Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 15:13

General

  • Target

    Camage.exe

  • Size

    6.6MB

  • MD5

    e0c3eda8d569e0848eabdae133a6b05e

  • SHA1

    f9dcf9fe72740e4fa2f49f4d3012a2ddfa1c3811

  • SHA256

    93671abc447ff16f9151bbefe40db894bc2abc2e0a722221bf2cf31840ad37ae

  • SHA512

    dc83fee38df142504ad06c656ee929671e8064f28e9a59a26d589d636fc08692a535f990414e982d744eb8b3e8e49833c7cd3c02e3bbd21ff0c78bcadbbd2332

  • SSDEEP

    98304:DzLv+e6eh0XWy2u4LhpqIGEB5Okt1QzAFF5Zg51AJE:vLWe6nIrLhHdrQzAFJgDK

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

station-gps.gl.at.ply.gg:26933

Mutex

ded5a8703334377d83da00a864706211

Attributes
  • reg_key

    ded5a8703334377d83da00a864706211

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Camage.exe
    "C:\Users\Admin\AppData\Local\Temp\Camage.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe
      "C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Windows\system32\attrib.exe
        attrib +h +s C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1
        3⤵
        • Views/modifies file attributes
        PID:4876
    • C:\Users\Admin\AppData\Local\Temp\Carnage.exe
      "C:\Users\Admin\AppData\Local\Temp\Carnage.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3544
    • C:\Users\Admin\AppData\Local\Temp\Lammer.exe
      "C:\Users\Admin\AppData\Local\Temp\Lammer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\ProgramData\System.exe
        "C:\ProgramData\System.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\ProgramData\System.exe" "System.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Carnage.exe

    Filesize

    1.7MB

    MD5

    f3e34754412d1e60dd7c326a66c1decd

    SHA1

    f597874f97d9856b6b70cb64b01386516ebc1619

    SHA256

    f04b2864661627bead369afce1e7267dd1a717c8a53681ab0afb4ecfbc7c0aa5

    SHA512

    8e011056cddcf7fca27f9cbb9f750e89a264dfe04b891717ffdf939f1a380dcbefd60a43f56b20a889d8e967a5cff887a73693a16b934adb627de33d8f38a327

  • C:\Users\Admin\AppData\Local\Temp\Lammer.exe

    Filesize

    23KB

    MD5

    3f563fd25805e139f0873466ffb4bb23

    SHA1

    a032c2c7c7b64ea6ef69d1919e4d19e9712aa2da

    SHA256

    9b8a1f384f3d84c66b85675214c4ad4f71a4f01729f0321687b747bb8b7e91f2

    SHA512

    0401142c67795634d8a3a4f52452e0103427c94e85eb89f2f2bc5eb4fb539e9da00f3f1077c44e1a8c170fb6d9cf123f421a943fdd8d14a2430baa2436874af5

  • C:\Users\Admin\AppData\Local\Temp\SilentPatcher.exe

    Filesize

    2.6MB

    MD5

    7145358dc4b4908c33481df669f6a0f4

    SHA1

    87f13e788bd0bc105f1a9e992166ac819488d9c5

    SHA256

    d1035e2bc6fe5b8450d60f6c45c4d9479a014cec0f15cfd00a23a65a5e10634a

    SHA512

    164c6506b0df97877e15f1b2a668f06521b510817575d9c6df716bdf51e6deac20e2c78eb4ca1f42f4337aec7b747f7ebbcc5d7821a3ce92ac68aca8bd0c184a

  • C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1

    Filesize

    2KB

    MD5

    9758656bbe8589c66bb241b052490c72

    SHA1

    b73da83fb3ae6b86c6365769a04de9845d5c602c

    SHA256

    e4bfe191530cc53138c4a265755539f8a115f7828faba79dfac91f3184b26351

    SHA512

    da9a8ecba8c2071e467f2d72fac524843fb0011c8486dd95e8b948b1c7f91bf02bcb80c20a01eddb6971b96db5ebde5f7c4c607e6b6d15e75d971ea104436e34

  • memory/4488-0-0x0000000000400000-0x0000000000A96000-memory.dmp

    Filesize

    6.6MB

  • memory/4972-99-0x0000000072CC2000-0x0000000072CC3000-memory.dmp

    Filesize

    4KB

  • memory/4972-100-0x0000000072CC0000-0x0000000073271000-memory.dmp

    Filesize

    5.7MB

  • memory/4972-101-0x0000000072CC0000-0x0000000073271000-memory.dmp

    Filesize

    5.7MB

  • memory/4972-111-0x0000000072CC0000-0x0000000073271000-memory.dmp

    Filesize

    5.7MB