Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 20:27

General

  • Target

    3b0ecf0c426c85cb58e99915a19d243b2667a3c924aa9593764e0e66c796c092.exe

  • Size

    118KB

  • MD5

    747f3a6e36ed334e721c623027678174

  • SHA1

    2d91e0589b451e80cbba6c1076bca35dd76ae12a

  • SHA256

    3b0ecf0c426c85cb58e99915a19d243b2667a3c924aa9593764e0e66c796c092

  • SHA512

    b6c996d34ff130814f1085cd2525ced5564d5954869e4752477b635f74a4c2a53b4734ccb20b556728542d0f482afd2f7f1f3710698be81943af9ac910c53e85

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLf/:P5eznsjsguGDFqGZ2rDLf/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b0ecf0c426c85cb58e99915a19d243b2667a3c924aa9593764e0e66c796c092.exe
    "C:\Users\Admin\AppData\Local\Temp\3b0ecf0c426c85cb58e99915a19d243b2667a3c924aa9593764e0e66c796c092.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
      "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE

    Filesize

    1KB

    MD5

    fa84e4bcc92aa5db735ab50711040cde

    SHA1

    084f1cb4c47fdd3be1c833f58359ec8e16f61eb4

    SHA256

    6d7205e794fde4219a62d9692ecddf612663a5cf20399e79be87b851fca4ca33

    SHA512

    261a327ed1dffd4166e215d17bfd867df5b77017ba72c879fb2675cfb8eef48b374f6de41da0e51ba7adb9c0165bb2c831840603e873f6429963afd0cb93007f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C0018BB1B5834735BFA60CD063B31956

    Filesize

    1KB

    MD5

    1ea27366e034eb9447a33ce639c01489

    SHA1

    d12ed3e7e60c65ce90f0a58b9b9e47292caed923

    SHA256

    788d210ef206a4d11b6b506bf52124ee03fca4e8a9389fad43772202a7e29452

    SHA512

    e06f7443f0f7ca5db4411aa0718102c08068e95ec305b6b53c0b42a941a877de39f95c7e7514e69316b41a7ac19eaa6ccddc581fe475bdb842ec920691726e49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE

    Filesize

    264B

    MD5

    84fded9092ac5b98019632b69f91c026

    SHA1

    18f158143f44ee81c09583495e3865ab3858acce

    SHA256

    cda0349349c829e8498eef61958bebf5a6c29a4ac13d1609374410a0e00f029c

    SHA512

    07496ac20bf1a0b935b696a5712bb44783e4f17cbb665b474ca3138a91545131aa5649bd5d024c17f52f8f91d557b10d90e4717070dd3b048a26fe4fd8f99d71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc9f370e1513b53c4a29d152695a45fe

    SHA1

    f308640bbcbb2a04afa8f6e4626ec7abb7b5ed8f

    SHA256

    e3729e330ff8ab4cd0dcd27641172c6cd59ee08de9e82b1435231a6c75b3c96d

    SHA512

    b1f591de08ac67c6869e3048284ea075effd301ca873abb2d8b391fb2e1131c1f2bfc6c5d387010fb884fc83a3577936d5a88b5d93205376a981f6573c8e568a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c25c78ed4f312ec00f95f3e9f7865a17

    SHA1

    de7c0957664503a7d587f0225790881927589fd8

    SHA256

    8318da8e3d2bbf4cdb7c7f6d86b1bf28d9a3d5d1292ef251df3251ca6106965b

    SHA512

    b486ab116290ecff250c9149dd24f8762aab999fc904842f22e7efcb1dd74945bbb2e4626f0fc7e4e54707d008394498c0ca6657039529989b96922dece42145

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2b40974be1fd3d0ba7331377d4545c9

    SHA1

    88e7b20087b54c8133e1ef072213712f610af681

    SHA256

    3b916f24b8cba058acb9a5b5922749f2d7baf05444e5fc6e47749a89500230a3

    SHA512

    7b580c23bece96d113e8f7b90da7f215bd5522db9e784d7a5fb443a159ad7329456f547afc092a821d73e5f73d08a9134cdc3bfd830d899e3b1a876302883b4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0018BB1B5834735BFA60CD063B31956

    Filesize

    252B

    MD5

    3fba5467f1ef0d23443a98b196df4fbf

    SHA1

    198173e455b87e4da54e5d40965fbe5225b065d7

    SHA256

    c093dddcd05aa5b9fda8833480e248fbc51f825ba146e40fdf15d414f6da27b8

    SHA512

    a16751c97ca71f34c3bdbdb83a59078973f175b7d5a509d3e9f6b0dbbc40a3a36350e9b247186b341e042cfd6705f20eeb449a7a066386b4b5fc08248c9958dd

  • C:\Users\Admin\AppData\Local\Temp\CabE793.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE7A6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\confuse\chargeable.exe

    Filesize

    118KB

    MD5

    043e8c57c1b1ffed3591e8c65608768a

    SHA1

    7033de0d13d27c16e3773c65328889b2f1658033

    SHA256

    ab1d75b504374c7c3729a2c57c960a7cc18e77ccf7b5d789157e73926bb74c59

    SHA512

    4edf468d0331815dd3f08820ea38495b8f1cb1b4eb4682e48e68236734fb03a0aac9013c791b05fdbc9101d9d45153b58f5f044b1352a7a9b9408c8c0108cbed

  • memory/1056-183-0x00000000740C0000-0x000000007466B000-memory.dmp

    Filesize

    5.7MB

  • memory/1056-22-0x00000000740C0000-0x000000007466B000-memory.dmp

    Filesize

    5.7MB

  • memory/1056-0-0x00000000740C1000-0x00000000740C2000-memory.dmp

    Filesize

    4KB

  • memory/1056-173-0x00000000740C0000-0x000000007466B000-memory.dmp

    Filesize

    5.7MB

  • memory/2908-351-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2908-354-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2908-353-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB