Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 14:30

General

  • Target

    2.exe

  • Size

    55KB

  • MD5

    c5c8764f8f11a84f5b2045cee5e4d9f1

  • SHA1

    f7d6a80923a7d4939d6ebb6459a7780187f47bcb

  • SHA256

    ae6331fbfc15c5a63072259b5810df459fad8897c017754d318ffb453fa6b53e

  • SHA512

    8df8fdfe1005203ecafb53c43bfa84560915b62bbe9816da6f95b4e44f44b4bc477617e8a6e271f39541747dad5ef092670c7a14b8cae18cf87867f8e89eaf0d

  • SSDEEP

    1536:nKksDnHNwZ8Cam8LDdwsNMD2XExI3pmzm:tsDn6SKiDdwsNMD2XExI3pm

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 49 IoCs
  • Loads dropped DLL 49 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2.exe
    "C:\Users\Admin\AppData\Local\Temp\2.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\80418bb593e4414ea463ba0375344142.exe
      "C:\Users\Admin\AppData\Local\Temp\80418bb593e4414ea463ba0375344142.exe"
      2⤵
      • Executes dropped EXE
      PID:2792
    • C:\Users\Admin\AppData\Local\Temp\0df5f17d1c2b4426aaba2fbf1465533e.exe
      "C:\Users\Admin\AppData\Local\Temp\0df5f17d1c2b4426aaba2fbf1465533e.exe"
      2⤵
      • Executes dropped EXE
      PID:2764
    • C:\Users\Admin\AppData\Local\Temp\d744442786d4411c945b55f283cf3e97.exe
      "C:\Users\Admin\AppData\Local\Temp\d744442786d4411c945b55f283cf3e97.exe"
      2⤵
      • Executes dropped EXE
      PID:2436
    • C:\Users\Admin\AppData\Local\Temp\2089bd93760a401fbb240b60e9ba7fe9.exe
      "C:\Users\Admin\AppData\Local\Temp\2089bd93760a401fbb240b60e9ba7fe9.exe"
      2⤵
      • Executes dropped EXE
      PID:1040
    • C:\Users\Admin\AppData\Local\Temp\37cf2c9793864ed2a4069a682e38825a.exe
      "C:\Users\Admin\AppData\Local\Temp\37cf2c9793864ed2a4069a682e38825a.exe"
      2⤵
      • Executes dropped EXE
      PID:3000
    • C:\Users\Admin\AppData\Local\Temp\0fe4769bc5d54886aa0d055156a090b7.exe
      "C:\Users\Admin\AppData\Local\Temp\0fe4769bc5d54886aa0d055156a090b7.exe"
      2⤵
      • Executes dropped EXE
      PID:2236
    • C:\Users\Admin\AppData\Local\Temp\0e70aa8c4b634e5f9ea43b1198889a09.exe
      "C:\Users\Admin\AppData\Local\Temp\0e70aa8c4b634e5f9ea43b1198889a09.exe"
      2⤵
      • Executes dropped EXE
      PID:1144
    • C:\Users\Admin\AppData\Local\Temp\c0b1fd8b2ef24c2f963ab0d84fdb9a93.exe
      "C:\Users\Admin\AppData\Local\Temp\c0b1fd8b2ef24c2f963ab0d84fdb9a93.exe"
      2⤵
      • Executes dropped EXE
      PID:1104
    • C:\Users\Admin\AppData\Local\Temp\95c14c5be3db4701a238173fe8a1c4a3.exe
      "C:\Users\Admin\AppData\Local\Temp\95c14c5be3db4701a238173fe8a1c4a3.exe"
      2⤵
      • Executes dropped EXE
      PID:1148
    • C:\Users\Admin\AppData\Local\Temp\77af256aec494a1c878266ee7c0f55b0.exe
      "C:\Users\Admin\AppData\Local\Temp\77af256aec494a1c878266ee7c0f55b0.exe"
      2⤵
      • Executes dropped EXE
      PID:1544
    • C:\Users\Admin\AppData\Local\Temp\17b8de8aa8784c1eb97d3d4031bda0f2.exe
      "C:\Users\Admin\AppData\Local\Temp\17b8de8aa8784c1eb97d3d4031bda0f2.exe"
      2⤵
      • Executes dropped EXE
      PID:1908
    • C:\Users\Admin\AppData\Local\Temp\a079809abbea4e16b8cf9bfb51a96d3d.exe
      "C:\Users\Admin\AppData\Local\Temp\a079809abbea4e16b8cf9bfb51a96d3d.exe"
      2⤵
      • Executes dropped EXE
      PID:2572
    • C:\Users\Admin\AppData\Local\Temp\3b0280d494e6454281ace7ff17ff8cba.exe
      "C:\Users\Admin\AppData\Local\Temp\3b0280d494e6454281ace7ff17ff8cba.exe"
      2⤵
      • Executes dropped EXE
      PID:2888
    • C:\Users\Admin\AppData\Local\Temp\7cd4a96c8ea948c68e3a7f33cba863bd.exe
      "C:\Users\Admin\AppData\Local\Temp\7cd4a96c8ea948c68e3a7f33cba863bd.exe"
      2⤵
      • Executes dropped EXE
      PID:2948
    • C:\Users\Admin\AppData\Local\Temp\aef878f0eeeb4b38bb11409383ccd836.exe
      "C:\Users\Admin\AppData\Local\Temp\aef878f0eeeb4b38bb11409383ccd836.exe"
      2⤵
      • Executes dropped EXE
      PID:2684
    • C:\Users\Admin\AppData\Local\Temp\36fded5260d248f284c971e3e469751c.exe
      "C:\Users\Admin\AppData\Local\Temp\36fded5260d248f284c971e3e469751c.exe"
      2⤵
      • Executes dropped EXE
      PID:2136
    • C:\Users\Admin\AppData\Local\Temp\29013f8f4eef43deb93b3d0fbf5264c8.exe
      "C:\Users\Admin\AppData\Local\Temp\29013f8f4eef43deb93b3d0fbf5264c8.exe"
      2⤵
      • Executes dropped EXE
      PID:2196
    • C:\Users\Admin\AppData\Local\Temp\dbb289bfb3b4456fa595431a0d16fe6a.exe
      "C:\Users\Admin\AppData\Local\Temp\dbb289bfb3b4456fa595431a0d16fe6a.exe"
      2⤵
      • Executes dropped EXE
      PID:2148
    • C:\Users\Admin\AppData\Local\Temp\28e39537a22049b4816fd92c53ec5433.exe
      "C:\Users\Admin\AppData\Local\Temp\28e39537a22049b4816fd92c53ec5433.exe"
      2⤵
      • Executes dropped EXE
      PID:1652
    • C:\Users\Admin\AppData\Local\Temp\5c4b5dcbff7f4df1924b97927a269359.exe
      "C:\Users\Admin\AppData\Local\Temp\5c4b5dcbff7f4df1924b97927a269359.exe"
      2⤵
      • Executes dropped EXE
      PID:1448
    • C:\Users\Admin\AppData\Local\Temp\d3a1dae6860a47eba99c79ef5bfde2c0.exe
      "C:\Users\Admin\AppData\Local\Temp\d3a1dae6860a47eba99c79ef5bfde2c0.exe"
      2⤵
      • Executes dropped EXE
      PID:1720
    • C:\Users\Admin\AppData\Local\Temp\76882b0c761c43b3a56845a7eb1c14f7.exe
      "C:\Users\Admin\AppData\Local\Temp\76882b0c761c43b3a56845a7eb1c14f7.exe"
      2⤵
      • Executes dropped EXE
      PID:1984
    • C:\Users\Admin\AppData\Local\Temp\2fa50c5a84c841c98baf00023a1467f1.exe
      "C:\Users\Admin\AppData\Local\Temp\2fa50c5a84c841c98baf00023a1467f1.exe"
      2⤵
      • Executes dropped EXE
      PID:1008
    • C:\Users\Admin\AppData\Local\Temp\b2fa3449961d464fac132f89fd0c288f.exe
      "C:\Users\Admin\AppData\Local\Temp\b2fa3449961d464fac132f89fd0c288f.exe"
      2⤵
      • Executes dropped EXE
      PID:2588
    • C:\Users\Admin\AppData\Local\Temp\5920f6b8eaa64e5599136310ca075a63.exe
      "C:\Users\Admin\AppData\Local\Temp\5920f6b8eaa64e5599136310ca075a63.exe"
      2⤵
      • Executes dropped EXE
      PID:1700
    • C:\Users\Admin\AppData\Local\Temp\6bfbb9f33e5c4f45b37d54da4a983fd9.exe
      "C:\Users\Admin\AppData\Local\Temp\6bfbb9f33e5c4f45b37d54da4a983fd9.exe"
      2⤵
      • Executes dropped EXE
      PID:2692
    • C:\Users\Admin\AppData\Local\Temp\57ccbffab0544157bfe8a7f6105b0bab.exe
      "C:\Users\Admin\AppData\Local\Temp\57ccbffab0544157bfe8a7f6105b0bab.exe"
      2⤵
      • Executes dropped EXE
      PID:2228
    • C:\Users\Admin\AppData\Local\Temp\d3dd81724dab4e9ebfb8ad7cfbe7c056.exe
      "C:\Users\Admin\AppData\Local\Temp\d3dd81724dab4e9ebfb8ad7cfbe7c056.exe"
      2⤵
      • Executes dropped EXE
      PID:2752
    • C:\Users\Admin\AppData\Local\Temp\49ac96ba225b441c89818da0a9e6db9e.exe
      "C:\Users\Admin\AppData\Local\Temp\49ac96ba225b441c89818da0a9e6db9e.exe"
      2⤵
      • Executes dropped EXE
      PID:2496
    • C:\Users\Admin\AppData\Local\Temp\08a72b5129714b5d8fd7dbb76fc2d237.exe
      "C:\Users\Admin\AppData\Local\Temp\08a72b5129714b5d8fd7dbb76fc2d237.exe"
      2⤵
      • Executes dropped EXE
      PID:1336
    • C:\Users\Admin\AppData\Local\Temp\b65913b75425464aabe95f45b8e5a2ff.exe
      "C:\Users\Admin\AppData\Local\Temp\b65913b75425464aabe95f45b8e5a2ff.exe"
      2⤵
      • Executes dropped EXE
      PID:2252
    • C:\Users\Admin\AppData\Local\Temp\15255dfa12ec49a69a248f89157c67b6.exe
      "C:\Users\Admin\AppData\Local\Temp\15255dfa12ec49a69a248f89157c67b6.exe"
      2⤵
      • Executes dropped EXE
      PID:2712
    • C:\Users\Admin\AppData\Local\Temp\4cecd7f735384f4a9ed4680becc8147d.exe
      "C:\Users\Admin\AppData\Local\Temp\4cecd7f735384f4a9ed4680becc8147d.exe"
      2⤵
      • Executes dropped EXE
      PID:2756
    • C:\Users\Admin\AppData\Local\Temp\3a08414a06cc4a5ea096120d24976bf8.exe
      "C:\Users\Admin\AppData\Local\Temp\3a08414a06cc4a5ea096120d24976bf8.exe"
      2⤵
      • Executes dropped EXE
      PID:2980
    • C:\Users\Admin\AppData\Local\Temp\a43d192e36bd424bb6e5cf06dfdc1c7b.exe
      "C:\Users\Admin\AppData\Local\Temp\a43d192e36bd424bb6e5cf06dfdc1c7b.exe"
      2⤵
      • Executes dropped EXE
      PID:1740
    • C:\Users\Admin\AppData\Local\Temp\f70ec66bd7b842afadbf7069446055a7.exe
      "C:\Users\Admin\AppData\Local\Temp\f70ec66bd7b842afadbf7069446055a7.exe"
      2⤵
      • Executes dropped EXE
      PID:2992
    • C:\Users\Admin\AppData\Local\Temp\82098fd1b6f142bcaa90f4764903812e.exe
      "C:\Users\Admin\AppData\Local\Temp\82098fd1b6f142bcaa90f4764903812e.exe"
      2⤵
      • Executes dropped EXE
      PID:1268
    • C:\Users\Admin\AppData\Local\Temp\a9297cb89631466f87471f41951b705c.exe
      "C:\Users\Admin\AppData\Local\Temp\a9297cb89631466f87471f41951b705c.exe"
      2⤵
      • Executes dropped EXE
      PID:548
    • C:\Users\Admin\AppData\Local\Temp\212bfe8283d8420f949d478a75f837e0.exe
      "C:\Users\Admin\AppData\Local\Temp\212bfe8283d8420f949d478a75f837e0.exe"
      2⤵
      • Executes dropped EXE
      PID:2116
    • C:\Users\Admin\AppData\Local\Temp\f42a37e9eca54e2fb1693e02eca56b67.exe
      "C:\Users\Admin\AppData\Local\Temp\f42a37e9eca54e2fb1693e02eca56b67.exe"
      2⤵
      • Executes dropped EXE
      PID:912
    • C:\Users\Admin\AppData\Local\Temp\2aad510142c6458abd5d7f791f2b18f8.exe
      "C:\Users\Admin\AppData\Local\Temp\2aad510142c6458abd5d7f791f2b18f8.exe"
      2⤵
      • Executes dropped EXE
      PID:2800
    • C:\Users\Admin\AppData\Local\Temp\89037bc9205a4712b6cac982f072593d.exe
      "C:\Users\Admin\AppData\Local\Temp\89037bc9205a4712b6cac982f072593d.exe"
      2⤵
      • Executes dropped EXE
      PID:1680
    • C:\Users\Admin\AppData\Local\Temp\1df84bfa1e1f4ecdbfe21e1295bc915e.exe
      "C:\Users\Admin\AppData\Local\Temp\1df84bfa1e1f4ecdbfe21e1295bc915e.exe"
      2⤵
      • Executes dropped EXE
      PID:2920
    • C:\Users\Admin\AppData\Local\Temp\0f444a8d70b3435687edc5897a8323c7.exe
      "C:\Users\Admin\AppData\Local\Temp\0f444a8d70b3435687edc5897a8323c7.exe"
      2⤵
      • Executes dropped EXE
      PID:2552
    • C:\Users\Admin\AppData\Local\Temp\852f58bf06a14efca8e2bf2c47ab6ed8.exe
      "C:\Users\Admin\AppData\Local\Temp\852f58bf06a14efca8e2bf2c47ab6ed8.exe"
      2⤵
      • Executes dropped EXE
      PID:1492
    • C:\Users\Admin\AppData\Local\Temp\e3f0bf409d7a4716a21befa311642e84.exe
      "C:\Users\Admin\AppData\Local\Temp\e3f0bf409d7a4716a21befa311642e84.exe"
      2⤵
      • Executes dropped EXE
      PID:1760
    • C:\Users\Admin\AppData\Local\Temp\566ce5b41c124d1a97bf3d6df32deaa9.exe
      "C:\Users\Admin\AppData\Local\Temp\566ce5b41c124d1a97bf3d6df32deaa9.exe"
      2⤵
      • Executes dropped EXE
      PID:3028
    • C:\Users\Admin\AppData\Local\Temp\f85a2c7991f54ffd879946bb79aa7f57.exe
      "C:\Users\Admin\AppData\Local\Temp\f85a2c7991f54ffd879946bb79aa7f57.exe"
      2⤵
      • Executes dropped EXE
      PID:1220
    • C:\Users\Admin\AppData\Local\Temp\07f581c18f034082b0d1fb685027aadf.exe
      "C:\Users\Admin\AppData\Local\Temp\07f581c18f034082b0d1fb685027aadf.exe"
      2⤵
      • Executes dropped EXE
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a43d192e36bd424bb6e5cf06dfdc1c7b.exe

    Filesize

    997KB

    MD5

    28aaac578be4ce06cb695e4f927b4302

    SHA1

    880ab0560b81e05e920f9ec1d6c0ecf5e04eaa7e

    SHA256

    8929d3b749ff91527b8e407eff6bde4bb0bb27739313b5c0db0434cbf700dbfc

    SHA512

    068698bda0543c773b36830f6760456e40e9046d9d20089ad88cb646ef5c7bd6c6716c6d59cfc7abd5bffb9129f5a7076e2f9c9b321795f224923f00b7b91374

  • \Users\Admin\AppData\Local\Temp\0df5f17d1c2b4426aaba2fbf1465533e.exe

    Filesize

    583KB

    MD5

    320b1115164e8b5e1316d86eb29cd299

    SHA1

    bc046d8b14359a7a2bebdecbb819e76c47d84d1b

    SHA256

    d88f5b00da5f05ab7f55fd7c414bb56aaf47e9f51365aaabd71f3ace3cc77523

    SHA512

    fab558cf31aa79caf8e4f6e5649e4e484de3e29bae1386aa61749b70e8c791d74b01fa964501d4755c7688d0420e932f30e36699a2fe4488fae82ee23558afd0

  • \Users\Admin\AppData\Local\Temp\80418bb593e4414ea463ba0375344142.exe

    Filesize

    844KB

    MD5

    8cac1595b184f66d7a122af38d5dfe71

    SHA1

    e0bc0162472edf77a05134e77b540663ac050ab6

    SHA256

    00201a2fd4916193c9c7bbba7be6a77fa5876085480b67da4e1228fd8b23ae5f

    SHA512

    88d3753ce73bbf95ee1fdbdff21eb9331e59ca92cfa5c489f141c07dc90871e3032e331c9dd77b1fec4522add3ac25c51d5c699d7801a5343dd2ae447c60f8f8

  • memory/2176-7-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-5-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-6-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-0-0x0000000074E71000-0x0000000074E72000-memory.dmp

    Filesize

    4KB

  • memory/2176-4-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-2-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB

  • memory/2176-1-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB

  • memory/2792-14-0x000007FEF5FCE000-0x000007FEF5FCF000-memory.dmp

    Filesize

    4KB

  • memory/2792-15-0x000007FEF5D10000-0x000007FEF66AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-16-0x000007FEF5D10000-0x000007FEF66AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-17-0x000007FEF5D10000-0x000007FEF66AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2792-18-0x000007FEF5D10000-0x000007FEF66AD000-memory.dmp

    Filesize

    9.6MB