Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 00:38
Static task
static1
Behavioral task
behavioral1
Sample
f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe
Resource
win10v2004-20241007-en
General
-
Target
f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe
-
Size
120KB
-
MD5
d986b47402659be6080d4ed28b9f0875
-
SHA1
db348146d329c59b7fe35a87d228db2b9e22b906
-
SHA256
f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2
-
SHA512
14e5258df799fd5c9f428b692def624063484933e788f2e05469bd281e5d2330928cd9a1f595f260dcd99b3713f49d371ebf09b0ee4282bc08edaf05b085fb3b
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVgd:P5eznsjsguGDFqGZ2rDLm
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2904 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 1692 chargeable.exe 316 chargeable.exe 2248 chargeable.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe 1632 f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe" f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1692 set thread context of 316 1692 chargeable.exe 32 PID 1692 set thread context of 2248 1692 chargeable.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargeable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargeable.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe Token: 33 316 chargeable.exe Token: SeIncBasePriorityPrivilege 316 chargeable.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1692 1632 f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe 30 PID 1632 wrote to memory of 1692 1632 f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe 30 PID 1632 wrote to memory of 1692 1632 f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe 30 PID 1632 wrote to memory of 1692 1632 f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe 30 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 316 1692 chargeable.exe 32 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 1692 wrote to memory of 2248 1692 chargeable.exe 31 PID 316 wrote to memory of 2904 316 chargeable.exe 34 PID 316 wrote to memory of 2904 316 chargeable.exe 34 PID 316 wrote to memory of 2904 316 chargeable.exe 34 PID 316 wrote to memory of 2904 316 chargeable.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe"C:\Users\Admin\AppData\Local\Temp\f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
PID:2248
-
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fa84e4bcc92aa5db735ab50711040cde
SHA1084f1cb4c47fdd3be1c833f58359ec8e16f61eb4
SHA2566d7205e794fde4219a62d9692ecddf612663a5cf20399e79be87b851fca4ca33
SHA512261a327ed1dffd4166e215d17bfd867df5b77017ba72c879fb2675cfb8eef48b374f6de41da0e51ba7adb9c0165bb2c831840603e873f6429963afd0cb93007f
-
Filesize
1KB
MD53e3aed1c0ba46c98a8ef6b3bec083998
SHA18df2ba67925f2c9580ead34fc567acd35c55b416
SHA2563fab079f84b987b1a1e305228bd9d2c7dc9a4033b62d3715073c009391fc949f
SHA512f0afb50c3ca2843e0dde736e5ce6d327ad2b70ae3e04c46c658878208dbd242059efc414f8eff22e9e6034a4a4948b34bdd612c5156c3d9a7fcbd38238066b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE
Filesize264B
MD5245ef21018084976996abf3405835b78
SHA1693ea2f7a1ba26d130f69427aaebcbc026cb6352
SHA256c5eea923eae19603b82de828eee968e258c639ce2c8cd900f5e0b624ff308cda
SHA512d62af1166c4e3da110372da1d8e05d926c6923f8ee6e17c352c224c816d05602a5ce5c5f3fe56beb7820ae7e9dff11d1162fd671c779e3f8d65a9c962b6c0cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55736ab4485ec2f810004879e34f1ba33
SHA1da7d42980270fe3232c1ece99f9af7651c7ad1cb
SHA2561a58d046cd8177edfc50b64666f6d005785a98d8b4bf366b089afee59e6b6e0e
SHA5129b70d669950617bd2334b9eac58798452bd82799d07a52ac49bed3eac560d678d46fbfbafb9bdbf10f9bfca8f52c872fb07314cf28cdff3fbe87ba1fbf841756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa271b6b4384ebd98e4d849086149fab
SHA1792a131ccc7fc1726fdeb53337a14ec8c765a90c
SHA256f832b193ba751e8401cc710a3921329bb56e91c3da5629a94b8cb4efefcaff26
SHA51211850cdb0b72c9f1ee2b9adac6f9c5f822008d58d534a823b2b4d7ca8e0c3a08152025ccb8fa07b1429770d421ea7a272afc0245787f9d88603f992662604199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e46c4c39ae4188ceb43ba75806ae31b
SHA1efc226939a4d6d196e5820e7f16368088d1a9bb9
SHA25623425dc29ddfb67838ce5da32debb8baf4aa2a38e48233e394b6374a89a0133f
SHA512af9a59d0eb1e61170e3729cf599034c0afbaadc3f778ec16516aabcbfafcc4e0ff4ef5215434492ea26b26a76b41be98c0c5f96baaf63761a8ff290bb6b24e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0018BB1B5834735BFA60CD063B31956
Filesize252B
MD57abc3e8344746f31fa92a2622d29a043
SHA149b78218d4f82f0ba6ed9fd8158c142df803f95f
SHA256f94c2a0624d55b6e6f5e4739c96e05db864bef0912fc45962f695f7f11f51988
SHA512421c0437b53310c136b0b4cf5e66dbcdc205c7c366643ac5510955dee884bd6e8fa7ca24e0ca5227f8a14c3e5eafd5776e92aa351d8f1142175790459a0578c6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
120KB
MD5cccf45956d6682f5b0bfc1f2fc71f613
SHA1a3154fd07e431fd7c360871fc32b90d683e50745
SHA25618fa33d71fc0a3ea8a66ac6a04d8f4415a79953e9d336a16d3e82a239c497082
SHA512ceec987ff4bbcfb850a00cdf3b45bb771f157643734e683c8a5ac18aeef65ee49d35eae89709f5ea76df5c548efcfdc5ae5235f01fcfca1dbd396cd81f771687