Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 12:51
Behavioral task
behavioral1
Sample
e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe
Resource
win10v2004-20241007-en
General
-
Target
e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe
-
Size
9.2MB
-
MD5
b6abda2d4b24cef28f9c2b62731fcfd0
-
SHA1
fdf3ae0bec83c2ec7d4e2883fc770e553b782a3d
-
SHA256
e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252b
-
SHA512
7e0f0835f7ce0d5fddfcd785ece05aff91f87fd6b95fce1b73c3464102af644a8e500338f5f1e75c648ee2b666089ab19350932a990f3cb9b2009bbcbfd721c2
-
SSDEEP
196608:z6/u1LqqyReuuQt8k9BAXbdV9qWLk/YrNcONQl4Ik+B8I4GA81G+LNaK:z6/58EBOXQ/YrN+l4IY5G19a
Malware Config
Signatures
-
Njrat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2636 netsh.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe -
Executes dropped EXE 2 IoCs
pid Process 3760 Server.exe 4088 putty.exe -
Loads dropped DLL 6 IoCs
pid Process 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe -
resource yara_rule behavioral2/memory/1504-0-0x0000000000400000-0x0000000000864000-memory.dmp themida behavioral2/memory/3800-31-0x0000000000400000-0x0000000000864000-memory.dmp themida behavioral2/memory/1504-38-0x0000000000400000-0x0000000000864000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a2ec5145b93042ab3a5df4adfdeafac3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\a2ec5145b93042ab3a5df4adfdeafac3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Server.exe\" .." Server.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 3476 cmd.exe 4956 cmd.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CID\{54003800-6500-2B00-5600-4E0035007400} Server.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CID Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CID\{54003800-6500-2B00-5600-4E0035007400}\1 = "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" Server.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CID\{53006200-6C00-5300-7300-770033007900} Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CID\{53006200-6C00-5300-7300-770033007900}\1 = "kIgRbOGHn30ael8Qv+NqnKC5K5x2d90/3mSj0EgNzDwId+m2s5DdHVFe6yNGR+9093hzvxIsOFIFAzd764z+l8s17ko9LPdgxjOLKHCXwWFSO3c9HPdQGqH2Ud9RddrBJwcO1me6oQvVIOtjRP+HG7smsvUp/97G3O/zjkJdmebfbuv4jjNPx2rZrXTe9a0i" Server.exe -
NTFS ADS 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp:{53006200-6C00-5300-7300-770033007900} Server.exe File created C:\Users\Admin\Documents\My Music:{53006200-6C00-5300-7300-770033007900} Server.exe File created C:\PerfLogs:{53006200-6C00-5300-7300-770033007900} Server.exe File created C:\Users\Admin\AppData\Local\Temp:{54003800-6500-2B00-5600-4E0035007400} Server.exe File created C:\Users\Admin\Documents\My Music:{54003800-6500-2B00-5600-4E0035007400} Server.exe File created C:\PerfLogs:{54003800-6500-2B00-5600-4E0035007400} Server.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: 35 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe Token: SeDebugPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe Token: 33 3760 Server.exe Token: SeIncBasePriorityPrivilege 3760 Server.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1504 wrote to memory of 3800 1504 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 82 PID 1504 wrote to memory of 3800 1504 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 82 PID 1504 wrote to memory of 3800 1504 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 82 PID 3800 wrote to memory of 3476 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 83 PID 3800 wrote to memory of 3476 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 83 PID 3800 wrote to memory of 3476 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 83 PID 3800 wrote to memory of 4956 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 84 PID 3800 wrote to memory of 4956 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 84 PID 3800 wrote to memory of 4956 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 84 PID 3800 wrote to memory of 3060 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 85 PID 3800 wrote to memory of 3060 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 85 PID 3800 wrote to memory of 3060 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 85 PID 3800 wrote to memory of 4020 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 86 PID 3800 wrote to memory of 4020 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 86 PID 3800 wrote to memory of 4020 3800 e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe 86 PID 3476 wrote to memory of 3756 3476 cmd.exe 91 PID 3476 wrote to memory of 3756 3476 cmd.exe 91 PID 3476 wrote to memory of 3756 3476 cmd.exe 91 PID 3060 wrote to memory of 3760 3060 cmd.exe 92 PID 3060 wrote to memory of 3760 3060 cmd.exe 92 PID 3060 wrote to memory of 3760 3060 cmd.exe 92 PID 4956 wrote to memory of 3300 4956 cmd.exe 93 PID 4956 wrote to memory of 3300 4956 cmd.exe 93 PID 4956 wrote to memory of 3300 4956 cmd.exe 93 PID 4020 wrote to memory of 4088 4020 cmd.exe 94 PID 4020 wrote to memory of 4088 4020 cmd.exe 94 PID 3760 wrote to memory of 2636 3760 Server.exe 100 PID 3760 wrote to memory of 2636 3760 Server.exe 100 PID 3760 wrote to memory of 2636 3760 Server.exe 100 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3756 attrib.exe 3300 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe"C:\Users\Admin\AppData\Local\Temp\e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe"C:\Users\Admin\AppData\Local\Temp\e02e5802bacccd459b9891b49146b4c24703da9397d49a16ada35c329651252bN.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h C:\Users\Admin\AppData\Local\Temp\Server.exe"3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\Server.exe4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h C:\Users\Admin\AppData\Local\Temp\putty.exe"3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\putty.exe4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "START C:\Users\Admin\AppData\Local\Temp\Server.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "START C:\Users\Admin\AppData\Local\Temp\putty.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\putty.exeC:\Users\Admin\AppData\Local\Temp\putty.exe4⤵
- Executes dropped EXE
PID:4088
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD56a27d11412a75a267fa8b6208b86fa0b
SHA1c12d83c31e03a6289be4f925ab7489b64c659562
SHA2561e1b0beef21753936ababac850d3841cb5c48baf7a232823745616fa9cb4d33d
SHA5128f03b47a4dc33cfce47c008c149aefa55103a9ec48eaf167b02c656f7f3023a437eef948713746a086d4537e9bd0c842a1e17e80439cce490f9a0d921b616fb1
-
Filesize
84KB
MD5ae96651cfbd18991d186a029cbecb30c
SHA118df8af1022b5cb188e3ee98ac5b4da24ac9c526
SHA2561b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1
SHA51242a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7
-
Filesize
71KB
MD5055cfc5297933c338d8c04fd4e2462a2
SHA1bf8f97ee8136bfe3f93485e946f2069b7ce504e0
SHA256befc81440bbc001bd7647aca42962ee0b45b08435ee9f7140bf570af636b7dd5
SHA512308ebb33c47b73ecd9c4e4e54ffd09aae5a96019559ef7b2a37a45bd89c42d0d5bdd21da1835fffd84a138b03662c3d68bd72725a22f1b0ddf0329438819ead7
-
Filesize
31KB
MD51280a084744ef726a673b757b9364335
SHA1203a83aee00f6dca7b5cf16f5d140ff5fb888bbe
SHA256c2b3dc92abd96485032d1287941e405d56df05fb5ba68199497d8594400163e5
SHA512637aa79bcfe2ac3f75319a4be3ee4e32769a52cf939a26564a73807b40e96328fd1e9b58e70abb0b4c204c77baeb61a5150f5ebc47a7262a9c520867f69f6075
-
Filesize
181KB
MD5d72665ea18965f103200ccc7ad072f85
SHA12b89543cd8bd1aa20e0d3150a3c394b90be0d204
SHA256ab20e63d14259a7deca85a068796476c0efcc236a11d53b1816fc6f8956424a8
SHA512aad0bcbeabaa50b1fdba4cf70fe281f58b62a81b680cc16ef7f238263625fc7bed9ae9321a7bf7010fe7b5bb28708bdfaa0138c4f35a52be6aaba71d03aaa3dc
-
Filesize
994KB
MD5367be1ed9ff5808692dc9f23874eb220
SHA1286aa3ef347fc32a49557394240a8f69f8839a32
SHA256c4e301bd9c72446e390a3ad6b007e140cf800e3752bcb830054b8940691eb8fe
SHA512ae16b28603831d0dbe6ea73f59d7ac04acc3823fb4dc6ce24be072a6aa606af66afdab4e32c529cdb994fbb2ad34d394b31383c8744d0e39294a77f5f9bb7032
-
Filesize
1.8MB
MD525c9d6fa8bf1222e82a37ef982f418d2
SHA1e4bed3d1e76a58fc0119b7a2e70a998ca9ea7202
SHA2563f70a63aacc024c4cd599ff1e12bf5b685719cf2b92c4420fd20ab032c9c898c
SHA5122d6daf0e16971f9a6c1153bd67ff7fe2b1dbdeb5d05ea743cae231b85c9a27c4ee365f9c2141ea30a1edc9ebb32aa8a103b4949b5a0d9d031ad30acb2e9c60e5
-
Filesize
3.5MB
MD5198dc945fa3a7215c2aa90bd296025b4
SHA1ce991e920755d775d99ab91f40124f0aad92863d
SHA25620cd780cf1e90778799e749812b00b1865938ef8990cd9bf2c1630787c6181c9
SHA512a880aa55740e635e3fbd32b8128572b92f379913d405f3baf4e9ec67891ac3dd77dbed85074a958c89093ca378dac95733287a45ca89c75029a61ecde058c955
-
Filesize
1.6MB
MD55efef6cc9cd24baeeed71c1107fc32df
SHA13cfc9764083154f682a38831c8229e3e29cbe3ef
SHA256e61b8f44ab92cf0f9cb1101347967d31e1839979142a4114a7dd02aa237ba021
SHA512cecd98f0e238d7387b44838251b795bb95e85ec8d35242fc24532ba21929759685205133923268bf8bc0e2ded37db7d88ecbe2b692d2be6f09c6d92a57d1fdac