Resubmissions

10-12-2024 13:33

241210-qtg28swqav 10

10-12-2024 13:32

241210-qsxraswphz 10

Analysis

  • max time kernel
    54s
  • max time network
    54s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-12-2024 13:33

General

  • Target

    njRAT-v0.6.4.zip

  • Size

    1.5MB

  • MD5

    3ccce9d87ce9ea751abea094d1639d0a

  • SHA1

    427867b229e02869ac68de3a605998a585ad6a80

  • SHA256

    5ff121c57e4a2f2f75e4985660c9666a44b39ef2549b29b3a4d6a1e06e6e3f65

  • SHA512

    c2b77936b7238582a92d21ff9149e7eeeef65004fc5528148ecbaf9467252dff138ce545fe90bd8c621e82c38b9e0e44f022550e0cc5e5b134e504919142fe8d

  • SSDEEP

    49152:pmRkTADhN5ulDigt8pri+kxs9/z/pH+3h:pmRulu48p2VU/z/S

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\njRAT-v0.6.4.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:128
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2836
    • C:\Users\Admin\Desktop\njRAT-v0.6.4\njRAT.exe
      "C:\Users\Admin\Desktop\njRAT-v0.6.4\njRAT.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\njRAT.exe
        "C:\njRAT.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5012
      • C:\njq8.exe
        "C:\njq8.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3504
        • C:\Users\Admin\AppData\Local\Temp\windows.exe
          "C:\Users\Admin\AppData\Local\Temp\windows.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3716
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\windows.exe" "windows.exe" ENABLE
            4⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3884
    • C:\Users\Admin\Desktop\njRAT-v0.6.4\njRAT.exe
      "C:\Users\Admin\Desktop\njRAT-v0.6.4\njRAT.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4868
    • C:\Users\Admin\Desktop\njRAT-v0.6.4\njRAT.exe
      "C:\Users\Admin\Desktop\njRAT-v0.6.4\njRAT.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\njRAT-v0.6.4\njRAT.exe

      Filesize

      959KB

      MD5

      0431311b5f024d6e66b90d59491f2563

      SHA1

      e9ff4da7e3f2199cbc16d37d8935cb1b0567ac2a

      SHA256

      fd624aa205517580e83fad7a4ce4d64863e95f62b34ac72647b1974a52822199

      SHA512

      d44b14e4b24e6e2d506ec32098488a16ebd5df57499ecd85e8878b8af2a3e1f9ed20d4125836417b702d0571f992aeac07af051dbf9268f48954556d17f51ee2

    • C:\njRAT.exe

      Filesize

      898KB

      MD5

      08f223ac15e2e92561ed310ae71415c1

      SHA1

      0a871a4b376bd8771188b96a9a1bb6fe1205160d

      SHA256

      51f2aec8b6de1e49b1ca74203afd380484932b07067a91f027548bc20b8967ec

      SHA512

      9acc7b4976c23fa019361b52eb22dcdfbf0bb1039aa8c8e74507f0501709616757a2d762d0478956a03bfadecdee812c9aa2360655891ab4ed1de96f35e23cd4

    • C:\njq8.exe

      Filesize

      28KB

      MD5

      edc4f10a5e164db64bf79eca207f2749

      SHA1

      d08eb761a5446a4409a72f3af3fb8dd60eec7c92

      SHA256

      ce6421107031175f39e61d3bcc5a98d1d94190e250034e27cdbebbadcba084a4

      SHA512

      e974a32096cc58c1a78c7aa8714b8b8b7a202859905a28d5ce61fd9a563382a7577825e8c9ee612d7ba708f3efef01a43d07df03e7c1e3e52d0cb32240d5d15d

    • memory/3760-30-0x0000000005510000-0x00000000055AC000-memory.dmp

      Filesize

      624KB

    • memory/3760-31-0x0000000005B60000-0x0000000006106000-memory.dmp

      Filesize

      5.6MB

    • memory/3760-32-0x00000000055B0000-0x0000000005642000-memory.dmp

      Filesize

      584KB

    • memory/3760-33-0x00000000054C0000-0x00000000054CA000-memory.dmp

      Filesize

      40KB

    • memory/3760-34-0x00000000057B0000-0x0000000005806000-memory.dmp

      Filesize

      344KB

    • memory/3760-35-0x00000000744A0000-0x0000000074C51000-memory.dmp

      Filesize

      7.7MB

    • memory/3760-29-0x0000000000930000-0x0000000000A28000-memory.dmp

      Filesize

      992KB

    • memory/3760-28-0x00000000744AE000-0x00000000744AF000-memory.dmp

      Filesize

      4KB

    • memory/3760-65-0x00000000744AE000-0x00000000744AF000-memory.dmp

      Filesize

      4KB

    • memory/3760-66-0x00000000744A0000-0x0000000074C51000-memory.dmp

      Filesize

      7.7MB