Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-01-2025 14:56
Static task
static1
Behavioral task
behavioral1
Sample
Camage.exe
Resource
win11-20241007-en
General
-
Target
Camage.exe
-
Size
6.6MB
-
MD5
e0c3eda8d569e0848eabdae133a6b05e
-
SHA1
f9dcf9fe72740e4fa2f49f4d3012a2ddfa1c3811
-
SHA256
93671abc447ff16f9151bbefe40db894bc2abc2e0a722221bf2cf31840ad37ae
-
SHA512
dc83fee38df142504ad06c656ee929671e8064f28e9a59a26d589d636fc08692a535f990414e982d744eb8b3e8e49833c7cd3c02e3bbd21ff0c78bcadbbd2332
-
SSDEEP
98304:DzLv+e6eh0XWy2u4LhpqIGEB5Okt1QzAFF5Zg51AJE:vLWe6nIrLhHdrQzAFJgDK
Malware Config
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4728 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ded5a8703334377d83da00a864706211.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ded5a8703334377d83da00a864706211.exe System.exe -
Executes dropped EXE 4 IoCs
pid Process 1076 SilentPatcher.exe 248 Carnage.exe 4252 Lammer.exe 4272 System.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\ded5a8703334377d83da00a864706211 = "\"C:\\ProgramData\\System.exe\" .." System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ded5a8703334377d83da00a864706211 = "\"C:\\ProgramData\\System.exe\" .." System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lammer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Camage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Carnage.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Camage.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe 248 Carnage.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 248 Carnage.exe Token: SeDebugPrivilege 4272 System.exe Token: 33 4272 System.exe Token: SeIncBasePriorityPrivilege 4272 System.exe Token: SeShutdownPrivilege 676 shutdown.exe Token: SeRemoteShutdownPrivilege 676 shutdown.exe Token: SeShutdownPrivilege 1652 shutdown.exe Token: SeRemoteShutdownPrivilege 1652 shutdown.exe Token: 33 4272 System.exe Token: SeIncBasePriorityPrivilege 4272 System.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3060 PickerHost.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1076 1072 Camage.exe 78 PID 1072 wrote to memory of 1076 1072 Camage.exe 78 PID 1072 wrote to memory of 248 1072 Camage.exe 80 PID 1072 wrote to memory of 248 1072 Camage.exe 80 PID 1072 wrote to memory of 248 1072 Camage.exe 80 PID 1072 wrote to memory of 4252 1072 Camage.exe 82 PID 1072 wrote to memory of 4252 1072 Camage.exe 82 PID 1072 wrote to memory of 4252 1072 Camage.exe 82 PID 1076 wrote to memory of 4592 1076 SilentPatcher.exe 83 PID 1076 wrote to memory of 4592 1076 SilentPatcher.exe 83 PID 4252 wrote to memory of 4272 4252 Lammer.exe 84 PID 4252 wrote to memory of 4272 4252 Lammer.exe 84 PID 4252 wrote to memory of 4272 4252 Lammer.exe 84 PID 4272 wrote to memory of 4728 4272 System.exe 85 PID 4272 wrote to memory of 4728 4272 System.exe 85 PID 4272 wrote to memory of 4728 4272 System.exe 85 PID 4272 wrote to memory of 1888 4272 System.exe 88 PID 4272 wrote to memory of 1888 4272 System.exe 88 PID 4272 wrote to memory of 1888 4272 System.exe 88 PID 1888 wrote to memory of 676 1888 cmd.exe 90 PID 1888 wrote to memory of 676 1888 cmd.exe 90 PID 1888 wrote to memory of 676 1888 cmd.exe 90 PID 4272 wrote to memory of 812 4272 System.exe 91 PID 4272 wrote to memory of 812 4272 System.exe 91 PID 4272 wrote to memory of 812 4272 System.exe 91 PID 812 wrote to memory of 1652 812 cmd.exe 95 PID 812 wrote to memory of 1652 812 cmd.exe 95 PID 812 wrote to memory of 1652 812 cmd.exe 95 PID 4272 wrote to memory of 3468 4272 System.exe 96 PID 4272 wrote to memory of 3468 4272 System.exe 96 PID 4272 wrote to memory of 3468 4272 System.exe 96 PID 3468 wrote to memory of 1512 3468 cmd.exe 98 PID 3468 wrote to memory of 1512 3468 cmd.exe 98 PID 3468 wrote to memory of 1512 3468 cmd.exe 98 PID 4272 wrote to memory of 2416 4272 System.exe 99 PID 4272 wrote to memory of 2416 4272 System.exe 99 PID 4272 wrote to memory of 2416 4272 System.exe 99 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4592 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Camage.exe"C:\Users\Admin\AppData\Local\Temp\Camage.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe"C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps13⤵
- Views/modifies file attributes
PID:4592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Carnage.exe"C:\Users\Admin\AppData\Local\Temp\Carnage.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:248
-
-
C:\Users\Admin\AppData\Local\Temp\Lammer.exe"C:\Users\Admin\AppData\Local\Temp\Lammer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\ProgramData\System.exe"C:\ProgramData\System.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\System.exe" "System.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp21FA.tmp.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 15⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2305.tmp.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\shutdown.exeshutdown -s -t 15⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp241F.tmp.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\shutdown.exeshutdown -l -t 15⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp251A.tmp.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp25B7.tmp.bat" "4⤵PID:2508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2674.tmp.bat" "4⤵PID:4684
-
C:\Windows\SysWOW64\rundll32.exerundll32 USER32.DLL,SwapMouseButton5⤵PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp280B.tmp.bat" "4⤵PID:452
-
-
-
-
C:\Windows\System32\PickerHost.exeC:\Windows\System32\PickerHost.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3060
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a15055 /state1:0x41c64e6d1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5f3e34754412d1e60dd7c326a66c1decd
SHA1f597874f97d9856b6b70cb64b01386516ebc1619
SHA256f04b2864661627bead369afce1e7267dd1a717c8a53681ab0afb4ecfbc7c0aa5
SHA5128e011056cddcf7fca27f9cbb9f750e89a264dfe04b891717ffdf939f1a380dcbefd60a43f56b20a889d8e967a5cff887a73693a16b934adb627de33d8f38a327
-
Filesize
23KB
MD53f563fd25805e139f0873466ffb4bb23
SHA1a032c2c7c7b64ea6ef69d1919e4d19e9712aa2da
SHA2569b8a1f384f3d84c66b85675214c4ad4f71a4f01729f0321687b747bb8b7e91f2
SHA5120401142c67795634d8a3a4f52452e0103427c94e85eb89f2f2bc5eb4fb539e9da00f3f1077c44e1a8c170fb6d9cf123f421a943fdd8d14a2430baa2436874af5
-
Filesize
2.6MB
MD57145358dc4b4908c33481df669f6a0f4
SHA187f13e788bd0bc105f1a9e992166ac819488d9c5
SHA256d1035e2bc6fe5b8450d60f6c45c4d9479a014cec0f15cfd00a23a65a5e10634a
SHA512164c6506b0df97877e15f1b2a668f06521b510817575d9c6df716bdf51e6deac20e2c78eb4ca1f42f4337aec7b747f7ebbcc5d7821a3ce92ac68aca8bd0c184a
-
Filesize
34B
MD5886b428020420fbe31c8c069cf14805c
SHA1dd51443a6b8cdf52cd7c0ba6658095aa92af50f8
SHA2568c8e929fc84a367af1a7f1bebf6be1a544ce334f0677ac6db9863abed73fe778
SHA5120789ea923daeb3ac518a05ccc905987e991eaf081f1c7a67a0dcbea71e328d331101129566edacb1910323c8180fd481d9bf9602ab0e2fcb3bdc41a0880c3b2f
-
Filesize
34B
MD5af45a1096d1543e3b8a84eb76743e1e5
SHA174b3825abdc9f63ee98ce5cf02520d4fefb1e52b
SHA256ea973f052ee5036b535a0b1593bb982861e793367980a4f4d33b6a92d0936bd4
SHA512db55de580e493150326567ca8879b6acfb63d55ce70d5ec74cb96e21cd6d9cf6198e0afe1cea2b4d4ca49889c50e7f616034e1abb079b544a01c67abcda3b4ac
-
Filesize
34B
MD5cce38745bfb6264a3995bbf6d85445c7
SHA154771ec0e2fcee5d9916d4195cbe4ce442ea3426
SHA256f0e91f3262da87d89a4e2521980e5b0a4d392ad46cd381c8d63051087a3bc683
SHA51266eb8322fdb5007a217f80baa04cd2867f34a8fd3051cc028fa6f6372754499739d721049de758118b9919196fa721ae710b0bf8ef82ab97d5b2e4ad954524cb
-
Filesize
77B
MD5a14439c4f5cb6326e6fb50e4e56a9864
SHA165dd9ee8dd3d255d26549a7982052d5c2f7ef856
SHA2563c6f30cdd7a9391e1f45c4975d135e377aa0cb81d0efafa19bd5200bedb9b162
SHA51251e985189dd42390c93951cb5e8f471ffb6e35b3e8ac2584a6f3657e8e6e57f34999dcdbb0d1a82a50ec1f0e36b6367c2ae0257b1d9ba2a0e6003c847d6db5a6
-
Filesize
64B
MD5c6cecfb0e0915217462ec526b8be01fd
SHA18c5796352dd3d977be5c29fb77c957c272ecea07
SHA256ca5afc214a9eda0274cbde3a000a83849eb11a121c7b6252962dc4c9a6b21f2e
SHA51254f5a1d9a0f671407c82e1007da57266bc6f9aa1131c1a676e2926a2b332591ebfe9f7d2345dedddeaa17e044267161ed1146dc3b145272bee22b517fcde2fce
-
Filesize
2KB
MD59758656bbe8589c66bb241b052490c72
SHA1b73da83fb3ae6b86c6365769a04de9845d5c602c
SHA256e4bfe191530cc53138c4a265755539f8a115f7828faba79dfac91f3184b26351
SHA512da9a8ecba8c2071e467f2d72fac524843fb0011c8486dd95e8b948b1c7f91bf02bcb80c20a01eddb6971b96db5ebde5f7c4c607e6b6d15e75d971ea104436e34