Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2025, 18:23 UTC

General

  • Target

    0d07cad3d0073bf9e627236199f773416b8de0c79391a9d4d1d238c7803ef12c.exe

  • Size

    115KB

  • MD5

    6d8e70d54d39f18d8826ca669dd8918d

  • SHA1

    65bd9ceda4a11114e9e760acd350fe22e6c789cf

  • SHA256

    0d07cad3d0073bf9e627236199f773416b8de0c79391a9d4d1d238c7803ef12c

  • SHA512

    19e92a97d4c1c78362cf244ab65e5604cd0e40b25c5212870a20f02f1e7b8d91a992fc1da4706fadc84ac9dc3fc9abd77612742fd863e74ba9fb97beeebef0bb

  • SSDEEP

    3072:lHZ28rd2yNqfdcO6L0UQnICMce3SdJFhsz0HMib4O:l1dZnQIEei3Fhsz0MI

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

agdsagds.kro.kr:1111

Mutex

7bc5d4676f29fca15e68905e11aefcf9

Attributes
  • reg_key

    7bc5d4676f29fca15e68905e11aefcf9

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d07cad3d0073bf9e627236199f773416b8de0c79391a9d4d1d238c7803ef12c.exe
    "C:\Users\Admin\AppData\Local\Temp\0d07cad3d0073bf9e627236199f773416b8de0c79391a9d4d1d238c7803ef12c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\server.exe
      "C:\Users\Admin\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\system32\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:2848

Network

  • flag-us
    DNS
    agdsagds.kro.kr
    server.exe
    Remote address:
    8.8.8.8:53
    Request
    agdsagds.kro.kr
    IN A
    Response
    agdsagds.kro.kr
    IN A
    222.111.130.230
  • 222.111.130.230:1111
    agdsagds.kro.kr
    server.exe
    152 B
    120 B
    3
    3
  • 222.111.130.230:1111
    agdsagds.kro.kr
    server.exe
    152 B
    120 B
    3
    3
  • 222.111.130.230:1111
    agdsagds.kro.kr
    server.exe
    152 B
    120 B
    3
    3
  • 222.111.130.230:1111
    agdsagds.kro.kr
    server.exe
    152 B
    120 B
    3
    3
  • 222.111.130.230:1111
    agdsagds.kro.kr
    server.exe
    152 B
    120 B
    3
    3
  • 222.111.130.230:1111
    agdsagds.kro.kr
    server.exe
    152 B
    80 B
    3
    2
  • 222.111.130.230:1111
    agdsagds.kro.kr
    server.exe
    52 B
    1
  • 8.8.8.8:53
    agdsagds.kro.kr
    dns
    server.exe
    61 B
    77 B
    1
    1

    DNS Request

    agdsagds.kro.kr

    DNS Response

    222.111.130.230

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\server.exe

    Filesize

    115KB

    MD5

    6d8e70d54d39f18d8826ca669dd8918d

    SHA1

    65bd9ceda4a11114e9e760acd350fe22e6c789cf

    SHA256

    0d07cad3d0073bf9e627236199f773416b8de0c79391a9d4d1d238c7803ef12c

    SHA512

    19e92a97d4c1c78362cf244ab65e5604cd0e40b25c5212870a20f02f1e7b8d91a992fc1da4706fadc84ac9dc3fc9abd77612742fd863e74ba9fb97beeebef0bb

  • memory/1456-0-0x000007FEF610E000-0x000007FEF610F000-memory.dmp

    Filesize

    4KB

  • memory/1456-1-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1456-2-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1456-3-0x000007FEF610E000-0x000007FEF610F000-memory.dmp

    Filesize

    4KB

  • memory/1456-4-0x0000000000470000-0x0000000000480000-memory.dmp

    Filesize

    64KB

  • memory/1456-11-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3020-12-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3020-13-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3020-14-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.