Analysis

  • max time kernel
    1800s
  • max time network
    1800s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 16:58

General

  • Target

    Payload.exe

  • Size

    27KB

  • MD5

    bdf3331ec3d5b67d4a746773620c3d0a

  • SHA1

    be97cd7753b2758bc0503697ed51efaab67174b6

  • SHA256

    eb4915daeeadd59534ef61affc71891a0ba7cba989a1b72d5ad4c8065e0adb39

  • SHA512

    7bced8fd2557f950086553f06314c988ef6c4e17ff841e0b5c5161cb8bfda01db44c3fcf19e79e5453a8fb0456a39157cf8a9cb16aaeef5dc87cc863ecf41120

  • SSDEEP

    384:lLEF5aMG4AvkF0jc49+PUimiM5AQk93vmhm7UMKmIEecKdbXTzm9bVhca96mr6eW:lkUZua35A/vMHTi9bD

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

Windows

C2

language-sublime.gl.at.ply.gg:8080

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payload.exe
    "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\Payload.exe
      "C:\Windows\Payload.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2260
    • C:\Windows\SysWOW64\attrib.exe
      attrib +h +r +s "C:\Windows\Payload.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Views/modifies file attributes
      PID:804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk

    Filesize

    1KB

    MD5

    5861d3be1857f569d8dc6c2ac5172074

    SHA1

    e99e662dc2ed242045be4ef370c98a45c053f924

    SHA256

    b77d0a1a82c0c4a56721150d04047bc0de1bbe4b83c2fee8f391675f3f51da01

    SHA512

    941cd20c6eeba1769ce48caa7d55cd6c6e9cd50a80a074504aff1a37b9d6fde0ca201710ed0df2fd9f8767cd4fcd1865b665951a83b2c9ce2625be4faaeda34a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk

    Filesize

    1022B

    MD5

    964c42227e4e47c5219a780f3c3b02c6

    SHA1

    b5f5e3f97dac8afd23f2ca8fb20a2a7d1997ea94

    SHA256

    16b753b988f1462a1906769eb40d090fa0b93d567c1bc00ced466c15015edfc5

    SHA512

    83bdd464e0e9f8b59ff0084c55d2ab863658e5e0aade69b376f5814404e0141a0eb2725329efbf6da0a6a432611a6733318e7ffe627263c311cfe933106453f2

  • C:\Windows\Payload.exe

    Filesize

    27KB

    MD5

    bdf3331ec3d5b67d4a746773620c3d0a

    SHA1

    be97cd7753b2758bc0503697ed51efaab67174b6

    SHA256

    eb4915daeeadd59534ef61affc71891a0ba7cba989a1b72d5ad4c8065e0adb39

    SHA512

    7bced8fd2557f950086553f06314c988ef6c4e17ff841e0b5c5161cb8bfda01db44c3fcf19e79e5453a8fb0456a39157cf8a9cb16aaeef5dc87cc863ecf41120

  • memory/2260-12-0x0000000074ED0000-0x000000007547B000-memory.dmp

    Filesize

    5.7MB

  • memory/2260-14-0x0000000074ED0000-0x000000007547B000-memory.dmp

    Filesize

    5.7MB

  • memory/2260-19-0x0000000074ED0000-0x000000007547B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-0-0x0000000074ED1000-0x0000000074ED2000-memory.dmp

    Filesize

    4KB

  • memory/2520-1-0x0000000074ED0000-0x000000007547B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-2-0x0000000074ED0000-0x000000007547B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-5-0x0000000074ED0000-0x000000007547B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-13-0x0000000074ED0000-0x000000007547B000-memory.dmp

    Filesize

    5.7MB