Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 10:48

General

  • Target

    F2LNJ_loader.exe

  • Size

    5.4MB

  • MD5

    916f7dea6831485387d70b0891455e65

  • SHA1

    176e995cc2584d7c9703b2beee0994dcc4be91d5

  • SHA256

    c47e49026afb1d2c8708f1e36510ad862eb288c7ac48e9c4bebfbd051475fbc2

  • SHA512

    ba5c40e6416a53c88f5b5d7e0ce346956ef6bd0aebed355df8070ebb71dda78125945fe1cdca87caa29a2b5d98c437bafd228396a516c91f764256e54556f0e4

  • SSDEEP

    98304:m52dhBZTv0sGVD+Oq7j3JQ9oQSqEac8JgZSeC3FSDsa7V578kXHoujwCl1um:+sBtGVD+OoUq8+SZ1hAVpRRjw6Q

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1260642804414156891/hKfLDYiwORnJS0u7NEs9WPwqTyOYiJyHsbqndD7MezE-rhVSLHFDRhBZ_hNqb3v9ZoeE

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

147.185.221.20:49236

Mutex

6a8a3b6e5450a823d542e748a454aa4c

Attributes
  • reg_key

    6a8a3b6e5450a823d542e748a454aa4c

  • splitter

    |'|'|

Extracted

Family

xworm

Version

5.0

C2

testarosa.duckdns.org:7110

Mutex

5ZpeoOe6AtQfr6wU

Attributes
  • Install_directory

    %AppData%

  • install_file

    Ondrive.exe

aes.plain

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 4 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\F2LNJ_loader.exe
    "C:\Users\Admin\AppData\Local\Temp\F2LNJ_loader.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Roaming\Server.exe
        "C:\Users\Admin\AppData\Roaming\Server.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          "C:\Users\Admin\AppData\Local\Temp\server.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1832
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2948
      • C:\Users\Admin\AppData\Roaming\conhost.exe
        "C:\Users\Admin\AppData\Roaming\conhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\conhost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2892
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'conhost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1300
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Ondrive.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:648
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Ondrive.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:928
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Ondrive" /tr "C:\Users\Admin\AppData\Roaming\Ondrive.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1252
    • C:\Users\Admin\AppData\Local\Temp\Maple.exe
      "C:\Users\Admin\AppData\Local\Temp\Maple.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2596
    • C:\Users\Admin\AppData\Local\Temp\loader.exe
      "C:\Users\Admin\AppData\Local\Temp\loader.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Users\Admin\AppData\Local\Temp\onefile_2796_133730308971442000\loader.exe
        "C:\Users\Admin\AppData\Local\Temp\loader.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1272
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {34928337-3BFA-4718-8852-9DC88331CA4A} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Roaming\Ondrive.exe
      C:\Users\Admin\AppData\Roaming\Ondrive.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2688
    • C:\Users\Admin\AppData\Roaming\Ondrive.exe
      C:\Users\Admin\AppData\Roaming\Ondrive.exe
      2⤵
      • Executes dropped EXE
      PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Maple.exe

    Filesize

    227KB

    MD5

    550b445ad1a44d1f23f7155fae400db6

    SHA1

    cb006a53156285fdef3a0b33a4a08f534cd3bab7

    SHA256

    d223b3918e8bc3bab1d23fdc2e306be1c6587d3ab8f324fc377e37585387884e

    SHA512

    909f31f24672ffc5542ac42f344eb6020bcdfdfac9ac13d5672fe7ed22e686b06385d15709f1f83b576b1dade591ad40eb429ef076d07f4597235cd95a679fa5

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    71KB

    MD5

    f9b08bd21b40a938122b479095b7c70c

    SHA1

    eb925e3927b83c20d8d24bdab2e587c10d6ac8cd

    SHA256

    c96cde2e96021c266a202286d644ceb28543d6347e21006d72b29b8a72c505e8

    SHA512

    fcc5784936b7f85a550883c472b99b5edfa7e5c6fd3872fd806b81c2ce1f195ca34342b230a89456066885579fe55aea46d91074ac08af192fbd04ea158473ee

  • C:\Users\Admin\AppData\Local\Temp\onefile_2796_133730308971442000\loader.exe

    Filesize

    8.5MB

    MD5

    7e528c7d750373f489ed3983d28a5279

    SHA1

    805d666d7c3f98b0f2f21f8ded1ebc801bb87028

    SHA256

    7b025b56f3cec113e0569dfa37fa593f64d15c42116d321452500c03df105b8e

    SHA512

    40b4809678c6b17fcd389038464d32752058e60ed446d941698fee561641e740652bd305e2a6fe80cdd6171807fe6fbc22b99e4eaccd4c699acaca39b7328ca3

  • C:\Users\Admin\AppData\Local\Temp\onefile_2796_133730308971442000\python311.dll

    Filesize

    5.5MB

    MD5

    9a24c8c35e4ac4b1597124c1dcbebe0f

    SHA1

    f59782a4923a30118b97e01a7f8db69b92d8382a

    SHA256

    a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

    SHA512

    9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    d9d42f7d41ade2ed3deb48382f29e004

    SHA1

    a3229b3feeaa527632d0057326bfdb3caba8993e

    SHA256

    df93d0491fae83e967fc9be59fd6b8469033b306233100334997e48140d35957

    SHA512

    ff4414484457c608883fb8f06182f247f8eda1d7a87c6ecf347f05c34165d03dc44d2c7952b7671c907cd820b154344750eb846c876ba426e8cf093678cc02b1

  • C:\Users\Admin\AppData\Roaming\Server.exe

    Filesize

    23KB

    MD5

    32fe01ccb93b0233503d0aaaa451f7b2

    SHA1

    58e5a63142150e8fb175dbb4dedea2ce405d7db0

    SHA256

    6988ee719a54c93a89303dcff277c62ae4890274cc45f074bc7effde315fbf43

    SHA512

    76945f23a49d594e325d80ffc0570341044ac0b97bd889c92f90bc56d3cdff5c1b29178be4f157c8c1bb9ce7cc311765309f2e6f7b08b24e7acf983ea67635a6

  • C:\Users\Admin\AppData\Roaming\conhost.exe

    Filesize

    37KB

    MD5

    b37dd1a1f0507baf993471ae1b7a314c

    SHA1

    9aff9d71492ffff8d51f8e8d67f5770755899882

    SHA256

    e58e8918a443c0061add029f8f211f6551a130202195cc2b9b529ea72553e0bc

    SHA512

    ac76d5b10540eb292341f30c7abfd81f03be65f6655c814aba6ac6a0ecf4f0f2c34c3b8e63ceef8c4579f98b7459e51b9fdd30d601c6d1930860ab7c154da460

  • \Users\Admin\AppData\Local\Temp\loader.exe

    Filesize

    5.3MB

    MD5

    e630d72436e3dc1be7763de7f75b7adf

    SHA1

    40e07b22ab8b69e6827f90e20aeac35757899a23

    SHA256

    59818142f41895d3cadf7bee0124b392af3473060f00b9548daa3a224223993e

    SHA512

    82f0be15e2736447fae7d9a313a8a81a2c6e6ca617539ff8bf3fa0d2fe93d96e68afea6964e96e9dd671ba4090ddbc8a759c9b68f10e24a7fb847fe2c9825a83

  • memory/928-170-0x00000000023A0000-0x00000000023A8000-memory.dmp

    Filesize

    32KB

  • memory/928-164-0x000000001B3D0000-0x000000001B6B2000-memory.dmp

    Filesize

    2.9MB

  • memory/1088-178-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/1300-151-0x000000001B2E0000-0x000000001B5C2000-memory.dmp

    Filesize

    2.9MB

  • memory/1300-152-0x0000000001E70000-0x0000000001E78000-memory.dmp

    Filesize

    32KB

  • memory/1520-38-0x0000000000190000-0x00000000001A0000-memory.dmp

    Filesize

    64KB

  • memory/2492-17-0x000007FEF6500000-0x000007FEF6EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2492-29-0x000007FEF6500000-0x000007FEF6EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2492-0-0x000007FEF6503000-0x000007FEF6504000-memory.dmp

    Filesize

    4KB

  • memory/2492-1-0x00000000002A0000-0x0000000000800000-memory.dmp

    Filesize

    5.4MB

  • memory/2644-14-0x0000000000FC0000-0x0000000001000000-memory.dmp

    Filesize

    256KB

  • memory/2688-176-0x0000000000C50000-0x0000000000C60000-memory.dmp

    Filesize

    64KB

  • memory/2836-37-0x000007FEF6500000-0x000007FEF6EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-19-0x000007FEF6500000-0x000007FEF6EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2836-9-0x0000000001090000-0x00000000010A8000-memory.dmp

    Filesize

    96KB

  • memory/2892-95-0x000000001B390000-0x000000001B672000-memory.dmp

    Filesize

    2.9MB

  • memory/2892-96-0x0000000002510000-0x0000000002518000-memory.dmp

    Filesize

    32KB