Analysis

  • max time kernel
    135s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 14:41

Errors

Reason
Machine shutdown

General

  • Target

    lets have sex.exe

  • Size

    55KB

  • MD5

    49fe3af39f2e39b36d6519db50f05b5d

  • SHA1

    b96571c6056a6542e2e108565724ff6f8f719191

  • SHA256

    97d20ed5cc0e56db47810a100458ebc40a9c3ab4f330d3f2e6c46d3df95ee607

  • SHA512

    3a3b7385d53d237c0f1b0f313378fef57e06777bb93a426ba6496d74ffca1b2800b6af9d5f82806221dc4fe8bc9f95087208641770d88ba60e0dbf1d7ac5054b

  • SSDEEP

    1536:KeksDnHNwZ8Cam8LDdwsNMDbXExI3pmAm:usDn6SKiDdwsNMDbXExI3pm

Score
10/10

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 35 IoCs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lets have sex.exe
    "C:\Users\Admin\AppData\Local\Temp\lets have sex.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c shutdown /s /f /t 60
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown /s /f /t 60
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
    • C:\Users\Admin\AppData\Local\Temp\0625a2a2e6ca41ee9bf6c3cf76655dcd.exe
      "C:\Users\Admin\AppData\Local\Temp\0625a2a2e6ca41ee9bf6c3cf76655dcd.exe"
      2⤵
      • Executes dropped EXE
      PID:1548
    • C:\Users\Admin\AppData\Local\Temp\70b81aa17a084c4ba8e39cba13fe101e.exe
      "C:\Users\Admin\AppData\Local\Temp\70b81aa17a084c4ba8e39cba13fe101e.exe"
      2⤵
      • Executes dropped EXE
      PID:344
    • C:\Users\Admin\AppData\Local\Temp\7c1fdd5516c948558cc11777fc061043.exe
      "C:\Users\Admin\AppData\Local\Temp\7c1fdd5516c948558cc11777fc061043.exe"
      2⤵
      • Executes dropped EXE
      PID:972
    • C:\Users\Admin\AppData\Local\Temp\36db9e2ccbac4de2953ec8443f0f517f.exe
      "C:\Users\Admin\AppData\Local\Temp\36db9e2ccbac4de2953ec8443f0f517f.exe"
      2⤵
      • Executes dropped EXE
      PID:1088
    • C:\Users\Admin\AppData\Local\Temp\1eed2ff2df63433b84483fc9b06c159a.exe
      "C:\Users\Admin\AppData\Local\Temp\1eed2ff2df63433b84483fc9b06c159a.exe"
      2⤵
      • Executes dropped EXE
      PID:1620
    • C:\Users\Admin\AppData\Local\Temp\ce005d93ee724282a6821f8ec6c059dd.exe
      "C:\Users\Admin\AppData\Local\Temp\ce005d93ee724282a6821f8ec6c059dd.exe"
      2⤵
      • Executes dropped EXE
      PID:1152
    • C:\Users\Admin\AppData\Local\Temp\00f514cf1fd2421e830fed501811aca2.exe
      "C:\Users\Admin\AppData\Local\Temp\00f514cf1fd2421e830fed501811aca2.exe"
      2⤵
      • Executes dropped EXE
      PID:316
    • C:\Users\Admin\AppData\Local\Temp\5742712c12164dd4ae7a086bc06693a7.exe
      "C:\Users\Admin\AppData\Local\Temp\5742712c12164dd4ae7a086bc06693a7.exe"
      2⤵
      • Executes dropped EXE
      PID:1484
    • C:\Users\Admin\AppData\Local\Temp\5581e845e2434101bbe4c3f3a81d8256.exe
      "C:\Users\Admin\AppData\Local\Temp\5581e845e2434101bbe4c3f3a81d8256.exe"
      2⤵
      • Executes dropped EXE
      PID:2756
    • C:\Users\Admin\AppData\Local\Temp\92216ffeca7141c99469ea42bd76c52b.exe
      "C:\Users\Admin\AppData\Local\Temp\92216ffeca7141c99469ea42bd76c52b.exe"
      2⤵
      • Executes dropped EXE
      PID:2656
    • C:\Users\Admin\AppData\Local\Temp\8699924f6f24446d829625aca8b1c5dc.exe
      "C:\Users\Admin\AppData\Local\Temp\8699924f6f24446d829625aca8b1c5dc.exe"
      2⤵
      • Executes dropped EXE
      PID:1564
    • C:\Users\Admin\AppData\Local\Temp\24e0c8e992094184a32d9cbda9d39aa4.exe
      "C:\Users\Admin\AppData\Local\Temp\24e0c8e992094184a32d9cbda9d39aa4.exe"
      2⤵
      • Executes dropped EXE
      PID:1736
    • C:\Users\Admin\AppData\Local\Temp\33f19d8337244fce9a42be21a1bb8223.exe
      "C:\Users\Admin\AppData\Local\Temp\33f19d8337244fce9a42be21a1bb8223.exe"
      2⤵
      • Executes dropped EXE
      PID:2680
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4ec
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2200
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2880
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2016

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\70b81aa17a084c4ba8e39cba13fe101e.exe

        Filesize

        961KB

        MD5

        4723c3c04794c09bbcb6e03f48440f15

        SHA1

        a5ef69c9dc9eacc2099d9c239146a0e360f1837f

        SHA256

        0d635f035cdb2fd3afda768cd631481ff980957b614a3cf3fca6c592c6c06470

        SHA512

        5b68e1cd3d6bb85b5f449014cc288423faea76ff0ecf8834047dac1ed6e84c4d858a7ed23abe3625d781391f636893736bf5c00474ad0995e75611c1557c5c4a

      • \Users\Admin\AppData\Local\Temp\0625a2a2e6ca41ee9bf6c3cf76655dcd.exe

        Filesize

        844KB

        MD5

        8cac1595b184f66d7a122af38d5dfe71

        SHA1

        e0bc0162472edf77a05134e77b540663ac050ab6

        SHA256

        00201a2fd4916193c9c7bbba7be6a77fa5876085480b67da4e1228fd8b23ae5f

        SHA512

        88d3753ce73bbf95ee1fdbdff21eb9331e59ca92cfa5c489f141c07dc90871e3032e331c9dd77b1fec4522add3ac25c51d5c699d7801a5343dd2ae447c60f8f8

      • \Users\Admin\AppData\Local\Temp\36db9e2ccbac4de2953ec8443f0f517f.exe

        Filesize

        583KB

        MD5

        320b1115164e8b5e1316d86eb29cd299

        SHA1

        bc046d8b14359a7a2bebdecbb819e76c47d84d1b

        SHA256

        d88f5b00da5f05ab7f55fd7c414bb56aaf47e9f51365aaabd71f3ace3cc77523

        SHA512

        fab558cf31aa79caf8e4f6e5649e4e484de3e29bae1386aa61749b70e8c791d74b01fa964501d4755c7688d0420e932f30e36699a2fe4488fae82ee23558afd0

      • \Users\Admin\AppData\Local\Temp\7c1fdd5516c948558cc11777fc061043.exe

        Filesize

        997KB

        MD5

        28aaac578be4ce06cb695e4f927b4302

        SHA1

        880ab0560b81e05e920f9ec1d6c0ecf5e04eaa7e

        SHA256

        8929d3b749ff91527b8e407eff6bde4bb0bb27739313b5c0db0434cbf700dbfc

        SHA512

        068698bda0543c773b36830f6760456e40e9046d9d20089ad88cb646ef5c7bd6c6716c6d59cfc7abd5bffb9129f5a7076e2f9c9b321795f224923f00b7b91374

      • memory/1548-31-0x00000000008D0000-0x0000000000950000-memory.dmp

        Filesize

        512KB

      • memory/2264-0-0x0000000074B31000-0x0000000074B32000-memory.dmp

        Filesize

        4KB

      • memory/2264-1-0x0000000074B30000-0x00000000750DB000-memory.dmp

        Filesize

        5.7MB

      • memory/2264-2-0x0000000074B30000-0x00000000750DB000-memory.dmp

        Filesize

        5.7MB

      • memory/2264-3-0x0000000074B30000-0x00000000750DB000-memory.dmp

        Filesize

        5.7MB

      • memory/2264-4-0x0000000074B30000-0x00000000750DB000-memory.dmp

        Filesize

        5.7MB

      • memory/2264-5-0x0000000074B30000-0x00000000750DB000-memory.dmp

        Filesize

        5.7MB

      • memory/2264-104-0x0000000074B30000-0x00000000750DB000-memory.dmp

        Filesize

        5.7MB