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3276
                • C:\Users\Admin\AppData\Roaming\23526.exe
                  "C:\Users\Admin\AppData\Roaming\23526.exe"
                  4⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4100
                  • C:\ProgramData\Dllhost.exe
                    "C:\ProgramData\Dllhost.exe"
                    5⤵
                    • Drops startup file
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4296
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall add allowedprogram "C:\ProgramData\Dllhost.exe" "Dllhost.exe" ENABLE
                      6⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4524
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                  dw20.exe -x -s 1864
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4080
              • C:\Windows\SysWOW64\REG.exe
                REG add HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4004
              • C:\Windows\SysWOW64\rEG.exe
                rEG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                3⤵
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:1988

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F7F.tmp.xml

            Filesize

            4KB

            MD5

            b0a98e486aa67048f887ee8d956a6c14

            SHA1

            9577aaea50b27985e95b4835f68b52388c947cf2

            SHA256

            fd5322d27327529d59ecc618427091d401e291e771e48e6752e4a2eb1bd43fb0

            SHA512

            8e4f94b27a8653b1e784eced21ff1d98c1434d994c0ffeb8a50087152de03b650e88e5df1793ae66d2452a076645a7a985e1dcc7cfe60468b04222e8d4739bd1

          • C:\Users\Admin\AppData\Local\Temp\%tmp%.exe

            Filesize

            132KB

            MD5

            6b97067ea717e5c72685a38a15109ecc

            SHA1

            0ec286ff24307650bcd1881106980d420c646610

            SHA256

            b62c4ffb4b0622b0dc2fcf684b86863a54636c3af773e71a036c3064075eaf17

            SHA512

            80613f0da03c01d5d35dedb4617e811a7b2e72032eeedc5ccdb2b8f6c6408ec9f66ad3f9a10f6e357e4ec85c9bb8374c3d64874a5d9699e6def23cdc9748fb7d

          • C:\Users\Admin\AppData\Local\Temp\Default.mp3

            Filesize

            27KB

            MD5

            071720d5f39c31b27711d70b09ef9b3b

            SHA1

            1fe68bf69c8418454a0d91ad321b99fe9065a1db

            SHA256

            f8bc97b18db5452e5be748390037c16e606aaf0f61f0896531528d0d5fd08cc7

            SHA512

            7db5e2039e075916874b071f30aef7c29133182b9bdbc2e3cb9c2296db8a67f2cfd4e49701d85126b6b58d59bd6198f2ce6c5f4eec382209a6576c628d354014

          • C:\Users\Admin\AppData\Local\Temp\RES8DBA.tmp

            Filesize

            1KB

            MD5

            fa9fbfe490d2d97871d4e88e5d2ffc69

            SHA1

            ba4309ef50bba7ef17de4ce6e37bd491d85babe0

            SHA256

            c97bb82e6c2edbb2ad8b19dbdd6ea81cb8f5cff9bfdd632847fd0cad31be7e58

            SHA512

            0b81cccc8d398e1291c06bdaa17314160ff678e0fe0a499c167564b597056b25d5c4a6311a1075c271760b22ff288dbb398d1ad1bcdd00ba45873329fb0daf7c

          • C:\Users\Admin\AppData\Local\Temp\l_yjabx1.dll

            Filesize

            5KB

            MD5

            db9f20dce927fc33e7c1970f1d527f6e

            SHA1

            6044c52702401fefc23fb531b4a83f636769cfd0

            SHA256

            510fc3eec0d2b8da2101629b19639d6323b124d2821e2c8461849d20dbf9463a

            SHA512

            33ec19ccc9222c590df049ff1843482348a84dba8202e5a66650524e1e0af162a8c715a2b9693c20e0042c8b63ee248f6188f7e19fe145e96ef0b926dddb6595

          • C:\Users\Admin\AppData\LocalfRDeAalfWC.exe

            Filesize

            461KB

            MD5

            97ae997014319227a2a3b08033fd81df

            SHA1

            95b7acd68273a81951ed13890ac6efd746258c42

            SHA256

            ef41566edb201f685cfedd097970f9b1edb4832c2dabb6309a79f0fb34ee0402

            SHA512

            103931d8c70e3d9a3f1757b81428b7313c7cda178f3d19ffb4c1ee169e3c642156468ea8d9a4c33802bc0afc0408bc81a6d248789c023565f31b8dd7f45c0fd1

          • C:\Users\Admin\AppData\Roaming\invs.vbs

            Filesize

            78B

            MD5

            c578d9653b22800c3eb6b6a51219bbb8

            SHA1

            a97aa251901bbe179a48dbc7a0c1872e163b1f2d

            SHA256

            20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2

            SHA512

            3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

          • C:\Users\Admin\AppData\Roaming\java.bat

            Filesize

            53B

            MD5

            1896de26a454df8628034ca3e0649905

            SHA1

            76b98d95a85d043539706b89194c46cf14464abe

            SHA256

            d85e713743c7e622166fb0f79478de5eabd53d3fe92bd2011ab441bc85ef2208

            SHA512

            ef69dacd7e717dff05f8a70c5b9a94011f2df3201cc41d5f8cc030f350b069dc090c5b0d3d0bd19098a187977a82d570e1ee153849f609a65889ba789da953d2

          • C:\Users\Admin\AppData\Roaming\java2.bat

            Filesize

            160B

            MD5

            e8170b6565dfb34d114cfa398ba77296

            SHA1

            9079335b0ec9a509b7344cb98713fc0b52afa36e

            SHA256

            76ff7c88cc815c8acd61f835033baf5b92eee085e7316c7230f7c363d1e1974b

            SHA512

            1b473fe0a68642ff1741f4619f819b040f8d54696d40e74dd9ad692b56729e455bbe54cb76b382bb1fce5e1eae97dd8c99aeb762915f7147bba59d0ba60d004d

          • C:\Windows\Temp\System.exe

            Filesize

            1.1MB

            MD5

            d881de17aa8f2e2c08cbb7b265f928f9

            SHA1

            08936aebc87decf0af6e8eada191062b5e65ac2a

            SHA256

            b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

            SHA512

            5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

          • \??\c:\Users\Admin\AppData\Local\Temp\CSC8DB9.tmp

            Filesize

            652B

            MD5

            daa3a61260e23e288828141defb86ed3

            SHA1

            301402cfba1393a97a074c581a1bf96e4f3300b0

            SHA256

            6c36c2b343b73b5dd44d225f161f8cd41af748e6ca8f697a6767ad79626abbf1

            SHA512

            3923e87b4db42ea9b94921463e0d0770ab72af8a2e2d5d513f58134436fd2e2a629b2ef916cce5ac3d340b38c88669af4e62b6b49a0a902bc0e3af352921244f

          • \??\c:\Users\Admin\AppData\Local\Temp\l_yjabx1.0.cs

            Filesize

            4KB

            MD5

            b63430207638c1a36b9b27002e0da3da

            SHA1

            54356082f32c71498c4ac5f85f4588e0d1c57ad0

            SHA256

            fa125ed8e48d596788a8ad5589bc996b918de3fc27008bea888b9e1b5efa2193

            SHA512

            29ea956fb37628dac43693d5f234698510923d562ab22e53131b1919f788ed5fd3116ed501be79554e47113d795b06f5ad255c7dfee2bb9e021eb0ab14e9b737

          • \??\c:\Users\Admin\AppData\Local\Temp\l_yjabx1.cmdline

            Filesize

            206B

            MD5

            c32f3c6fa1d95b9c24ee03beedf95aa5

            SHA1

            94c03ec3c968766f348d165b279464e059ae99db

            SHA256

            977a8c824ff7558cde670571d52484e0f530844d35248ccffc9c9ea6be7206c6

            SHA512

            6560255d9ebbe184fd6ccc19afcbaae27ae19b7ac4d4018febfb8edb17ff2574b85b9089b11f99e05dc1a0b2682b1986bd2cb91eaaf9311e46e1981a096efd8c

          • memory/1188-16-0x00007FFDE99E0000-0x00007FFDEA381000-memory.dmp

            Filesize

            9.6MB

          • memory/1188-0-0x00007FFDE9C95000-0x00007FFDE9C96000-memory.dmp

            Filesize

            4KB

          • memory/1188-1-0x00007FFDE99E0000-0x00007FFDEA381000-memory.dmp

            Filesize

            9.6MB

          • memory/1188-3-0x00007FFDE99E0000-0x00007FFDEA381000-memory.dmp

            Filesize

            9.6MB

          • memory/1212-18-0x00000000749F0000-0x0000000074FA1000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-93-0x00000000749F0000-0x0000000074FA1000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-17-0x00000000749F2000-0x00000000749F3000-memory.dmp

            Filesize

            4KB

          • memory/1212-123-0x00000000749F0000-0x0000000074FA1000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-20-0x00000000749F0000-0x0000000074FA1000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-19-0x00000000749F0000-0x0000000074FA1000-memory.dmp

            Filesize

            5.7MB

          • memory/1212-92-0x00000000749F2000-0x00000000749F3000-memory.dmp

            Filesize

            4KB

          • memory/1536-89-0x0000000000410000-0x00000000004D9000-memory.dmp

            Filesize

            804KB

          • memory/1536-69-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/4432-114-0x00007FFDF88C0000-0x00007FFDF8901000-memory.dmp

            Filesize

            260KB

          • memory/4432-154-0x00007FFDE8CF0000-0x00007FFDE9DA0000-memory.dmp

            Filesize

            16.7MB

          • memory/4432-110-0x00007FFDF8B40000-0x00007FFDF8B51000-memory.dmp

            Filesize

            68KB

          • memory/4432-105-0x00007FFDE9DA0000-0x00007FFDEA056000-memory.dmp

            Filesize

            2.7MB

          • memory/4432-109-0x00007FFDF8B60000-0x00007FFDF8B77000-memory.dmp

            Filesize

            92KB

          • memory/4432-108-0x00007FFDF8B80000-0x00007FFDF8B91000-memory.dmp

            Filesize

            68KB

          • memory/4432-107-0x00007FFDF8F80000-0x00007FFDF8F97000-memory.dmp

            Filesize

            92KB

          • memory/4432-106-0x00007FFDFEFF0000-0x00007FFDFF008000-memory.dmp

            Filesize

            96KB

          • memory/4432-112-0x00007FFDF8AA0000-0x00007FFDF8AB1000-memory.dmp

            Filesize

            68KB

          • memory/4432-111-0x00007FFDF8AC0000-0x00007FFDF8ADD000-memory.dmp

            Filesize

            116KB

          • memory/4432-120-0x00007FFDF81E0000-0x00007FFDF81F1000-memory.dmp

            Filesize

            68KB

          • memory/4432-113-0x00007FFDF3FA0000-0x00007FFDF41AB000-memory.dmp

            Filesize

            2.0MB

          • memory/4432-119-0x00007FFDF8200000-0x00007FFDF8211000-memory.dmp

            Filesize

            68KB

          • memory/4432-118-0x00007FFDF8220000-0x00007FFDF8231000-memory.dmp

            Filesize

            68KB

          • memory/4432-117-0x00007FFDF8870000-0x00007FFDF8888000-memory.dmp

            Filesize

            96KB

          • memory/4432-116-0x00007FFDF8890000-0x00007FFDF88B1000-memory.dmp

            Filesize

            132KB

          • memory/4432-115-0x00007FFDE8CF0000-0x00007FFDE9DA0000-memory.dmp

            Filesize

            16.7MB

          • memory/4432-103-0x00007FF673800000-0x00007FF6738F8000-memory.dmp

            Filesize

            992KB

          • memory/4432-104-0x00007FFDF8D00000-0x00007FFDF8D34000-memory.dmp

            Filesize

            208KB