Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 15:13
Static task
static1
Behavioral task
behavioral1
Sample
Camage.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Camage.exe
Resource
win10v2004-20241007-en
General
-
Target
Camage.exe
-
Size
6.6MB
-
MD5
e0c3eda8d569e0848eabdae133a6b05e
-
SHA1
f9dcf9fe72740e4fa2f49f4d3012a2ddfa1c3811
-
SHA256
93671abc447ff16f9151bbefe40db894bc2abc2e0a722221bf2cf31840ad37ae
-
SHA512
dc83fee38df142504ad06c656ee929671e8064f28e9a59a26d589d636fc08692a535f990414e982d744eb8b3e8e49833c7cd3c02e3bbd21ff0c78bcadbbd2332
-
SSDEEP
98304:DzLv+e6eh0XWy2u4LhpqIGEB5Okt1QzAFF5Zg51AJE:vLWe6nIrLhHdrQzAFJgDK
Malware Config
Extracted
njrat
0.7d
Lammer
station-gps.gl.at.ply.gg:26933
ded5a8703334377d83da00a864706211
-
reg_key
ded5a8703334377d83da00a864706211
-
splitter
|'|'|
Signatures
-
Njrat family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2196 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ded5a8703334377d83da00a864706211.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ded5a8703334377d83da00a864706211.exe System.exe -
Executes dropped EXE 4 IoCs
pid Process 2788 SilentPatcher.exe 2876 Carnage.exe 2840 Lammer.exe 1876 System.exe -
Loads dropped DLL 6 IoCs
pid Process 2772 Camage.exe 2772 Camage.exe 2944 Process not Found 2772 Camage.exe 2772 Camage.exe 2840 Lammer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ded5a8703334377d83da00a864706211 = "\"C:\\ProgramData\\System.exe\" .." System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ded5a8703334377d83da00a864706211 = "\"C:\\ProgramData\\System.exe\" .." System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lammer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Camage.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe 2876 Carnage.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2876 Carnage.exe Token: SeDebugPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe Token: 33 1876 System.exe Token: SeIncBasePriorityPrivilege 1876 System.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2788 2772 Camage.exe 30 PID 2772 wrote to memory of 2788 2772 Camage.exe 30 PID 2772 wrote to memory of 2788 2772 Camage.exe 30 PID 2772 wrote to memory of 2788 2772 Camage.exe 30 PID 2772 wrote to memory of 2876 2772 Camage.exe 32 PID 2772 wrote to memory of 2876 2772 Camage.exe 32 PID 2772 wrote to memory of 2876 2772 Camage.exe 32 PID 2772 wrote to memory of 2876 2772 Camage.exe 32 PID 2772 wrote to memory of 2840 2772 Camage.exe 34 PID 2772 wrote to memory of 2840 2772 Camage.exe 34 PID 2772 wrote to memory of 2840 2772 Camage.exe 34 PID 2772 wrote to memory of 2840 2772 Camage.exe 34 PID 2840 wrote to memory of 1876 2840 Lammer.exe 35 PID 2840 wrote to memory of 1876 2840 Lammer.exe 35 PID 2840 wrote to memory of 1876 2840 Lammer.exe 35 PID 2840 wrote to memory of 1876 2840 Lammer.exe 35 PID 1876 wrote to memory of 2196 1876 System.exe 36 PID 1876 wrote to memory of 2196 1876 System.exe 36 PID 1876 wrote to memory of 2196 1876 System.exe 36 PID 1876 wrote to memory of 2196 1876 System.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Camage.exe"C:\Users\Admin\AppData\Local\Temp\Camage.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe"C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe"2⤵
- Executes dropped EXE
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\Carnage.exe"C:\Users\Admin\AppData\Local\Temp\Carnage.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\Lammer.exe"C:\Users\Admin\AppData\Local\Temp\Lammer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\ProgramData\System.exe"C:\ProgramData\System.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\System.exe" "System.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5f3e34754412d1e60dd7c326a66c1decd
SHA1f597874f97d9856b6b70cb64b01386516ebc1619
SHA256f04b2864661627bead369afce1e7267dd1a717c8a53681ab0afb4ecfbc7c0aa5
SHA5128e011056cddcf7fca27f9cbb9f750e89a264dfe04b891717ffdf939f1a380dcbefd60a43f56b20a889d8e967a5cff887a73693a16b934adb627de33d8f38a327
-
Filesize
23KB
MD53f563fd25805e139f0873466ffb4bb23
SHA1a032c2c7c7b64ea6ef69d1919e4d19e9712aa2da
SHA2569b8a1f384f3d84c66b85675214c4ad4f71a4f01729f0321687b747bb8b7e91f2
SHA5120401142c67795634d8a3a4f52452e0103427c94e85eb89f2f2bc5eb4fb539e9da00f3f1077c44e1a8c170fb6d9cf123f421a943fdd8d14a2430baa2436874af5
-
Filesize
2.6MB
MD57145358dc4b4908c33481df669f6a0f4
SHA187f13e788bd0bc105f1a9e992166ac819488d9c5
SHA256d1035e2bc6fe5b8450d60f6c45c4d9479a014cec0f15cfd00a23a65a5e10634a
SHA512164c6506b0df97877e15f1b2a668f06521b510817575d9c6df716bdf51e6deac20e2c78eb4ca1f42f4337aec7b747f7ebbcc5d7821a3ce92ac68aca8bd0c184a