Analysis

  • max time kernel
    46s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 03:25

General

  • Target

    HQ Dorks Generator.exe

  • Size

    848KB

  • MD5

    a920b8ebf266ee37c1e114ae12dba6a1

  • SHA1

    ad742e8769fbe8e089707bc3d81f3348b54f6838

  • SHA256

    bd0be20774a92281bace372798dd040d22139c183c75640d234a3df26d4bd089

  • SHA512

    cbb9b70c7fe3ff38b7141ab7a3278b9864b0c1300ea40f374b61f4c062e70aad1fa04efc92415585104c4524f468c0bcbc3d133e0eb12782c1bef599f1c126a4

  • SSDEEP

    12288:0/t6UGM7QsdexpZwbsfxOXurBjpOUREzLw2f1WrG8HXXQG6:RG5+obsfxlrBj0+EzLwW1T8HQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10cpanel.hackcrack.io:33982

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HQ Dorks Generator.exe
    "C:\Users\Admin\AppData\Local\Temp\HQ Dorks Generator.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1668
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1708
            • C:\Windows\system32\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" "explorer.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:1956
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      PID:2180
    • C:\Users\Admin\AppData\Local\Temp\HQ Dorks Generator .exe
      "C:\Users\Admin\AppData\Local\Temp\HQ Dorks Generator .exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\HQ Dorks Generator .exe

    Filesize

    352KB

    MD5

    047f6a433933c39cde9f6025d5d1a9cd

    SHA1

    29ce4ed295f8bdb648abfdb3fa43daa320573fca

    SHA256

    87260300a5d5575a76dd44c3f0ae8c4bad7e94000990d67c9e7fffcedb586473

    SHA512

    9227991f2126d7948ccb30c80d62162b82e12119edf5c9503a19b60d4b6b2bfe899536e7df47d960ec1128e70bb30a1fa0c93557e9d179c144298d133448d065

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe

    Filesize

    477KB

    MD5

    0e6c9432cba1614fccc232f201028c72

    SHA1

    6082cf9489faa785c066195f108548e705a6d407

    SHA256

    c9a2faffee3de29e278a89e54b07edb1f520f5e665480a1002d401fd83cde2e8

    SHA512

    c341000eb6f10c3ee1fb722914abb8ba2e1a3ab32a0ccdd92561c0604d58924699d3f9886b8bd03ab13223c9c78eef74045b181520298dba3323a2809c670abb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

    Filesize

    358KB

    MD5

    59a4e3557cba5cd6e3241bc17cabb577

    SHA1

    d668b5fc3bd2fdf0b556cc62d863cc663c859d14

    SHA256

    524f0223999e825f11898e1bac85bcf7526902da9d2796f42a068144cdd0dc53

    SHA512

    64e3ae8f6ad577fd51446f6013efcd6d4883c7b27effdc89993c17a2b8f4570bee0ae1557fc76483220064b1b799b01b821b8fc5d9180e9d76f10b96ac278ecb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

    Filesize

    339KB

    MD5

    301e8d9a2445dd999ce816c17d8dbbb3

    SHA1

    b91163babeb738bd4d0f577ac764cee17fffe564

    SHA256

    2ea1fa52a6896ce0100084e3696712d76b4d1e995ca0012954bae3107562a9eb

    SHA512

    4941a820d26206fa3e333419622c3b07c8ebdaad51d1c6976df912e9ec123ad39a0c67fb5c3e362658f8463b366892fc4575d4cc2ebe62c2011d10ed5eb6bba3

  • memory/1668-48-0x0000000000310000-0x000000000031C000-memory.dmp

    Filesize

    48KB

  • memory/1900-22-0x0000000001310000-0x0000000001370000-memory.dmp

    Filesize

    384KB

  • memory/1900-35-0x00000000005D0000-0x0000000000610000-memory.dmp

    Filesize

    256KB

  • memory/2540-20-0x00000000009C0000-0x00000000009EC000-memory.dmp

    Filesize

    176KB

  • memory/2540-15-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2540-34-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2540-18-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2788-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3016-0-0x000007FEF633E000-0x000007FEF633F000-memory.dmp

    Filesize

    4KB

  • memory/3016-19-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/3016-3-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/3016-2-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB