Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 21:20

General

  • Target

    47e8f52d61c1196ad37f34a79fda85c4a911eb34491e21d7ec6142f640bc3bb0.exe

  • Size

    119KB

  • MD5

    9e1147254cac7797a097dd3a21454a40

  • SHA1

    c732f4e56bb53b88615542b5811be06a6975b76f

  • SHA256

    47e8f52d61c1196ad37f34a79fda85c4a911eb34491e21d7ec6142f640bc3bb0

  • SHA512

    a0812f7f49165b2653a8c5f0f3e974ddf224b2f142e80a32b97a40f6d42efaf5f57b0231deea366071470d809aba10c48eb05bd296bb574bc9ddd8a9214cbaa6

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14Fgf:P5eznsjsguGDFqGZ2rDL14Fgf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47e8f52d61c1196ad37f34a79fda85c4a911eb34491e21d7ec6142f640bc3bb0.exe
    "C:\Users\Admin\AppData\Local\Temp\47e8f52d61c1196ad37f34a79fda85c4a911eb34491e21d7ec6142f640bc3bb0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
      "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE

    Filesize

    1KB

    MD5

    f0cf5b1794eca7cd73f9c020daab8ef2

    SHA1

    cd040b212f8cd90e629e7acefd14972b68e575ea

    SHA256

    2af00edce7ef3266897e52dc81e8de3b7a079028c0f1f96eaff9e38ad342f617

    SHA512

    55c9f22bc101c986b2e83f31e20415031fbf1fbfedd33907487de75069c43c5cfe3ba243025de6b66405925ba506f66d19d9da69af187f499143bc2da71341de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE

    Filesize

    264B

    MD5

    826ed96ced0fc0d002c502d846e53ffa

    SHA1

    ae9a74c0fe6202c7edf0bb35d8f820e8f52c0da4

    SHA256

    94cfe22508ae576504faaa9eb7db1e709d703e1cf2d7ba02264259b36f72cdae

    SHA512

    9915f4c6ce06ef77995cad50e8bdde9840152c2736ee11d10746c360303cbca45b5b83fa69a7d59dd825af666c6d0d55f78588d58610f689d20ddbe07c776598

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b26848e81c53cf499f16675d890aa8f

    SHA1

    221699f7207ba7459a16f449f48dcee9f643d715

    SHA256

    a9ee3af2582e69bd3d13de534391bd75b490ce1a3d2fcc867bc6c1b2eaba2969

    SHA512

    ab2d7bfdbecf5b433d7476e450fe7bc2ae0a557c2a6f903850c08a9474e9a9cfc970cb7da7c5933959ffdb3d2f09577e87f93013c970acf0d73fb637f1f30231

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56710f2feedee616bbcfb62fdb731f3d

    SHA1

    9941e3946b1359631b989f41e29fa52bece41584

    SHA256

    58a54197bbd1fc33c8fb1eead96bc1121cd14e074ffdd4971eca21cbaa9194b3

    SHA512

    9095c56ad997644fec4f9656ca32c37f393746cbfbb6df90546b2fa4b8274f4dacf229937b72ec56dbba12cf6333c6500d9cb4fa4c87a210f58654d0668c3de8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cee1b31a6ba2312e8aab4af8ba51ab6

    SHA1

    802c959d166cdb3ce56f7157bef76f46c33a32d5

    SHA256

    e0a07cfeb16fc2be87ac88dc379f181d5a7e090b5363b65772740d5c0d01ebd2

    SHA512

    2f0477f7bb9513ca7e844d4c8dc61c9a4b533fc19b591b82b7f62385e46ed7f17c240cd86d649d367e592db4fcb2d048737ff87452737e424c6fa62b83af200f

  • C:\Users\Admin\AppData\Local\Temp\CabC5C1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC5C4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe

    Filesize

    119KB

    MD5

    bff39b5ce9c4d56586f020fe5b2a83ac

    SHA1

    084c1edd80d1761ed449a1bcd6682219128d8dee

    SHA256

    03c4a56012c2f12eee199b0b7007dee5d6deb4cb91422a7ccd17bb951f2379b8

    SHA512

    64f65cf690e999c583c3db7c83d5b1863d7e6c4a6dfe54620e6b2bc9a523ec3a755ca39fffbb8cecdfd5ecd86cb4eba327f5f40a95a2179da342b57113713d5b

  • memory/2424-176-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2424-166-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2424-0-0x0000000074801000-0x0000000074802000-memory.dmp

    Filesize

    4KB

  • memory/2424-1-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB

  • memory/2908-342-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2908-344-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2908-345-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB