Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
5a6e0971a54847d4cecc16bf7fa44bca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a6e0971a54847d4cecc16bf7fa44bca.exe
Resource
win10v2004-20241007-en
General
-
Target
5a6e0971a54847d4cecc16bf7fa44bca.exe
-
Size
39KB
-
MD5
5a6e0971a54847d4cecc16bf7fa44bca
-
SHA1
b0b5d4f2cfe7a64addb17796ba41353c57a57f91
-
SHA256
b44b1273d8b923127c0f5279cb143abf156cda0b03d083f8424c54ec4bbb7223
-
SHA512
90362f72a78c257eba31a9bc5089d02db626a985f78d5ec8f97dadd743ef4c2b9fc434f318faea27d0e41e03cddeec94536f5bcd29a1ff77f14fe2d44a8b823e
-
SSDEEP
768:VvAl92nMe/UYPlfk4l3QYp6LxybXDIAfjP/m/NyE3NSTM8udmmBDnu:i4DzPlfk4JQm6L47BfbIyzM8udmmFu
Malware Config
Extracted
njrat
Platinum
uzbek
127.0.0.1:14026
yzbekt.exe
-
reg_key
yzbekt.exe
-
splitter
|Ghost|
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 5a6e0971a54847d4cecc16bf7fa44bca.exe -
Executes dropped EXE 1 IoCs
pid Process 4816 yzbekt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yzbekt.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\yzbekt.exe\" .." yzbekt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yzbekt.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\yzbekt.exe\" .." yzbekt.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 110 0.tcp.eu.ngrok.io 28 0.tcp.eu.ngrok.io 79 0.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe 4816 yzbekt.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe Token: 33 4816 yzbekt.exe Token: SeIncBasePriorityPrivilege 4816 yzbekt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 944 wrote to memory of 4816 944 5a6e0971a54847d4cecc16bf7fa44bca.exe 91 PID 944 wrote to memory of 4816 944 5a6e0971a54847d4cecc16bf7fa44bca.exe 91 PID 944 wrote to memory of 5016 944 5a6e0971a54847d4cecc16bf7fa44bca.exe 92 PID 944 wrote to memory of 5016 944 5a6e0971a54847d4cecc16bf7fa44bca.exe 92 PID 5016 wrote to memory of 4328 5016 cmd.exe 94 PID 5016 wrote to memory of 4328 5016 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a6e0971a54847d4cecc16bf7fa44bca.exe"C:\Users\Admin\AppData\Local\Temp\5a6e0971a54847d4cecc16bf7fa44bca.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\yzbekt.exe"C:\Users\Admin\AppData\Roaming\yzbekt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\5a6e0971a54847d4cecc16bf7fa44bca.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 53⤵PID:4328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55a6e0971a54847d4cecc16bf7fa44bca
SHA1b0b5d4f2cfe7a64addb17796ba41353c57a57f91
SHA256b44b1273d8b923127c0f5279cb143abf156cda0b03d083f8424c54ec4bbb7223
SHA51290362f72a78c257eba31a9bc5089d02db626a985f78d5ec8f97dadd743ef4c2b9fc434f318faea27d0e41e03cddeec94536f5bcd29a1ff77f14fe2d44a8b823e