Analysis

  • max time kernel
    120s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2025 12:16

General

  • Target

    20b4a034f23c409cefa0929efb3e89dcafe946f8b4f2e79a8990ce1d25203003N.exe

  • Size

    120KB

  • MD5

    0a9088378993c55e870062e3e24c62d0

  • SHA1

    1c81453c1a0543211f81d10d61a4cb350fb3c7a4

  • SHA256

    20b4a034f23c409cefa0929efb3e89dcafe946f8b4f2e79a8990ce1d25203003

  • SHA512

    60d1ff490f1595c060c936ee5abac3f5f0920726053638abb0b9df272924a859c81cc17729edc59170786978df29773a2d791909649154eba76d09dc05c61840

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVg8:P5eznsjsguGDFqGZ2rDLl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20b4a034f23c409cefa0929efb3e89dcafe946f8b4f2e79a8990ce1d25203003N.exe
    "C:\Users\Admin\AppData\Local\Temp\20b4a034f23c409cefa0929efb3e89dcafe946f8b4f2e79a8990ce1d25203003N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
      "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE

    Filesize

    1KB

    MD5

    fa84e4bcc92aa5db735ab50711040cde

    SHA1

    084f1cb4c47fdd3be1c833f58359ec8e16f61eb4

    SHA256

    6d7205e794fde4219a62d9692ecddf612663a5cf20399e79be87b851fca4ca33

    SHA512

    261a327ed1dffd4166e215d17bfd867df5b77017ba72c879fb2675cfb8eef48b374f6de41da0e51ba7adb9c0165bb2c831840603e873f6429963afd0cb93007f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C0018BB1B5834735BFA60CD063B31956

    Filesize

    1KB

    MD5

    1ea27366e034eb9447a33ce639c01489

    SHA1

    d12ed3e7e60c65ce90f0a58b9b9e47292caed923

    SHA256

    788d210ef206a4d11b6b506bf52124ee03fca4e8a9389fad43772202a7e29452

    SHA512

    e06f7443f0f7ca5db4411aa0718102c08068e95ec305b6b53c0b42a941a877de39f95c7e7514e69316b41a7ac19eaa6ccddc581fe475bdb842ec920691726e49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE

    Filesize

    264B

    MD5

    a4ba465d81d8c603fc6d6abaecf6320e

    SHA1

    ef4126e5cd62dfdf9ebc001cf19f7bce8f5da08f

    SHA256

    527c1d18f056ccfb487ec6d005d1a5d5038068817157f35e5d1bc6914f6a47bf

    SHA512

    646ddb8fb41db69b1d4be97d53d4c63be34904dfd22127a99579a1a706c9d72b9f556ac67755445098a8618883c3f83c3aef60288efb7240a148c78322450d9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa64abbcb29ff819edd97f981eb43d43

    SHA1

    bad6e25b1f42f1a76c9dd8632dd848424d0875ac

    SHA256

    838310600b2bcb8d52cf1d532921b0da0bda45170b09d356db614db8f51f97f9

    SHA512

    de381440edecdf833d25c1863dc8a2219c6360b41ff893d3b52c899de4684237daef61a008c27973dea512c08413d5c7d8c23b7daaa3bf3f5765415bcdacdea4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df735f112c68c69c2e4cc174826eab3d

    SHA1

    1daefb3bd3df0c3621b34a476051bcb698536ff5

    SHA256

    3c9a02801745dc74e63163d59ad34c1a5844324679f0cf0881a28c56faf9ba66

    SHA512

    41f6ac87e209382ee9ba4775467aaf37731554f33f1c48193c4c8d1e0d9a34c6bd1b20f0d5e1ae2c0058e3859b4fe8b0b2c6ff0a50c2cb02af47ef2e6176add5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54bcdf7fb778a43eab4aeae42daf6866

    SHA1

    f724d08e2e7eb9c2a3348918db9ddde3db304ecc

    SHA256

    bc0e0da3b05188dbab438aa364e102e3200fd288f030900e4e8b32cb6664fda7

    SHA512

    0e1ca083947b422ccd73791aeae191feff03bf7b566e06721e95ff73c73e7df00368127aa19043a78f902ab4346382f271cc3a8b34035e2fcbc53cc23d58c919

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0018BB1B5834735BFA60CD063B31956

    Filesize

    252B

    MD5

    b7c6ac53c4d3d1e4cb86d0d8d801630a

    SHA1

    48013c3f5fd5e0527189dd4384780aaaf786dd5a

    SHA256

    17841a4b67239b5a89a6014172ac884fd6f0c0f70e03379882d9a8d7614545ab

    SHA512

    051f8b8ca89d96dde63675cae4f92fb3e28af47312db5853dd01c7910b0bca1439bea408250623ba149ef3a5e7873011aa324edccc87e62ec3dc5cacefdc9874

  • C:\Users\Admin\AppData\Local\Temp\CabFE8C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFEBE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\confuse\chargeable.exe

    Filesize

    120KB

    MD5

    c896240f3efc94d2abd824a1a536f615

    SHA1

    8779beab42054ba9788dd31b8ae60db88ea11471

    SHA256

    82cbd8be3a42765f93bffb5cd6dcd40050d47bc84726acf403ceaef4597982fe

    SHA512

    a7138e2a04b023f4293c0c5b226c13ae6a68385e9df3d07cf946135351679406f1102d710d56bf4b861a3516f73a01594f9f59d245fe44cc74df0391f5213e69

  • memory/2752-353-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2752-356-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2752-355-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2808-193-0x0000000074440000-0x00000000749EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2808-175-0x0000000074440000-0x00000000749EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2808-173-0x0000000074440000-0x00000000749EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2808-0-0x0000000074441000-0x0000000074442000-memory.dmp

    Filesize

    4KB

  • memory/2808-2-0x0000000074440000-0x00000000749EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2808-1-0x0000000074440000-0x00000000749EB000-memory.dmp

    Filesize

    5.7MB