Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 06:22

General

  • Target

    enai2.exe

  • Size

    31KB

  • MD5

    a2d2fc6108063a466264a34e7c46c8a3

  • SHA1

    ddab38e1dcf749d355bf63a0eb25ce844db1d880

  • SHA256

    7812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a

  • SHA512

    2d34d5c75f2cdad94fa957c80d71f697b2fb9bd949e25d9035234c9c7a37f00fd8d92b3e7c17c84a2a65b9b4893f1336850722e4111244f2d70e0cc1eaa44145

  • SSDEEP

    768:gjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0tiX7j:3kKdisvQVk+j

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\enai2.exe
    "C:\Users\Admin\AppData\Local\Temp\enai2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\enai2.exe" "enai2.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:4384

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.210.23.2.in-addr.arpa
    IN PTR
    Response
    88.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-88deploystaticakamaitechnologiescom
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    69.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    69.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    6.tcp.eu.ngrok.io
    enai2.exe
    Remote address:
    8.8.8.8:53
    Request
    6.tcp.eu.ngrok.io
    IN A
    Response
    6.tcp.eu.ngrok.io
    IN A
    3.66.38.117
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    22.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.49.80.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    6.tcp.eu.ngrok.io
    enai2.exe
    Remote address:
    8.8.8.8:53
    Request
    6.tcp.eu.ngrok.io
    IN A
    Response
    6.tcp.eu.ngrok.io
    IN A
    3.69.115.178
  • flag-us
    DNS
    6.tcp.eu.ngrok.io
    enai2.exe
    Remote address:
    8.8.8.8:53
    Request
    6.tcp.eu.ngrok.io
    IN A
    Response
    6.tcp.eu.ngrok.io
    IN A
    52.28.247.255
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.66.38.117:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 3.69.115.178:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 52.28.247.255:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 52.28.247.255:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 52.28.247.255:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 52.28.247.255:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    260 B
    200 B
    5
    5
  • 52.28.247.255:14377
    6.tcp.eu.ngrok.io
    enai2.exe
    104 B
    2
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    88.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    88.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    69.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    69.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    6.tcp.eu.ngrok.io
    dns
    enai2.exe
    63 B
    79 B
    1
    1

    DNS Request

    6.tcp.eu.ngrok.io

    DNS Response

    3.66.38.117

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    22.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    22.49.80.91.in-addr.arpa

  • 8.8.8.8:53
    6.tcp.eu.ngrok.io
    dns
    enai2.exe
    63 B
    79 B
    1
    1

    DNS Request

    6.tcp.eu.ngrok.io

    DNS Response

    3.69.115.178

  • 8.8.8.8:53
    6.tcp.eu.ngrok.io
    dns
    enai2.exe
    63 B
    79 B
    1
    1

    DNS Request

    6.tcp.eu.ngrok.io

    DNS Response

    52.28.247.255

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4936-0-0x0000000075082000-0x0000000075083000-memory.dmp

    Filesize

    4KB

  • memory/4936-1-0x0000000075080000-0x0000000075631000-memory.dmp

    Filesize

    5.7MB

  • memory/4936-2-0x0000000075080000-0x0000000075631000-memory.dmp

    Filesize

    5.7MB

  • memory/4936-3-0x0000000075082000-0x0000000075083000-memory.dmp

    Filesize

    4KB

  • memory/4936-4-0x0000000075080000-0x0000000075631000-memory.dmp

    Filesize

    5.7MB

  • memory/4936-5-0x0000000075080000-0x0000000075631000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.