Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 23:13

General

  • Target

    sec-checker v1 By SECURITY ALSHAAB.exe

  • Size

    1020KB

  • MD5

    333c9b031872ecad95a227cb504c62ae

  • SHA1

    2cde63d3c03fd8d7b138232492ee7b7fbe1683aa

  • SHA256

    adaee5abda04e7cf460f707a2cfbea01a550bda20204cdcb1df2da194551a681

  • SHA512

    887e1a1e92c6d0542e9e226f7441ef55bd0e698d4f6c61e7b7fcb90c28cadcee24d96af56ccdb7ed0c2f5dace7ca929cfb0302d05fa07975621c186fc4ea48ba

  • SSDEEP

    12288:RfziWJL5SZaSCDaRze4Yl4fRCVhBwvQlebZBUwFt:RfLwOp4Yl6IwvQlebZzt

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

حمودي الواسطي كان هنا

C2

moha.no-ip.biz:9933

Mutex

0834daba34fc76fcb705a66b2338d64f

Attributes
  • reg_key

    0834daba34fc76fcb705a66b2338d64f

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sec-checker v1 By SECURITY ALSHAAB.exe
    "C:\Users\Admin\AppData\Local\Temp\sec-checker v1 By SECURITY ALSHAAB.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Local\Tempserver.exe
      "C:\Users\Admin\AppData\Local\Tempserver.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Users\Admin\AppData\Roaming\exploer.exe
        "C:\Users\Admin\AppData\Roaming\exploer.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\exploer.exe" "exploer.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1824
    • C:\Users\Admin\AppData\Local\Tempprogram.exe
      "C:\Users\Admin\AppData\Local\Tempprogram.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 2836
        3⤵
        • Program crash
        PID:2732
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3080 -ip 3080
    1⤵
      PID:2236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Tempprogram.exe

      Filesize

      752KB

      MD5

      4c48b2d17ed19bc9a8d528dc2b6bda5c

      SHA1

      9f54ab3839e04c98544ac83fc1a3b70f5329a631

      SHA256

      fdfbefb60fe0c8c134c048abf1882ac0930c03f0be4870f12ce8abdeb1e2d8ee

      SHA512

      bb1f3c743a87b44ae40ce961eaf2ebdba6902bc9782da9f42dbac82fec7355ed977ebc5235cf07af9c6ede511c8d50bbd4d0e3bd60907c1dac7c80652c57806b

    • C:\Users\Admin\AppData\Local\Tempserver.exe

      Filesize

      86KB

      MD5

      d0cc98952fe0aaccb7474a3f9ab8bd32

      SHA1

      6852686803eceaa19713fc0120276a39624a7d9e

      SHA256

      056d72244c40fa4c913058e3b0ec96edf87f17755086d4536fea9706ca2aec8f

      SHA512

      813100ac7828df5e3f415c22aac0358dfda5c53b0a66e19beb587dbe762d4ff11074f419a7bac0280d351fd4277839af41050ca1dd4253688183ee90169a9ef5

    • memory/1368-30-0x00000000746D0000-0x0000000074E80000-memory.dmp

      Filesize

      7.7MB

    • memory/1368-50-0x00000000746D0000-0x0000000074E80000-memory.dmp

      Filesize

      7.7MB

    • memory/1368-36-0x0000000005250000-0x000000000525E000-memory.dmp

      Filesize

      56KB

    • memory/1368-33-0x0000000000A20000-0x0000000000A3C000-memory.dmp

      Filesize

      112KB

    • memory/3080-65-0x00000000746D0000-0x0000000074E80000-memory.dmp

      Filesize

      7.7MB

    • memory/3080-37-0x00000000746D0000-0x0000000074E80000-memory.dmp

      Filesize

      7.7MB

    • memory/3080-32-0x0000000000600000-0x00000000006C4000-memory.dmp

      Filesize

      784KB

    • memory/3080-34-0x00000000746D0000-0x0000000074E80000-memory.dmp

      Filesize

      7.7MB

    • memory/4972-4-0x0000000005110000-0x00000000051A2000-memory.dmp

      Filesize

      584KB

    • memory/4972-7-0x00000000746D0000-0x0000000074E80000-memory.dmp

      Filesize

      7.7MB

    • memory/4972-35-0x00000000746D0000-0x0000000074E80000-memory.dmp

      Filesize

      7.7MB

    • memory/4972-6-0x0000000005360000-0x00000000053B6000-memory.dmp

      Filesize

      344KB

    • memory/4972-5-0x00000000050D0000-0x00000000050DA000-memory.dmp

      Filesize

      40KB

    • memory/4972-0-0x00000000746DE000-0x00000000746DF000-memory.dmp

      Filesize

      4KB

    • memory/4972-3-0x0000000005620000-0x0000000005BC4000-memory.dmp

      Filesize

      5.6MB

    • memory/4972-2-0x0000000004FD0000-0x000000000506C000-memory.dmp

      Filesize

      624KB

    • memory/4972-1-0x0000000000530000-0x0000000000638000-memory.dmp

      Filesize

      1.0MB