Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 21:19

General

  • Target

    4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b.exe

  • Size

    564KB

  • MD5

    c709aa33c0165cebde24123555769a7a

  • SHA1

    ad4813cd0461fbdbc7265dc7880e22978ffc7b54

  • SHA256

    4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b

  • SHA512

    ccd0ffc52ed12a4f2e74a0aef982dbd67b271412102e2373e07f24142560e0a0006d60166b1ba789bbb8745067c2d50e3e822f3355bdff2c52d22444151ab7eb

  • SSDEEP

    12288:6yB0aI78IV40HioBu3yCeOr0rS6KsXr7ieWCU:BB07EyCTr0rFf7aC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

cpanel.hackcrack.io:2222

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b.exe
    "C:\Users\Admin\AppData\Local\Temp\4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2568
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2984
            • C:\Windows\system32\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" "explorer.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:2020
    • C:\Users\Admin\AppData\Local\Temp\Mullvad.Checker .exe
      "C:\Users\Admin\AppData\Local\Temp\Mullvad.Checker .exe"
      2⤵
      • Executes dropped EXE
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe

    Filesize

    375KB

    MD5

    8e4f8329f0837d6a3801dd96973a05fe

    SHA1

    7309226e370a33000c08653504f2ac5786944b2b

    SHA256

    0d8f6fc81065fc6f20ea5b9de9a85fbfffe2deb1f2055f1b304b5b0f3e99407d

    SHA512

    9df93293a5fec2a2fca0838f43b24af8347f229884fab4338f7804ef0050b0aba02235ae2368ffef7dd42640420b42f69eaf974f5107bdab0bf0a8c9b39671cc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

    Filesize

    355KB

    MD5

    f41a73cdd753f77e4da0a16b131d67dd

    SHA1

    d213d85d0d8d39a2775549b2495680a789e981d8

    SHA256

    dff8e155e78054e4be440619c04f0bd64613ae8dbdd5f8d3ffa3a0f7a9f78ed2

    SHA512

    58384b24d9e2620295363db801923e7f34d92297ba57d3eed51adb5c195b5dc4eecb37403c9f06ac92e86d27cf853e56fd44c48562bdb69dea6aa78b216c6c42

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

    Filesize

    252KB

    MD5

    e5d01a5a8cc5c5ca9a5329459814c91a

    SHA1

    00ec50ab1cdab87816ec0f3e77fa8ad00ea9c067

    SHA256

    612bbbf476228032ebab743100c98dae7f01a1dc854298cd8ece588351acb3c6

    SHA512

    2d0d0d964e9100b0586043b16f91532e0f81347ef3697dee7ab0cd90469e6c118ac58e630d9a7fe0a84f5c275440813aeede0e0c44cacf316f59cb760081ab07

  • \Users\Admin\AppData\Local\Temp\Mullvad.Checker .exe

    Filesize

    139KB

    MD5

    ea0d62cc90eea87352e272bea77b97e2

    SHA1

    429d582e0f294ade34084a4eafe472fb97c31013

    SHA256

    8a187dd1b587c6d8ef942c4ddc32f1cb14ae0894c0943286cb3f74386d27dc04

    SHA512

    4de7c405ef263eca0a1e9ad7ba74a04c8ace55935031bb18689ed5a7aa5290c32e30908852ccbb1121b1f3038eaec94f35db82b05e9426ea05c76de0f9ff2068

  • memory/1056-0-0x000007FEF67BE000-0x000007FEF67BF000-memory.dmp

    Filesize

    4KB

  • memory/1056-1-0x000007FEF6500000-0x000007FEF6E9D000-memory.dmp

    Filesize

    9.6MB

  • memory/1056-2-0x000007FEF6500000-0x000007FEF6E9D000-memory.dmp

    Filesize

    9.6MB

  • memory/1056-23-0x000007FEF6500000-0x000007FEF6E9D000-memory.dmp

    Filesize

    9.6MB

  • memory/1864-40-0x00000000005F0000-0x00000000005FC000-memory.dmp

    Filesize

    48KB

  • memory/2568-21-0x000007FEF6500000-0x000007FEF6E9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2568-29-0x000007FEF6500000-0x000007FEF6E9D000-memory.dmp

    Filesize

    9.6MB