Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 09:53

General

  • Target

    5b865c8778d7a63764e8b674d325692ff11476d906772442ac9d4a37d1cd2b68N.exe

  • Size

    2.1MB

  • MD5

    5a5ede5e571640b9f3445f51cc08f380

  • SHA1

    a41f146946155f2b6a399be1a8fa56317d1c6978

  • SHA256

    5b865c8778d7a63764e8b674d325692ff11476d906772442ac9d4a37d1cd2b68

  • SHA512

    df24b46813e2fbeb5d57949a6c7a0a47e49c27d88b9529a3117b2b5029b27d4930c8f48c4dd1d0403b9d01b1cfe43befdaa619e00d8db8ca72dd7e82efa5afd3

  • SSDEEP

    49152:Pkwkn9IMHeaYhh3M3i4Njx4HfXCaP3YtcpQTXOKNBY/jc+f+0wqaPCS:cdnVkhr4Njx8fPAypEYffaRPC

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b865c8778d7a63764e8b674d325692ff11476d906772442ac9d4a37d1cd2b68N.exe
    "C:\Users\Admin\AppData\Local\Temp\5b865c8778d7a63764e8b674d325692ff11476d906772442ac9d4a37d1cd2b68N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Users\Admin\AppData\Local\Temp\5660\5660.exe
      "C:\Users\Admin\AppData\Local\Temp\5660\5660.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Local\Temp\342\342.exe
        "C:\Users\Admin\AppData\Local\Temp\342\342.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Users\Admin\AppData\Roaming\superfetch.exe
          "C:\Users\Admin\AppData\Roaming\superfetch.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\superfetch.exe" "superfetch.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\342\342.exe

    Filesize

    40KB

    MD5

    be9dbd62d9f9d7f53cd7764190cde9b9

    SHA1

    7f6d669755b73c8c0be9435abe5bb9e781990c7c

    SHA256

    920140c94de8ab921b5d1bc6d3ccb7f04a6944a99a62ff7c7b19ba8b942f64a5

    SHA512

    7fce5ff25c30b78df56fc98bb450bbf9ce49ce87168f6fe44a4eb4a9cb349b5d3796a9ebb52c9b9e12a9c972d8a62b512d635f92881d41d963a5e42172354727

  • C:\Users\Admin\AppData\Local\Temp\5660\5660.exe

    Filesize

    899KB

    MD5

    1a4ebc6272e36dc43055dd6f076fe34a

    SHA1

    5f6333ec71ca8f06f7ba4d85f99314eee1915c8e

    SHA256

    6544da56d97914db734ec51cfe5b346b49b14fc8506f5fe5012b077d897ab0b1

    SHA512

    3159c00b346a8d3677ad7a2f0a5b479ba4f224bd6fe00919ea52a730db8ac9354a2786fde6103270feddbfb48cda1175cda833dd0721ea6234c71d253fc5316f

  • memory/3364-41-0x0000000072BD2000-0x0000000072BD3000-memory.dmp

    Filesize

    4KB

  • memory/3364-42-0x0000000072BD0000-0x0000000073181000-memory.dmp

    Filesize

    5.7MB

  • memory/3364-43-0x0000000072BD0000-0x0000000073181000-memory.dmp

    Filesize

    5.7MB

  • memory/3364-56-0x0000000072BD0000-0x0000000073181000-memory.dmp

    Filesize

    5.7MB