Analysis

  • max time kernel
    60s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/12/2024, 19:30 UTC

General

  • Target

    8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9.exe

  • Size

    93KB

  • MD5

    73c7a3c03ab43cd390c64e04374c43d9

  • SHA1

    661c1d5642647432a69c1471803a007592b16543

  • SHA256

    8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9

  • SHA512

    2cd13500928ce9179b5c8ddec0c5e07713754e8e8665f973e4006a374e210aa30c5bb5763807dc91d22cf89952f4a7ca6eda992ac3bfae684b3cf7754e087b0c

  • SSDEEP

    1536:axGq+8Tnc7iXQj5piFejEwzGi1dDIDngS:axXTnkiXE4Vi1dOg

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

20b7dddd28527b3a08b870ea6749495d

Attributes
  • reg_key

    20b7dddd28527b3a08b870ea6749495d

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9.exe
    "C:\Users\Admin\AppData\Local\Temp\8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops autorun.inf file
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2596

Network

    No results found
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
  • 127.0.0.1:5552
    server.exe
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    73c7a3c03ab43cd390c64e04374c43d9

    SHA1

    661c1d5642647432a69c1471803a007592b16543

    SHA256

    8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9

    SHA512

    2cd13500928ce9179b5c8ddec0c5e07713754e8e8665f973e4006a374e210aa30c5bb5763807dc91d22cf89952f4a7ca6eda992ac3bfae684b3cf7754e087b0c

  • C:\Users\Admin\AppData\Roaming\app

    Filesize

    5B

    MD5

    53ce6d1ae8885b5d12e654469f456c83

    SHA1

    9d8b30c523ddef4d24134072b27716bec7d94d6f

    SHA256

    d7ebf92ad6e3bc44fbc3cfbb234ef4afafd7ea339f712229641a2849b6f87ce2

    SHA512

    c15df9281e9ccbb8d30e24e751b77a030e734f8cda4bd9482d3ca02f6b23e463a8e90ddd78a582ca059e57b8d0492c22583d792bc7368094ffc06e12cd145d9d

  • memory/824-0-0x0000000074DF1000-0x0000000074DF2000-memory.dmp

    Filesize

    4KB

  • memory/824-1-0x0000000074DF0000-0x000000007539B000-memory.dmp

    Filesize

    5.7MB

  • memory/824-2-0x0000000074DF0000-0x000000007539B000-memory.dmp

    Filesize

    5.7MB

  • memory/824-14-0x0000000074DF0000-0x000000007539B000-memory.dmp

    Filesize

    5.7MB

  • memory/2728-15-0x0000000074DF0000-0x000000007539B000-memory.dmp

    Filesize

    5.7MB

  • memory/2728-16-0x0000000074DF0000-0x000000007539B000-memory.dmp

    Filesize

    5.7MB

  • memory/2728-30-0x0000000074DF0000-0x000000007539B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.