Analysis

  • max time kernel
    27s
  • max time network
    31s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-01-2025 14:56

General

  • Target

    Camage.exe

  • Size

    6.6MB

  • MD5

    e0c3eda8d569e0848eabdae133a6b05e

  • SHA1

    f9dcf9fe72740e4fa2f49f4d3012a2ddfa1c3811

  • SHA256

    93671abc447ff16f9151bbefe40db894bc2abc2e0a722221bf2cf31840ad37ae

  • SHA512

    dc83fee38df142504ad06c656ee929671e8064f28e9a59a26d589d636fc08692a535f990414e982d744eb8b3e8e49833c7cd3c02e3bbd21ff0c78bcadbbd2332

  • SSDEEP

    98304:DzLv+e6eh0XWy2u4LhpqIGEB5Okt1QzAFF5Zg51AJE:vLWe6nIrLhHdrQzAFJgDK

Malware Config

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Camage.exe
    "C:\Users\Admin\AppData\Local\Temp\Camage.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe
      "C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1
        3⤵
        • Views/modifies file attributes
        PID:4592
    • C:\Users\Admin\AppData\Local\Temp\Carnage.exe
      "C:\Users\Admin\AppData\Local\Temp\Carnage.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:248
    • C:\Users\Admin\AppData\Local\Temp\Lammer.exe
      "C:\Users\Admin\AppData\Local\Temp\Lammer.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4252
      • C:\ProgramData\System.exe
        "C:\ProgramData\System.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4272
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\ProgramData\System.exe" "System.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:4728
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp21FA.tmp.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Windows\SysWOW64\shutdown.exe
            shutdown -r -t 1
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:676
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2305.tmp.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:812
          • C:\Windows\SysWOW64\shutdown.exe
            shutdown -s -t 1
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1652
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp241F.tmp.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3468
          • C:\Windows\SysWOW64\shutdown.exe
            shutdown -l -t 1
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1512
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp251A.tmp.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2416
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp25B7.tmp.bat" "
          4⤵
            PID:2508
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2674.tmp.bat" "
            4⤵
              PID:4684
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32 USER32.DLL,SwapMouseButton
                5⤵
                  PID:2936
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp280B.tmp.bat" "
                4⤵
                  PID:452
          • C:\Windows\System32\PickerHost.exe
            C:\Windows\System32\PickerHost.exe -Embedding
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:3060
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x4 /state0:0xa3a15055 /state1:0x41c64e6d
            1⤵
              PID:2000

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\Carnage.exe

              Filesize

              1.7MB

              MD5

              f3e34754412d1e60dd7c326a66c1decd

              SHA1

              f597874f97d9856b6b70cb64b01386516ebc1619

              SHA256

              f04b2864661627bead369afce1e7267dd1a717c8a53681ab0afb4ecfbc7c0aa5

              SHA512

              8e011056cddcf7fca27f9cbb9f750e89a264dfe04b891717ffdf939f1a380dcbefd60a43f56b20a889d8e967a5cff887a73693a16b934adb627de33d8f38a327

            • C:\Users\Admin\AppData\Local\Temp\Lammer.exe

              Filesize

              23KB

              MD5

              3f563fd25805e139f0873466ffb4bb23

              SHA1

              a032c2c7c7b64ea6ef69d1919e4d19e9712aa2da

              SHA256

              9b8a1f384f3d84c66b85675214c4ad4f71a4f01729f0321687b747bb8b7e91f2

              SHA512

              0401142c67795634d8a3a4f52452e0103427c94e85eb89f2f2bc5eb4fb539e9da00f3f1077c44e1a8c170fb6d9cf123f421a943fdd8d14a2430baa2436874af5

            • C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe

              Filesize

              2.6MB

              MD5

              7145358dc4b4908c33481df669f6a0f4

              SHA1

              87f13e788bd0bc105f1a9e992166ac819488d9c5

              SHA256

              d1035e2bc6fe5b8450d60f6c45c4d9479a014cec0f15cfd00a23a65a5e10634a

              SHA512

              164c6506b0df97877e15f1b2a668f06521b510817575d9c6df716bdf51e6deac20e2c78eb4ca1f42f4337aec7b747f7ebbcc5d7821a3ce92ac68aca8bd0c184a

            • C:\Users\Admin\AppData\Local\Temp\tmp21FA.tmp.bat

              Filesize

              34B

              MD5

              886b428020420fbe31c8c069cf14805c

              SHA1

              dd51443a6b8cdf52cd7c0ba6658095aa92af50f8

              SHA256

              8c8e929fc84a367af1a7f1bebf6be1a544ce334f0677ac6db9863abed73fe778

              SHA512

              0789ea923daeb3ac518a05ccc905987e991eaf081f1c7a67a0dcbea71e328d331101129566edacb1910323c8180fd481d9bf9602ab0e2fcb3bdc41a0880c3b2f

            • C:\Users\Admin\AppData\Local\Temp\tmp2305.tmp.bat

              Filesize

              34B

              MD5

              af45a1096d1543e3b8a84eb76743e1e5

              SHA1

              74b3825abdc9f63ee98ce5cf02520d4fefb1e52b

              SHA256

              ea973f052ee5036b535a0b1593bb982861e793367980a4f4d33b6a92d0936bd4

              SHA512

              db55de580e493150326567ca8879b6acfb63d55ce70d5ec74cb96e21cd6d9cf6198e0afe1cea2b4d4ca49889c50e7f616034e1abb079b544a01c67abcda3b4ac

            • C:\Users\Admin\AppData\Local\Temp\tmp241F.tmp.bat

              Filesize

              34B

              MD5

              cce38745bfb6264a3995bbf6d85445c7

              SHA1

              54771ec0e2fcee5d9916d4195cbe4ce442ea3426

              SHA256

              f0e91f3262da87d89a4e2521980e5b0a4d392ad46cd381c8d63051087a3bc683

              SHA512

              66eb8322fdb5007a217f80baa04cd2867f34a8fd3051cc028fa6f6372754499739d721049de758118b9919196fa721ae710b0bf8ef82ab97d5b2e4ad954524cb

            • C:\Users\Admin\AppData\Local\Temp\tmp251A.tmp.bat

              Filesize

              77B

              MD5

              a14439c4f5cb6326e6fb50e4e56a9864

              SHA1

              65dd9ee8dd3d255d26549a7982052d5c2f7ef856

              SHA256

              3c6f30cdd7a9391e1f45c4975d135e377aa0cb81d0efafa19bd5200bedb9b162

              SHA512

              51e985189dd42390c93951cb5e8f471ffb6e35b3e8ac2584a6f3657e8e6e57f34999dcdbb0d1a82a50ec1f0e36b6367c2ae0257b1d9ba2a0e6003c847d6db5a6

            • C:\Users\Admin\AppData\Local\Temp\tmp2674.tmp.bat

              Filesize

              64B

              MD5

              c6cecfb0e0915217462ec526b8be01fd

              SHA1

              8c5796352dd3d977be5c29fb77c957c272ecea07

              SHA256

              ca5afc214a9eda0274cbde3a000a83849eb11a121c7b6252962dc4c9a6b21f2e

              SHA512

              54f5a1d9a0f671407c82e1007da57266bc6f9aa1131c1a676e2926a2b332591ebfe9f7d2345dedddeaa17e044267161ed1146dc3b145272bee22b517fcde2fce

            • C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1

              Filesize

              2KB

              MD5

              9758656bbe8589c66bb241b052490c72

              SHA1

              b73da83fb3ae6b86c6365769a04de9845d5c602c

              SHA256

              e4bfe191530cc53138c4a265755539f8a115f7828faba79dfac91f3184b26351

              SHA512

              da9a8ecba8c2071e467f2d72fac524843fb0011c8486dd95e8b948b1c7f91bf02bcb80c20a01eddb6971b96db5ebde5f7c4c607e6b6d15e75d971ea104436e34

            • memory/1072-0-0x0000000000400000-0x0000000000A96000-memory.dmp

              Filesize

              6.6MB

            • memory/4252-98-0x0000000072E81000-0x0000000072E82000-memory.dmp

              Filesize

              4KB

            • memory/4252-99-0x0000000072E80000-0x0000000073431000-memory.dmp

              Filesize

              5.7MB

            • memory/4252-100-0x0000000072E80000-0x0000000073431000-memory.dmp

              Filesize

              5.7MB

            • memory/4252-111-0x0000000072E80000-0x0000000073431000-memory.dmp

              Filesize

              5.7MB