Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 11:07

General

  • Target

    matrix loder.exe

  • Size

    55KB

  • MD5

    9a282dfc7b4208af4e6404a9f3286afb

  • SHA1

    2bc2dc49c846a80f92024e3f999a7d3e576fa03b

  • SHA256

    6d58a49e876e1a2b53c0314e17306eff78819064b44618ae23029ffe0a5ba79f

  • SHA512

    4a40417a223f79b250347c4afd1c578f6bc42ce7bdee70d5494a20a09ff40c96237eb0a376c9c49c4d48cb5484b2eca8a7c26b732460ff0c9a94d7dfcabdf7be

  • SSDEEP

    1536:MRksDnHNwZ8Cam8LDdwsNMD2XExI3pmJm:DsDn6SKiDdwsNMD2XExI3pm

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\matrix loder.exe
    "C:\Users\Admin\AppData\Local\Temp\matrix loder.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3116
    • C:\Users\Admin\AppData\Local\Temp\eb6c0665199b471191a006b7de4a93c6.exe
      "C:\Users\Admin\AppData\Local\Temp\eb6c0665199b471191a006b7de4a93c6.exe"
      2⤵
        PID:3852
      • C:\Users\Admin\AppData\Local\Temp\05598784cea345b7bf00754949e8d22c.exe
        "C:\Users\Admin\AppData\Local\Temp\05598784cea345b7bf00754949e8d22c.exe"
        2⤵
          PID:4472
        • C:\Users\Admin\AppData\Local\Temp\5a4dfeeea87f4ff989112d05e79405ea.exe
          "C:\Users\Admin\AppData\Local\Temp\5a4dfeeea87f4ff989112d05e79405ea.exe"
          2⤵
            PID:1716
          • C:\Users\Admin\AppData\Local\Temp\dc1bdf1f7dd347b59f957361a763722e.exe
            "C:\Users\Admin\AppData\Local\Temp\dc1bdf1f7dd347b59f957361a763722e.exe"
            2⤵
              PID:2240
            • C:\Users\Admin\AppData\Local\Temp\38df3daf9da9424bba5b40bdb215b412.exe
              "C:\Users\Admin\AppData\Local\Temp\38df3daf9da9424bba5b40bdb215b412.exe"
              2⤵
                PID:3964
              • C:\Users\Admin\AppData\Local\Temp\c63e0715022141e59e6dcc2689c1b614.exe
                "C:\Users\Admin\AppData\Local\Temp\c63e0715022141e59e6dcc2689c1b614.exe"
                2⤵
                  PID:2144
                • C:\Users\Admin\AppData\Local\Temp\86bf581528ff4495b5c7a30c145f04a1.exe
                  "C:\Users\Admin\AppData\Local\Temp\86bf581528ff4495b5c7a30c145f04a1.exe"
                  2⤵
                    PID:4616
                  • C:\Users\Admin\AppData\Local\Temp\d3b065d259d34263b16763109fd9d50c.exe
                    "C:\Users\Admin\AppData\Local\Temp\d3b065d259d34263b16763109fd9d50c.exe"
                    2⤵
                      PID:3352
                  • C:\Windows\system32\AUDIODG.EXE
                    C:\Windows\system32\AUDIODG.EXE 0x478 0x37c
                    1⤵
                      PID:3664

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\38df3daf9da9424bba5b40bdb215b412.exe

                      Filesize

                      997KB

                      MD5

                      28aaac578be4ce06cb695e4f927b4302

                      SHA1

                      880ab0560b81e05e920f9ec1d6c0ecf5e04eaa7e

                      SHA256

                      8929d3b749ff91527b8e407eff6bde4bb0bb27739313b5c0db0434cbf700dbfc

                      SHA512

                      068698bda0543c773b36830f6760456e40e9046d9d20089ad88cb646ef5c7bd6c6716c6d59cfc7abd5bffb9129f5a7076e2f9c9b321795f224923f00b7b91374

                    • C:\Users\Admin\AppData\Local\Temp\d3b065d259d34263b16763109fd9d50c.exe

                      Filesize

                      961KB

                      MD5

                      4723c3c04794c09bbcb6e03f48440f15

                      SHA1

                      a5ef69c9dc9eacc2099d9c239146a0e360f1837f

                      SHA256

                      0d635f035cdb2fd3afda768cd631481ff980957b614a3cf3fca6c592c6c06470

                      SHA512

                      5b68e1cd3d6bb85b5f449014cc288423faea76ff0ecf8834047dac1ed6e84c4d858a7ed23abe3625d781391f636893736bf5c00474ad0995e75611c1557c5c4a

                    • C:\Users\Admin\AppData\Local\Temp\eb6c0665199b471191a006b7de4a93c6.exe

                      Filesize

                      345KB

                      MD5

                      8efb7339fe13cf8cea9f6445776655c0

                      SHA1

                      081afd73c757c83825cf1e8ed4a4eab259d23b97

                      SHA256

                      c1badbacd2abe44fe4e8685c8eee7e983bf8b6780cfca03ae31f8fcebc98b1fb

                      SHA512

                      2a37e74aeff17b4f435d02a30019a017a4ff4fa29fc898229f6195876f53b38154c063cf052deebcc06785650f875d67eeb0de372a76df3c4e71bd4fc0392956

                    • memory/3116-0-0x0000000074C92000-0x0000000074C93000-memory.dmp

                      Filesize

                      4KB

                    • memory/3116-1-0x0000000074C90000-0x0000000075241000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3116-2-0x0000000074C90000-0x0000000075241000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3116-4-0x0000000074C92000-0x0000000074C93000-memory.dmp

                      Filesize

                      4KB

                    • memory/3116-5-0x0000000074C90000-0x0000000075241000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3116-6-0x0000000074C90000-0x0000000075241000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3116-7-0x0000000074C90000-0x0000000075241000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3116-8-0x0000000074C90000-0x0000000075241000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3852-23-0x00007FFBC2E70000-0x00007FFBC3811000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/3852-40-0x000000001BE20000-0x000000001BE6C000-memory.dmp

                      Filesize

                      304KB

                    • memory/3852-25-0x000000001B700000-0x000000001BBCE000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/3852-20-0x00007FFBC3125000-0x00007FFBC3126000-memory.dmp

                      Filesize

                      4KB

                    • memory/3852-39-0x000000001B040000-0x000000001B048000-memory.dmp

                      Filesize

                      32KB

                    • memory/3852-100-0x00007FFBC2E70000-0x00007FFBC3811000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/3852-98-0x00007FFBC2E70000-0x00007FFBC3811000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/3852-22-0x00007FFBC2E70000-0x00007FFBC3811000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/3852-36-0x000000001BCC0000-0x000000001BD5C000-memory.dmp

                      Filesize

                      624KB

                    • memory/3852-21-0x000000001B180000-0x000000001B226000-memory.dmp

                      Filesize

                      664KB

                    • memory/3852-97-0x00007FFBC3125000-0x00007FFBC3126000-memory.dmp

                      Filesize

                      4KB

                    • memory/4472-41-0x00007FFBC2E70000-0x00007FFBC3811000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4472-38-0x00007FFBC2E70000-0x00007FFBC3811000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4472-102-0x00007FFBC2E70000-0x00007FFBC3811000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4472-37-0x00007FFBC2E70000-0x00007FFBC3811000-memory.dmp

                      Filesize

                      9.6MB