Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    20-01-2025 03:52

General

  • Target

    4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668.exe

  • Size

    1.9MB

  • MD5

    e4c2350adc7cb595f67e309d52b2778e

  • SHA1

    08a0784691beeb777d864279612a7237075f94ee

  • SHA256

    4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668

  • SHA512

    8b39225020671ce408deba0b8d0e91dfba51e64552b8b18d9f241f2250ef72769fd55cf2c97047dc3921613d0762a86a93be92f64766b829090c93da795ca8ad

  • SSDEEP

    49152:hd6e6x01stTTAkJ/4p3ZpoWJX+vS6ljM3XyF2:hg1xThKJZpoWJO6UjaCA

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668.exe
    "C:\Users\Admin\AppData\Local\Temp\4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Users\Admin\AppData\Local\Temp\Smart Binder v2.0 By Th3 Exploiter.exe
      "C:\Users\Admin\AppData\Local\Temp\Smart Binder v2.0 By Th3 Exploiter.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Roaming\server.exe
        "C:\Users\Admin\AppData\Roaming\server.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:6036
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2300
    • C:\Users\Admin\AppData\Local\Temp\SpyNet.exe
      "C:\Users\Admin\AppData\Local\Temp\SpyNet.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Windows\SysWOW64\cscript.exe
        "C:\Windows\system32\cscript.exe" "C:\Users\Admin\AppData\Local\Temp\teste.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:6028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IP.txt

    Filesize

    132KB

    MD5

    d539a65f4d32a2111f2e24e90a1d188d

    SHA1

    c770d803ad16a84449c6b214b84b13cbacac35bc

    SHA256

    36519ea423f5c52f9f77772c7bbcb7ddc979813ad77e40df08e5d0313a604d26

    SHA512

    854332c47655cb22f73171f11c837bcf442d4ee294f0943e09266c96f1c85c7b66af42d9a6938cca89509d26a04edc03ca17501c87af9a41aa7bc37632dac155

  • C:\Users\Admin\AppData\Local\Temp\Language\Default.ini

    Filesize

    14KB

    MD5

    ee9826fd3883b9756896baed5d076cc6

    SHA1

    d1c829cabcb967410e03489723d9e51b9549d6f6

    SHA256

    e06ff3e2b4cf78d6147d00dbfd00066751d1d6680b3dd672e861574741a894d9

    SHA512

    404cfe3632fc3614a0e686504a2edcdf984aab20afc8fc4c7785d76bd52bf466078e756838c2ce5350439ad128756e55e1c3b12f3badd70fba8e74d171a05538

  • C:\Users\Admin\AppData\Local\Temp\Settings\Settings.ini

    Filesize

    1KB

    MD5

    448a49c2d7253c927e820056e9e7ea8b

    SHA1

    c7171c7b597beea4bb584319ddac80eadee5d3be

    SHA256

    afcc1b53d0e2ef177754d4f6ae9ab391e7115e39fc73caaabcb3cd585c2e4c7c

    SHA512

    54dc9c1eba0154aa648ec317c51642fd88d7dcd50b4e5f1eea5c67e1c7db91a7e8cb97d0b538e4a280d91a65fea8baa888734960fbf636b7067ac407840a5224

  • C:\Users\Admin\AppData\Local\Temp\Smart Binder v2.0 By Th3 Exploiter.exe

    Filesize

    23KB

    MD5

    f836c26e8aae6e2ba4efb47af6cecf4f

    SHA1

    65d32c3ed9f9f03033efb50fe8275a3643755f79

    SHA256

    c244ca57170c47a61d79092c13a038477a904a416b492adeb5aabe89d1620c30

    SHA512

    fa8e33791059323c754589a779b167d21cf515fb786c86a84944cf7fc8784be71842db8ee12953855141d99aab9aa707fbfd972d7229156f73168284dcba8f47

  • C:\Users\Admin\AppData\Local\Temp\SpyNet.exe

    Filesize

    2.0MB

    MD5

    98de7bcad1ba2caf74007bd97bc2b505

    SHA1

    8a79d06159a339313b810f23835b8417429dd356

    SHA256

    e4b3b3e72bd3bf4052a3136cb811ea54923bc2d7807709992e0345743d49ced8

    SHA512

    ef57cc4f0ad4bf1f54baaf7213bf868c418eebfb0eee3c32ff376b67d5d5337c35a94a1418951d82aae371820ce37eade7cf0a74ce54a4198e18327bd232a35d

  • C:\Users\Admin\AppData\Local\Temp\teste.txt

    Filesize

    2B

    MD5

    81051bcc2cf1bedf378224b0a93e2877

    SHA1

    ba8ab5a0280b953aa97435ff8946cbcbb2755a27

    SHA256

    7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

    SHA512

    1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

  • C:\Users\Admin\AppData\Local\Temp\teste.vbs

    Filesize

    841B

    MD5

    615964e5ab63a70f0e205a476c48e356

    SHA1

    292620321db69d57ba23fa98d2a89484ddcf83d0

    SHA256

    38a2c0e90a7c86eb5355710dd205f22f84dbba59e688cd3da6394af8c924a102

    SHA512

    69886825baf2075f8e6cdc50b0b34f92d5d06d42db4586396fb3db806fef79986ba5754c7b1251b007cde4f943efe9e3d27800dd7e15f8084fd7e7e6046c3ccc

  • memory/2344-1106-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/2344-28-0x00000000029A0000-0x00000000029A1000-memory.dmp

    Filesize

    4KB

  • memory/2344-25-0x0000000000B60000-0x0000000000B61000-memory.dmp

    Filesize

    4KB

  • memory/2344-1104-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/2344-1105-0x0000000000B60000-0x0000000000B61000-memory.dmp

    Filesize

    4KB

  • memory/2344-22-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/2344-1107-0x00000000029A0000-0x00000000029A1000-memory.dmp

    Filesize

    4KB

  • memory/2344-1108-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/2344-1109-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/2344-1110-0x0000000000400000-0x0000000000957000-memory.dmp

    Filesize

    5.3MB

  • memory/2484-23-0x0000000001060000-0x0000000001070000-memory.dmp

    Filesize

    64KB

  • memory/2484-24-0x00000000739E2000-0x00000000739E4000-memory.dmp

    Filesize

    8KB

  • memory/2484-26-0x00000000739E2000-0x00000000739E3000-memory.dmp

    Filesize

    4KB