Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 16:19

General

  • Target

    VenomV5.exe

  • Size

    289KB

  • MD5

    121a7190a24ba74a4c49c951dd56ad72

  • SHA1

    fb5b1adf74cda03d5a77096b866942a6fbd5aa89

  • SHA256

    049e3ab43c29a82fc17b415fb88df0b0c238efea6be76a25da1f2bb88ee22a6b

  • SHA512

    b1a983027932897e97c4e3ac9865e6fe987c3b772c5847db3f3cc5b8e2b4c845e7040bf8a7e7d546b77c3f78e39c32eaeb7321f1c6f99dd28554c80fec603bb3

  • SSDEEP

    6144:6/E7c5W+sPgJJUuCm2pad2AO51SLPml16S6M6supNDdPstxChZ:UEeggJauClpjL5sar6M6supXPstw

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

Victim

C2

audio-ham.gl.at.ply.gg:52424

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VenomV5.exe
    "C:\Users\Admin\AppData\Local\Temp\VenomV5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\paylod.exe
      "C:\Users\Admin\AppData\Local\Temp\paylod.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Users\Admin\AppData\Local\Temp\Payload.exe
        "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1472
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:688
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2640
    • C:\Users\Admin\AppData\Local\Temp\main.exe
      "C:\Users\Admin\AppData\Local\Temp\main.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A9C7.tmp\A9C8.tmp\A9C9.bat C:\Users\Admin\AppData\Local\Temp\main.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\A9C7.tmp\A9C8.tmp\A9C9.bat

      Filesize

      3KB

      MD5

      ed10dc8c536ee4a022b94514936658e1

      SHA1

      006378f2c2837b196ecd17db6f1d6db862b8454e

      SHA256

      6851924794377b148813fd77ffe990aeb8abd363e9086b73bf76db117feedc59

      SHA512

      245a2bef61c75090b9108a5c5b81a77d1091b5a4abe8f561d5658e9c708907fe2ada359a9931dfa6decf0a06e5a0fdb08dab6ed7165a78f559512cbedf37634f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk

      Filesize

      1KB

      MD5

      c7bacc12f165ab5dbbd5a2ae9f2dfca3

      SHA1

      b5017a1d4edee7765391990b42e58043e84b5914

      SHA256

      824baa52042f45bb6bf540719d4635dda57d85989086686e4cf765970847b90e

      SHA512

      acc855362f306368ccbca867f73525e4f2f6cec6c8114e9a706766fdfbe58edcb7b3821b174ab0f22a820e79ecc6ea6a93e1508617745e17015807c2610a4cb7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk

      Filesize

      1018B

      MD5

      5ee8b0aaba1bbc7650be293e7ba97e38

      SHA1

      fecdfe9bc6eb3dd1648d11d954fcd7222a2c8e05

      SHA256

      3931dc1e16b459204b7301391b08fb84190b1bbe5721bb8b2d3a24fa2b37d474

      SHA512

      a3c9ba8c5bebd4a9cddc2b43429a2d5824870e17288939d9bfa333ab35601f78da80405c34bde9a215f88ec5ca01ca4c6ee0d4af69bee4b0c130a1ac8be311ac

    • \Users\Admin\AppData\Local\Temp\main.exe

      Filesize

      126KB

      MD5

      fb32165caff9614efbc6311fe75da2f2

      SHA1

      674e7a93ed4b9cb097d846463a249bd68c4ab7a6

      SHA256

      41018b0dcfb3adf0ddcda481a276d98cbcee94698ac9c7dbd3644a86687e76e8

      SHA512

      65356ddd14df07f2153e740a8ac9f4d722e604a85663254f5e444850cbb66c15c35e7cedc6fece72df63677ffbbeb094122b05c11e01bf0cded917c3c4608a6d

    • \Users\Admin\AppData\Local\Temp\paylod.exe

      Filesize

      26KB

      MD5

      1f5545281784c48b113dde61778a4697

      SHA1

      46aee2f749bbee1fb7e4f5d8609b798bd5077673

      SHA256

      e31e3e11ce40c048eed1a0f68b0e47a15369b9289b30dcce9fe70b7f7ea26c20

      SHA512

      e262e58f15bbbee488a8423cbd5f03b2e9ab12b7af267d3278b48cb86373ff180b992d126694d3e224a8b97bff5edbaeb9c0d3493528b0d6b49e236339a1ab37

    • memory/2060-0-0x0000000074CC1000-0x0000000074CC2000-memory.dmp

      Filesize

      4KB

    • memory/2060-1-0x0000000074CC0000-0x000000007526B000-memory.dmp

      Filesize

      5.7MB

    • memory/2060-2-0x0000000074CC0000-0x000000007526B000-memory.dmp

      Filesize

      5.7MB

    • memory/2060-23-0x0000000074CC0000-0x000000007526B000-memory.dmp

      Filesize

      5.7MB

    • memory/2272-38-0x0000000000110000-0x000000000011C000-memory.dmp

      Filesize

      48KB

    • memory/2272-43-0x0000000001DB0000-0x0000000001DC6000-memory.dmp

      Filesize

      88KB

    • memory/2492-25-0x0000000000AE0000-0x0000000000AEC000-memory.dmp

      Filesize

      48KB