Resubmissions

03-12-2024 20:12

241203-yy1zxasjbz 10

03-12-2024 20:03

241203-ysq8hs1pdz 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 20:03

General

  • Target

    Payload.exe

  • Size

    55KB

  • MD5

    29a02cd1fb2226905da5a34ac62595b9

  • SHA1

    a0c85edb2b9decb53291485acd64f36dbf5a6999

  • SHA256

    7aca902f9e7493dbf4f53a4cd3a4a9e5858eb825ef0141bf2e30150b416a070e

  • SHA512

    2e3000bdf30fe332f2923563a5266ada0201473fa999382aeced2cbb09951179ed2e7278314b97e1852dc8e300cd182632481f508f65b4aa629beecdb14993b3

  • SSDEEP

    1536:1KksDnHNwZ8Cam8LDdwsNMD2XExI3pmym:fsDn6SKiDdwsNMD2XExI3pm

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 17 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payload.exe
    "C:\Users\Admin\AppData\Local\Temp\Payload.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Users\Admin\AppData\Local\Temp\cfcd2215d3704b1aa6afd0e10994a77b.exe
      "C:\Users\Admin\AppData\Local\Temp\cfcd2215d3704b1aa6afd0e10994a77b.exe"
      2⤵
      • Executes dropped EXE
      PID:1300
    • C:\Users\Admin\AppData\Local\Temp\f708b91287c34289a2710819d04b101a.exe
      "C:\Users\Admin\AppData\Local\Temp\f708b91287c34289a2710819d04b101a.exe"
      2⤵
      • Executes dropped EXE
      PID:3636
    • C:\Users\Admin\AppData\Local\Temp\fe2f55e6357f45a0b4c2be49efc14623.exe
      "C:\Users\Admin\AppData\Local\Temp\fe2f55e6357f45a0b4c2be49efc14623.exe"
      2⤵
      • Executes dropped EXE
      PID:2560
    • C:\Users\Admin\AppData\Local\Temp\6e76c148592a4d1ea948d82893e683e6.exe
      "C:\Users\Admin\AppData\Local\Temp\6e76c148592a4d1ea948d82893e683e6.exe"
      2⤵
      • Executes dropped EXE
      PID:2196
    • C:\Users\Admin\AppData\Local\Temp\6904cd79bbce4d678d3117d19b160c02.exe
      "C:\Users\Admin\AppData\Local\Temp\6904cd79bbce4d678d3117d19b160c02.exe"
      2⤵
      • Executes dropped EXE
      PID:2732
    • C:\Users\Admin\AppData\Local\Temp\d9524ca5a071493bbb0a72da970ef650.exe
      "C:\Users\Admin\AppData\Local\Temp\d9524ca5a071493bbb0a72da970ef650.exe"
      2⤵
      • Executes dropped EXE
      PID:4676
    • C:\Users\Admin\AppData\Local\Temp\03719006d32d463783a61520f7f96c76.exe
      "C:\Users\Admin\AppData\Local\Temp\03719006d32d463783a61520f7f96c76.exe"
      2⤵
      • Executes dropped EXE
      PID:2532
    • C:\Users\Admin\AppData\Local\Temp\53040da0731a42dfaef987b4f4d6b389.exe
      "C:\Users\Admin\AppData\Local\Temp\53040da0731a42dfaef987b4f4d6b389.exe"
      2⤵
      • Executes dropped EXE
      PID:552
    • C:\Users\Admin\AppData\Local\Temp\ebd89b1d8bd643d0af2111e04ddd4439.exe
      "C:\Users\Admin\AppData\Local\Temp\ebd89b1d8bd643d0af2111e04ddd4439.exe"
      2⤵
      • Executes dropped EXE
      PID:1788
    • C:\Users\Admin\AppData\Local\Temp\2db87fccb5bb4b27af1cfe4db6fa1b8d.exe
      "C:\Users\Admin\AppData\Local\Temp\2db87fccb5bb4b27af1cfe4db6fa1b8d.exe"
      2⤵
      • Executes dropped EXE
      PID:4456
    • C:\Users\Admin\AppData\Local\Temp\0efda792e0d9431ab0655d6b44654c04.exe
      "C:\Users\Admin\AppData\Local\Temp\0efda792e0d9431ab0655d6b44654c04.exe"
      2⤵
      • Executes dropped EXE
      PID:3300
    • C:\Users\Admin\AppData\Local\Temp\66edc08958524fd49be3f813471af6a3.exe
      "C:\Users\Admin\AppData\Local\Temp\66edc08958524fd49be3f813471af6a3.exe"
      2⤵
      • Executes dropped EXE
      PID:4392
    • C:\Users\Admin\AppData\Local\Temp\025b83b1a036433f9a89711efe8487e0.exe
      "C:\Users\Admin\AppData\Local\Temp\025b83b1a036433f9a89711efe8487e0.exe"
      2⤵
      • Executes dropped EXE
      PID:3000
    • C:\Users\Admin\AppData\Local\Temp\097fbcd38ca14eafa0899d95908e3818.exe
      "C:\Users\Admin\AppData\Local\Temp\097fbcd38ca14eafa0899d95908e3818.exe"
      2⤵
      • Executes dropped EXE
      PID:1240
    • C:\Users\Admin\AppData\Local\Temp\b1c518a46b0348339ad626e0d45fdaeb.exe
      "C:\Users\Admin\AppData\Local\Temp\b1c518a46b0348339ad626e0d45fdaeb.exe"
      2⤵
      • Executes dropped EXE
      PID:4536
    • C:\Users\Admin\AppData\Local\Temp\30f581fd438c4944ababbc4c21e582ef.exe
      "C:\Users\Admin\AppData\Local\Temp\30f581fd438c4944ababbc4c21e582ef.exe"
      2⤵
      • Executes dropped EXE
      PID:4736
    • C:\Users\Admin\AppData\Local\Temp\b5438037269b47d4a6b903fbf907e626.exe
      "C:\Users\Admin\AppData\Local\Temp\b5438037269b47d4a6b903fbf907e626.exe"
      2⤵
      • Executes dropped EXE
      PID:3712
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f8 0x2f4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\6904cd79bbce4d678d3117d19b160c02.exe.log

    Filesize

    594B

    MD5

    44e889763d548d09132c31ed548f63f5

    SHA1

    d9829a1b5841338533a0be0509df50172cce73be

    SHA256

    d29f0e5fe1ab31998f200d4441c0e201a2e3bd6e416f638cbee2eb55354d48cc

    SHA512

    a1474aaef1132f459e8139157a618368c7623f4a25a754c6fc2672d92929b9506bfcc272eebf5c69901f4140d36e740f5f6bbfb90e000c6538ab492f5aa48a96

  • C:\Users\Admin\AppData\Local\Temp\cfcd2215d3704b1aa6afd0e10994a77b.exe

    Filesize

    583KB

    MD5

    320b1115164e8b5e1316d86eb29cd299

    SHA1

    bc046d8b14359a7a2bebdecbb819e76c47d84d1b

    SHA256

    d88f5b00da5f05ab7f55fd7c414bb56aaf47e9f51365aaabd71f3ace3cc77523

    SHA512

    fab558cf31aa79caf8e4f6e5649e4e484de3e29bae1386aa61749b70e8c791d74b01fa964501d4755c7688d0420e932f30e36699a2fe4488fae82ee23558afd0

  • C:\Users\Admin\AppData\Local\Temp\f708b91287c34289a2710819d04b101a.exe

    Filesize

    997KB

    MD5

    28aaac578be4ce06cb695e4f927b4302

    SHA1

    880ab0560b81e05e920f9ec1d6c0ecf5e04eaa7e

    SHA256

    8929d3b749ff91527b8e407eff6bde4bb0bb27739313b5c0db0434cbf700dbfc

    SHA512

    068698bda0543c773b36830f6760456e40e9046d9d20089ad88cb646ef5c7bd6c6716c6d59cfc7abd5bffb9129f5a7076e2f9c9b321795f224923f00b7b91374

  • memory/1300-26-0x0000000001490000-0x0000000001498000-memory.dmp

    Filesize

    32KB

  • memory/1300-27-0x000000001C790000-0x000000001C7DC000-memory.dmp

    Filesize

    304KB

  • memory/1300-32-0x00007FFEA9090000-0x00007FFEA9A31000-memory.dmp

    Filesize

    9.6MB

  • memory/1300-31-0x00007FFEA9090000-0x00007FFEA9A31000-memory.dmp

    Filesize

    9.6MB

  • memory/1300-29-0x00007FFEA9090000-0x00007FFEA9A31000-memory.dmp

    Filesize

    9.6MB

  • memory/1300-28-0x00007FFEA9090000-0x00007FFEA9A31000-memory.dmp

    Filesize

    9.6MB

  • memory/1300-20-0x00007FFEA9345000-0x00007FFEA9346000-memory.dmp

    Filesize

    4KB

  • memory/1300-21-0x000000001BB00000-0x000000001BBA6000-memory.dmp

    Filesize

    664KB

  • memory/1300-22-0x00007FFEA9090000-0x00007FFEA9A31000-memory.dmp

    Filesize

    9.6MB

  • memory/1300-24-0x000000001C080000-0x000000001C54E000-memory.dmp

    Filesize

    4.8MB

  • memory/1300-23-0x00007FFEA9090000-0x00007FFEA9A31000-memory.dmp

    Filesize

    9.6MB

  • memory/1300-25-0x000000001C5F0000-0x000000001C68C000-memory.dmp

    Filesize

    624KB

  • memory/4880-0-0x0000000074D02000-0x0000000074D03000-memory.dmp

    Filesize

    4KB

  • memory/4880-5-0x0000000074D00000-0x00000000752B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4880-4-0x0000000074D02000-0x0000000074D03000-memory.dmp

    Filesize

    4KB

  • memory/4880-8-0x0000000074D00000-0x00000000752B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4880-7-0x0000000074D00000-0x00000000752B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4880-6-0x0000000074D00000-0x00000000752B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4880-2-0x0000000074D00000-0x00000000752B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4880-1-0x0000000074D00000-0x00000000752B1000-memory.dmp

    Filesize

    5.7MB