Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 21:44

General

  • Target

    12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe

  • Size

    584KB

  • MD5

    488106a5ca274bef94d5dd8c8cd23060

  • SHA1

    1e291b498ff752b54a93aeb70b0819d2f439b088

  • SHA256

    12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485

  • SHA512

    507f8b16e4d015bb47ec9bab7c48a4be533b50987bd912fe487ae1c6bab2149c1cac12de12e8c57971147ac677daa7c828f5f878c0bfc55f6c44a882f1c35163

  • SSDEEP

    12288:mqEfpOSxyOF6q/68tLZL+w2hK3x8HPObaoE3anW2YrdA:mqSOStFYA+Kh8HPObfEqner

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

aboudmonster.no-ip.biz:1177

Mutex

0e8ba634604a9137fcb419c959897c24

Attributes
  • reg_key

    0e8ba634604a9137fcb419c959897c24

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe
    "C:\Users\Admin\AppData\Local\Temp\12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe
      "C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe
        C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Users\Admin\AppData\Local\Temp\Temp.exe
          "C:\Users\Admin\AppData\Local\Temp\Temp.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Users\Admin\AppData\Local\Temp\Temp.exe
            C:\Users\Admin\AppData\Local\Temp\Temp.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Temp.exe" "Temp.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe

    Filesize

    85KB

    MD5

    cfda405c83d9de122cad4b98b9030a3c

    SHA1

    6a47b4f24d00de3ec76fcb7df06cfd975a924438

    SHA256

    a2c6efaee254a32d8ede9b20cc2be3816e0acb7df7913117a1159a9455ccc003

    SHA512

    7f1d47a72cb27331972dd6a47d2efeb20fe8b63c48fa65837056db91388cdced99038b922a39b3080b6038a05d33a8ba1df35f568d7017b236c1e9dc433a89c8

  • memory/1664-16-0x00000000742F0000-0x000000007489B000-memory.dmp

    Filesize

    5.7MB

  • memory/1664-36-0x00000000742F0000-0x000000007489B000-memory.dmp

    Filesize

    5.7MB

  • memory/1664-38-0x00000000742F0000-0x000000007489B000-memory.dmp

    Filesize

    5.7MB

  • memory/1664-12-0x00000000742F1000-0x00000000742F2000-memory.dmp

    Filesize

    4KB

  • memory/1664-15-0x00000000742F0000-0x000000007489B000-memory.dmp

    Filesize

    5.7MB

  • memory/1852-14-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/1852-0-0x000007FEF5E7E000-0x000007FEF5E7F000-memory.dmp

    Filesize

    4KB

  • memory/1852-13-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/1852-3-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/1852-2-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/2864-35-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2864-33-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2864-29-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB