Analysis

  • max time kernel
    82s
  • max time network
    85s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 11:48

General

  • Target

    LaucherSynapseV4.7z

  • Size

    14KB

  • MD5

    6a51bf0c7ed3fd5c2986d2ca98bdf995

  • SHA1

    b8aa073566657c05dba53b0d61554b99cf6cb6a1

  • SHA256

    b52e16b631bdd93334a7fc621c9efb6b17bd3bb41e02b4728f3b187b27da53df

  • SHA512

    af48f8a73241d33ac51e3f0317e13b594b82f55444e9f04831b733ff7aa011a06b1e94a14b7c56e1cc754e1c3901111719f957f4d56f208436717c7d7a97433b

  • SSDEEP

    384:5nQz4K8t9rZJnPn56Oq2tmIrTTHGcMmR4G2vErfQ2hi:l79t9rZJnPnoOqkmIrTTHGcM4fhi

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:9999

Mutex

1424bc7ca87eb46d8533045fc4efb564

Attributes
  • reg_key

    1424bc7ca87eb46d8533045fc4efb564

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\LaucherSynapseV4.7z"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4856
  • C:\Users\Admin\Desktop\LaucherSynapseV4.exe
    "C:\Users\Admin\Desktop\LaucherSynapseV4.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Users\Admin\AppData\Local\Temp\MovaviVideoEditor.exe
      "C:\Users\Admin\AppData\Local\Temp\MovaviVideoEditor.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\MovaviVideoEditor.exe" "MovaviVideoEditor.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\LaucherSynapseV4.exe

    Filesize

    37KB

    MD5

    b2714f8dee77a5efdbffd8b73bed8a63

    SHA1

    6253e684263ba2a24e78f3ad309840e9da57dac4

    SHA256

    1adad232b7bed378b4e05e519ea048bcaf60e5e675c91e26186f19ac0e5cf036

    SHA512

    1b632a85e8c4313da6311e3e71c43507d30979b8e77e81452ab6a19c73731436f52506d1c4fc0317f86993996241c7a8f8c7a312ef61c92dbda08cf360ff86ef

  • memory/2140-18-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2140-17-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2140-19-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2140-20-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2140-21-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4312-4-0x0000000075332000-0x0000000075333000-memory.dmp

    Filesize

    4KB

  • memory/4312-5-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4312-6-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4312-16-0x0000000075330000-0x00000000758E1000-memory.dmp

    Filesize

    5.7MB