Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 03:30

General

  • Target

    4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668.exe

  • Size

    1.9MB

  • MD5

    e4c2350adc7cb595f67e309d52b2778e

  • SHA1

    08a0784691beeb777d864279612a7237075f94ee

  • SHA256

    4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668

  • SHA512

    8b39225020671ce408deba0b8d0e91dfba51e64552b8b18d9f241f2250ef72769fd55cf2c97047dc3921613d0762a86a93be92f64766b829090c93da795ca8ad

  • SSDEEP

    49152:hd6e6x01stTTAkJ/4p3ZpoWJX+vS6ljM3XyF2:hg1xThKJZpoWJO6UjaCA

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668.exe
    "C:\Users\Admin\AppData\Local\Temp\4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\Smart Binder v2.0 By Th3 Exploiter.exe
      "C:\Users\Admin\AppData\Local\Temp\Smart Binder v2.0 By Th3 Exploiter.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Roaming\server.exe
        "C:\Users\Admin\AppData\Roaming\server.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:4272
    • C:\Users\Admin\AppData\Local\Temp\SpyNet.exe
      "C:\Users\Admin\AppData\Local\Temp\SpyNet.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\SysWOW64\cscript.exe
        "C:\Windows\system32\cscript.exe" "C:\Users\Admin\AppData\Local\Temp\teste.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IP.txt

    Filesize

    132KB

    MD5

    03d1d2f69b9ec0f7250f9b24eeb93da2

    SHA1

    27ab9fdb99ddeb84329567c5336a50600a7b294f

    SHA256

    a4dd8452a287171447e42e39408c6c5c2cf720feaba69a1defece373b9d5c489

    SHA512

    562106c4c94ef6a6508acc0309dc1e354117ba4a440a078b27d4b88006fe7fcefd7feb4938b72b1233f11d442757fc2f4f9955f6df69309c8be361a4423656f7

  • C:\Users\Admin\AppData\Local\Temp\Language\Default.ini

    Filesize

    14KB

    MD5

    ee9826fd3883b9756896baed5d076cc6

    SHA1

    d1c829cabcb967410e03489723d9e51b9549d6f6

    SHA256

    e06ff3e2b4cf78d6147d00dbfd00066751d1d6680b3dd672e861574741a894d9

    SHA512

    404cfe3632fc3614a0e686504a2edcdf984aab20afc8fc4c7785d76bd52bf466078e756838c2ce5350439ad128756e55e1c3b12f3badd70fba8e74d171a05538

  • C:\Users\Admin\AppData\Local\Temp\Settings\Settings.ini

    Filesize

    1KB

    MD5

    448a49c2d7253c927e820056e9e7ea8b

    SHA1

    c7171c7b597beea4bb584319ddac80eadee5d3be

    SHA256

    afcc1b53d0e2ef177754d4f6ae9ab391e7115e39fc73caaabcb3cd585c2e4c7c

    SHA512

    54dc9c1eba0154aa648ec317c51642fd88d7dcd50b4e5f1eea5c67e1c7db91a7e8cb97d0b538e4a280d91a65fea8baa888734960fbf636b7067ac407840a5224

  • C:\Users\Admin\AppData\Local\Temp\Smart Binder v2.0 By Th3 Exploiter.exe

    Filesize

    23KB

    MD5

    f836c26e8aae6e2ba4efb47af6cecf4f

    SHA1

    65d32c3ed9f9f03033efb50fe8275a3643755f79

    SHA256

    c244ca57170c47a61d79092c13a038477a904a416b492adeb5aabe89d1620c30

    SHA512

    fa8e33791059323c754589a779b167d21cf515fb786c86a84944cf7fc8784be71842db8ee12953855141d99aab9aa707fbfd972d7229156f73168284dcba8f47

  • C:\Users\Admin\AppData\Local\Temp\SpyNet.exe

    Filesize

    2.0MB

    MD5

    98de7bcad1ba2caf74007bd97bc2b505

    SHA1

    8a79d06159a339313b810f23835b8417429dd356

    SHA256

    e4b3b3e72bd3bf4052a3136cb811ea54923bc2d7807709992e0345743d49ced8

    SHA512

    ef57cc4f0ad4bf1f54baaf7213bf868c418eebfb0eee3c32ff376b67d5d5337c35a94a1418951d82aae371820ce37eade7cf0a74ce54a4198e18327bd232a35d

  • C:\Users\Admin\AppData\Local\Temp\teste.txt

    Filesize

    2B

    MD5

    81051bcc2cf1bedf378224b0a93e2877

    SHA1

    ba8ab5a0280b953aa97435ff8946cbcbb2755a27

    SHA256

    7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

    SHA512

    1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

  • C:\Users\Admin\AppData\Local\Temp\teste.vbs

    Filesize

    841B

    MD5

    615964e5ab63a70f0e205a476c48e356

    SHA1

    292620321db69d57ba23fa98d2a89484ddcf83d0

    SHA256

    38a2c0e90a7c86eb5355710dd205f22f84dbba59e688cd3da6394af8c924a102

    SHA512

    69886825baf2075f8e6cdc50b0b34f92d5d06d42db4586396fb3db806fef79986ba5754c7b1251b007cde4f943efe9e3d27800dd7e15f8084fd7e7e6046c3ccc

  • memory/1464-22-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/1464-1105-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-20-0x00000000027C0000-0x00000000027C1000-memory.dmp

    Filesize

    4KB

  • memory/1464-1112-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-16-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1082-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1111-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1110-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1097-0x00000000027C0000-0x00000000027C1000-memory.dmp

    Filesize

    4KB

  • memory/1464-1098-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1099-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/1464-1100-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1101-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1102-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1103-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1104-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1109-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1106-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1107-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/1464-1108-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/3452-19-0x0000000073970000-0x0000000073F21000-memory.dmp

    Filesize

    5.7MB

  • memory/3452-18-0x0000000073972000-0x0000000073974000-memory.dmp

    Filesize

    8KB

  • memory/3452-17-0x0000000001420000-0x0000000001430000-memory.dmp

    Filesize

    64KB

  • memory/3452-1080-0x0000000073970000-0x0000000073F21000-memory.dmp

    Filesize

    5.7MB