Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 03:09

General

  • Target

    c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe

  • Size

    450KB

  • MD5

    0cdcfd0f2e00569e5383c30523c795a0

  • SHA1

    95f92c2c1a7b4b7feea5845869fbd677b58d3fea

  • SHA256

    c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498

  • SHA512

    8d704fbe2b970746bbc804f8a6ec712c57fe45b177316945a6be08767066de6a7761569dce6f0a0b8651fa4bd38696b918ee7b2971b86364628ba1b7cd2208ea

  • SSDEEP

    12288:bImkStbLBTfYH6eFUIKH8gZ7QIy/1FR1s5MpbNewd3wo:rJYLE80MN

Score
10/10

Malware Config

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe
    "C:\Users\Admin\AppData\Local\Temp\c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 784
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2232-0-0x00007FFF97325000-0x00007FFF97326000-memory.dmp

    Filesize

    4KB

  • memory/2232-1-0x000000001BAE0000-0x000000001BB12000-memory.dmp

    Filesize

    200KB

  • memory/2232-2-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/2232-3-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB

  • memory/2232-5-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-15-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-67-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-282-0x000000001BC70000-0x000000001BD16000-memory.dmp

    Filesize

    664KB

  • memory/2232-65-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-63-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-61-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-59-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-57-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-55-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-51-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-49-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-47-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-45-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-43-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-41-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-39-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-37-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-35-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-33-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-31-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-29-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-27-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-25-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-23-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-21-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-19-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-17-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-13-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-11-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-9-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-7-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-53-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-4-0x000000001BAE0000-0x000000001BB0A000-memory.dmp

    Filesize

    168KB

  • memory/2232-289-0x00007FFF97070000-0x00007FFF97A11000-memory.dmp

    Filesize

    9.6MB