Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 01:46

General

  • Target

    c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832N.exe

  • Size

    172KB

  • MD5

    261848a51883c136a6c377f9e3829e70

  • SHA1

    64280ed890cb9fe4d241626f85e8e02a59c04973

  • SHA256

    c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832

  • SHA512

    b74c7a2f8142703bbd2717faf5222dd8caf9adb22b9e54124bbe3e0e61eeeca849f730cdccd616572868c0e3ea3c79181ef6a5d8aee1dfc48e9642b582ba44ef

  • SSDEEP

    3072:UVqoCl/YgjxEufVU0TbTyDDalR5n93273/+yJKi:UsLqdufVUNDa9932aA

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

pakEt

C2

condition-clearance.gl.at.ply.gg:7070

Mutex

9d3a575fdcc2dd1782d18ac5655a8b28

Attributes
  • reg_key

    9d3a575fdcc2dd1782d18ac5655a8b28

  • splitter

    |'|'|

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832N.exe
    "C:\Users\Admin\AppData\Local\Temp\c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2328
    • \??\c:\users\admin\appdata\local\temp\c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832n.exe 
      c:\users\admin\appdata\local\temp\c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832n.exe 
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\svchost.exe
        "C:\Windows\svchost.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1068
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2636
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5076
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2560
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4608
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832n.exe 

    Filesize

    37KB

    MD5

    e20a459e155e9860e8a00f4d4a6015bf

    SHA1

    982fe6b24779fa4a64a154947aca4d5615a7af86

    SHA256

    d6ee68c0057fd95a29a2f112c19cb556837eff859071827bc5d37069742d96cc

    SHA512

    381a3c27328e30a06125c2fa45334ca84aaff7904afb032e4fd6dec1474179787f0d87e93804b7b79e74987e2977ea19d64de05872c7f4fe1ca818199ed30d02

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    edc7efb97bad94e5181e078187289764

    SHA1

    a07df0cea2cafbd5c017ae77469158fefdd9798a

    SHA256

    dd2ff746f7abdb1219100713a2adb1ba577099a2f930130a01ef760f437c42c2

    SHA512

    78df16d4c8fe85a09a0d97d3f98508e9cb4fa22d71744bad09d31f82bfc6f084ed21638815821542ac5d4868c013454adbc9cec1f033a1be1502fd8b80c43b38

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    1b8c07e11c52ef2fb9ed40e8e942ee9f

    SHA1

    e65730e6bb319915563b321c20bc6edfdc0c83fd

    SHA256

    e2ab3cef99cb3c6a9f27db39bf73b828e6580f4200fb389c3f9950693d9ab7af

    SHA512

    ff7e316e231f77dbb5dd88b3d5f37848b916f0085bb6a85565f3551020637bbb5598df4dbab5d627a652fc1fa453dac6350410320d2503e2b209f6f85fbe674e

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    8c861f680a0cf760ac67dba543d533e3

    SHA1

    dde4b372ead2c401feb22ffc80679b8e6464b705

    SHA256

    b882dca8a424d53928fe8b35853cdb2faa8985741b29071f17b7e5e177bf6ee7

    SHA512

    52800f0e665c6000def1d6750cc9eb6e6cb837a588ce44cf71ddc64c4218827d9c21ae811aa8874b895c395e948460a56328deaac2120be681ff7d0596a83bfd

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    99175c8b052097d2fda9e437425e5f28

    SHA1

    07e1bff230f8717de4c561e3e691934dd6f7bad7

    SHA256

    0a0e950c095461de61c667d28b245a8a1011a385b1c1b91235d8289b37a23f84

    SHA512

    ac6430e48a33a6361b277a9286f9935b59e13e3cdf04ade28e8092a49d5f36240084ed63879feb49dde92d5ecb4964991f3482a66dc0d83829055bcf51f75b4d

  • C:\Windows\svchost.exe

    Filesize

    172KB

    MD5

    261848a51883c136a6c377f9e3829e70

    SHA1

    64280ed890cb9fe4d241626f85e8e02a59c04973

    SHA256

    c3d4926f7dc1a953eb062f469e7c6e72432e2872e38e125c422f1240a8de3832

    SHA512

    b74c7a2f8142703bbd2717faf5222dd8caf9adb22b9e54124bbe3e0e61eeeca849f730cdccd616572868c0e3ea3c79181ef6a5d8aee1dfc48e9642b582ba44ef

  • memory/1068-56-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2328-69-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2328-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-66-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2636-68-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4608-57-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4608-71-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4700-67-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5076-70-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5080-11-0x0000000074EF0000-0x00000000754A1000-memory.dmp

    Filesize

    5.7MB

  • memory/5080-9-0x0000000074EF2000-0x0000000074EF3000-memory.dmp

    Filesize

    4KB

  • memory/5080-61-0x0000000074EF0000-0x00000000754A1000-memory.dmp

    Filesize

    5.7MB

  • memory/5080-10-0x0000000074EF0000-0x00000000754A1000-memory.dmp

    Filesize

    5.7MB

  • memory/5080-23-0x0000000074EF2000-0x0000000074EF3000-memory.dmp

    Filesize

    4KB

  • memory/5080-24-0x0000000074EF0000-0x00000000754A1000-memory.dmp

    Filesize

    5.7MB