Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 16:19

General

  • Target

    VenomV5.exe

  • Size

    289KB

  • MD5

    121a7190a24ba74a4c49c951dd56ad72

  • SHA1

    fb5b1adf74cda03d5a77096b866942a6fbd5aa89

  • SHA256

    049e3ab43c29a82fc17b415fb88df0b0c238efea6be76a25da1f2bb88ee22a6b

  • SHA512

    b1a983027932897e97c4e3ac9865e6fe987c3b772c5847db3f3cc5b8e2b4c845e7040bf8a7e7d546b77c3f78e39c32eaeb7321f1c6f99dd28554c80fec603bb3

  • SSDEEP

    6144:6/E7c5W+sPgJJUuCm2pad2AO51SLPml16S6M6supNDdPstxChZ:UEeggJauClpjL5sar6M6supXPstw

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

Victim

C2

audio-ham.gl.at.ply.gg:52424

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VenomV5.exe
    "C:\Users\Admin\AppData\Local\Temp\VenomV5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3900
    • C:\Users\Admin\AppData\Local\Temp\paylod.exe
      "C:\Users\Admin\AppData\Local\Temp\paylod.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Users\Admin\AppData\Local\Temp\Payload.exe
        "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4008
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1408
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1820
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:4976
    • C:\Users\Admin\AppData\Local\Temp\main.exe
      "C:\Users\Admin\AppData\Local\Temp\main.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\9981.tmp\9982.tmp\9983.bat C:\Users\Admin\AppData\Local\Temp\main.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1892
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:4388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\9981.tmp\9982.tmp\9983.bat

      Filesize

      3KB

      MD5

      ed10dc8c536ee4a022b94514936658e1

      SHA1

      006378f2c2837b196ecd17db6f1d6db862b8454e

      SHA256

      6851924794377b148813fd77ffe990aeb8abd363e9086b73bf76db117feedc59

      SHA512

      245a2bef61c75090b9108a5c5b81a77d1091b5a4abe8f561d5658e9c708907fe2ada359a9931dfa6decf0a06e5a0fdb08dab6ed7165a78f559512cbedf37634f

    • C:\Users\Admin\AppData\Local\Temp\main.exe

      Filesize

      126KB

      MD5

      fb32165caff9614efbc6311fe75da2f2

      SHA1

      674e7a93ed4b9cb097d846463a249bd68c4ab7a6

      SHA256

      41018b0dcfb3adf0ddcda481a276d98cbcee94698ac9c7dbd3644a86687e76e8

      SHA512

      65356ddd14df07f2153e740a8ac9f4d722e604a85663254f5e444850cbb66c15c35e7cedc6fece72df63677ffbbeb094122b05c11e01bf0cded917c3c4608a6d

    • C:\Users\Admin\AppData\Local\Temp\paylod.exe

      Filesize

      26KB

      MD5

      1f5545281784c48b113dde61778a4697

      SHA1

      46aee2f749bbee1fb7e4f5d8609b798bd5077673

      SHA256

      e31e3e11ce40c048eed1a0f68b0e47a15369b9289b30dcce9fe70b7f7ea26c20

      SHA512

      e262e58f15bbbee488a8423cbd5f03b2e9ab12b7af267d3278b48cb86373ff180b992d126694d3e224a8b97bff5edbaeb9c0d3493528b0d6b49e236339a1ab37

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk

      Filesize

      1KB

      MD5

      1510fb60181a9e71cf2d880581b1ebc2

      SHA1

      d57c13358e1a7413047deada6804c352fbe42d2c

      SHA256

      ee6809bb22194dbbd69b8c27df0dd8e177c8efc402df6bcea85c317e826f9aee

      SHA512

      3513e76edc7da6176a151170267061c0299934e8bb70574d7cd1326458e501f0ab476a37408614c151de6b319cddbdfb1afd71411c487f9b95120f0dec7a2923

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk

      Filesize

      1KB

      MD5

      a64741d0867eef64d911658f5ad85ab4

      SHA1

      46ae97bf28531c34b7107e2d26c027d84559c66a

      SHA256

      4ad2b1174afcd8bc7635ac05fe4232f67bc2f543f6f7b03d88ba03944e5a104a

      SHA512

      c298309bddf16ece573e396450d97c35aa7c6ff11c63651343a74c52c399a62fa92f44d860bcd782eb2f82ccc332c662e0d78a2521ffaf671ad73fbfe955b017

    • memory/2108-20-0x00000000719EE000-0x00000000719EF000-memory.dmp

      Filesize

      4KB

    • memory/2108-21-0x00000000008D0000-0x00000000008DC000-memory.dmp

      Filesize

      48KB

    • memory/2108-23-0x0000000005160000-0x00000000051FC000-memory.dmp

      Filesize

      624KB

    • memory/2108-28-0x00000000060A0000-0x0000000006644000-memory.dmp

      Filesize

      5.6MB

    • memory/3900-19-0x0000000074800000-0x0000000074DB1000-memory.dmp

      Filesize

      5.7MB

    • memory/3900-2-0x0000000074800000-0x0000000074DB1000-memory.dmp

      Filesize

      5.7MB

    • memory/3900-1-0x0000000074800000-0x0000000074DB1000-memory.dmp

      Filesize

      5.7MB

    • memory/3900-0-0x0000000074802000-0x0000000074803000-memory.dmp

      Filesize

      4KB

    • memory/4008-42-0x00000000060F0000-0x0000000006182000-memory.dmp

      Filesize

      584KB

    • memory/4008-43-0x00000000060E0000-0x00000000060EA000-memory.dmp

      Filesize

      40KB

    • memory/4008-44-0x0000000006320000-0x0000000006386000-memory.dmp

      Filesize

      408KB

    • memory/4008-45-0x0000000001530000-0x0000000001546000-memory.dmp

      Filesize

      88KB