Analysis

  • max time kernel
    119s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 21:44

General

  • Target

    12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe

  • Size

    584KB

  • MD5

    488106a5ca274bef94d5dd8c8cd23060

  • SHA1

    1e291b498ff752b54a93aeb70b0819d2f439b088

  • SHA256

    12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485

  • SHA512

    507f8b16e4d015bb47ec9bab7c48a4be533b50987bd912fe487ae1c6bab2149c1cac12de12e8c57971147ac677daa7c828f5f878c0bfc55f6c44a882f1c35163

  • SSDEEP

    12288:mqEfpOSxyOF6q/68tLZL+w2hK3x8HPObaoE3anW2YrdA:mqSOStFYA+Kh8HPObfEqner

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

aboudmonster.no-ip.biz:1177

Mutex

0e8ba634604a9137fcb419c959897c24

Attributes
  • reg_key

    0e8ba634604a9137fcb419c959897c24

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe
    "C:\Users\Admin\AppData\Local\Temp\12b416b5429b719231eb729b6bd602e69085677616cd47aa0595d42161d5a485N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe
      "C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe
        C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Users\Admin\AppData\Local\Temp\Temp.exe
          "C:\Users\Admin\AppData\Local\Temp\Temp.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4984
          • C:\Users\Admin\AppData\Local\Temp\Temp.exe
            C:\Users\Admin\AppData\Local\Temp\Temp.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:216
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Temp.exe" "Temp.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:4992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalYDgabgvGyQ.exe

    Filesize

    85KB

    MD5

    cfda405c83d9de122cad4b98b9030a3c

    SHA1

    6a47b4f24d00de3ec76fcb7df06cfd975a924438

    SHA256

    a2c6efaee254a32d8ede9b20cc2be3816e0acb7df7913117a1159a9455ccc003

    SHA512

    7f1d47a72cb27331972dd6a47d2efeb20fe8b63c48fa65837056db91388cdced99038b922a39b3080b6038a05d33a8ba1df35f568d7017b236c1e9dc433a89c8

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\LocalYDgabgvGyQ.exe.log

    Filesize

    223B

    MD5

    1cc4c5b51e50ec74a6880b50ecbee28b

    SHA1

    1ba7bb0e86c3d23fb0dc8bf16798d37afb4c4aba

    SHA256

    0556734df26e82e363d47748a3ceedd5c23ea4b9ded6e68bd5c373c1c9f8777b

    SHA512

    5d5532602b381125b24a9bd78781ed722ce0c862214ef17e7d224d269e6e7045c919ab19896dd8d9ae8920726092efe0ffb776a77a9a9539c4a70188d5a4c706

  • memory/624-37-0x0000000075380000-0x0000000075931000-memory.dmp

    Filesize

    5.7MB

  • memory/624-35-0x0000000075380000-0x0000000075931000-memory.dmp

    Filesize

    5.7MB

  • memory/624-38-0x0000000075380000-0x0000000075931000-memory.dmp

    Filesize

    5.7MB

  • memory/624-14-0x0000000075382000-0x0000000075383000-memory.dmp

    Filesize

    4KB

  • memory/624-15-0x0000000075380000-0x0000000075931000-memory.dmp

    Filesize

    5.7MB

  • memory/624-16-0x0000000075380000-0x0000000075931000-memory.dmp

    Filesize

    5.7MB

  • memory/624-33-0x0000000075380000-0x0000000075931000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2236-39-0x0000000075380000-0x0000000075931000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-48-0x0000000075380000-0x0000000075931000-memory.dmp

    Filesize

    5.7MB

  • memory/3332-3-0x00007FFB28230000-0x00007FFB28BD1000-memory.dmp

    Filesize

    9.6MB

  • memory/3332-13-0x00007FFB28230000-0x00007FFB28BD1000-memory.dmp

    Filesize

    9.6MB

  • memory/3332-0-0x00007FFB284E5000-0x00007FFB284E6000-memory.dmp

    Filesize

    4KB

  • memory/3332-1-0x00007FFB28230000-0x00007FFB28BD1000-memory.dmp

    Filesize

    9.6MB