File name:

pass 777 NjRat 0.7D Green Edition.7z

Full analysis: https://app.any.run/tasks/eeeb886a-3c3f-48df-b73d-aacbf8575ade
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: April 27, 2021, 17:14:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
SecurityXploded
rat
njrat
bladabindi
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

E3B5875C1019CFD3258C0783B36CF2F9

SHA1:

0B5EA74DF16760B39DDC66C16F5DB770E72E24B7

SHA256:

0E46C05A0E0ED7F3CCF51918B0738A90E86FEBFDC01C21FEAF09A8727C0D3881

SSDEEP:

24576:qWeFDASFL43t5I9aI8q/kUz9INqc8dTwcRL2TvzNnc5RybAwa4tFQVFFjhygSvnj:1unFLQa8qyq/R+gRczFQV7hyRngaNAO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 2896)
    • Application was dropped or rewritten from another process

      • NjRat 0.7D Green Edition by im523.exe (PID: 3860)
      • Server.exe (PID: 2952)
    • Detected SecurityXploded stealer

      • WinRAR.exe (PID: 1804)
    • Drops executable file immediately after starts

      • ilasm.exe (PID: 3076)
    • Writes to a start menu file

      • Server.exe (PID: 2952)
    • Changes the autorun value in the registry

      • Server.exe (PID: 2952)
    • NJRAT was detected

      • Server.exe (PID: 2952)
  • SUSPICIOUS

    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 1804)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1804)
      • ilasm.exe (PID: 3076)
      • NjRat 0.7D Green Edition by im523.exe (PID: 3860)
      • Server.exe (PID: 2952)
    • Drops a file with a compile date too recent

      • ilasm.exe (PID: 3076)
      • NjRat 0.7D Green Edition by im523.exe (PID: 3860)
      • Server.exe (PID: 2952)
    • Uses NETSH.EXE for network configuration

      • Server.exe (PID: 2952)
    • Creates files in the user directory

      • Server.exe (PID: 2952)
  • INFO

    • Manual execution by user

      • NjRat 0.7D Green Edition by im523.exe (PID: 3860)
      • Server.exe (PID: 2952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
6
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #SECURITYXPLODED winrar.exe searchprotocolhost.exe no specs njrat 0.7d green edition by im523.exe ilasm.exe #NJRAT server.exe netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1804"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\pass 777 NjRat 0.7D Green Edition.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1884netsh firewall add allowedprogram "C:\Users\admin\Desktop\NjRat 0.7D Green Edition\Server.exe" "Server.exe" ENABLEC:\Windows\system32\netsh.exeServer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2896"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2952"C:\Users\admin\Desktop\NjRat 0.7D Green Edition\Server.exe" C:\Users\admin\Desktop\NjRat 0.7D Green Edition\Server.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\njrat 0.7d green edition\server.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3076"C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe" /alignment=512 /QUIET "C:\Users\admin\AppData\Local\Temp\stub.il" /output:"C:\Users\admin\Desktop\NjRat 0.7D Green Edition\Server.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe
NjRat 0.7D Green Edition by im523.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Framework IL assembler
Exit code:
0
Version:
2.0.50727.5420 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\ilasm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscoree.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3860"C:\Users\admin\Desktop\NjRat 0.7D Green Edition\NjRat 0.7D Green Edition by im523.exe" C:\Users\admin\Desktop\NjRat 0.7D Green Edition\NjRat 0.7D Green Edition by im523.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
NjRat 0.7D Green Edition by im523
Exit code:
0
Version:
0.0.0.7
Modules
Images
c:\users\admin\desktop\njrat 0.7d green edition\njrat 0.7d green edition by im523.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 505
Read events
1 358
Write events
144
Delete events
3

Modification events

(PID) Process:(1804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1804) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1804) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(1804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\pass 777 NjRat 0.7D Green Edition.7z
(PID) Process:(1804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1804) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
11
Suspicious files
1
Text files
3
Unknown types
1

Dropped files

PID
Process
Filename
Type
3076ilasm.exeC:\Users\admin\Desktop\NjRat 0.7D Green Edition\Server.pdb
MD5:
SHA256:
3860NjRat 0.7D Green Edition by im523.exeC:\Users\admin\Desktop\NjRat 0.7D Green Edition\RCXC4E7.tmp
MD5:
SHA256:
3860NjRat 0.7D Green Edition by im523.exeC:\Users\admin\Desktop\NjRat 0.7D Green Edition\Server.exeexecutable
MD5:
SHA256:
1804WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1804.674\NjRat 0.7D Green Edition\Plugin\ch.dllexecutable
MD5:73C8A5CD64FCF87186A6A9AC870DF509
SHA256:7722206DBA0CFB290F33093F9430CB770A160947001715AE11E6DBBFAEF1C0EE
3860NjRat 0.7D Green Edition by im523.exeC:\Users\admin\AppData\Local\Temp\stub.iltext
MD5:ADF38A9C31AB971C5FC874D442AD9D18
SHA256:3CAE5A8A7322E5EC91B4A129AB706B984AD7B5EC5C96B499584945EEACE4798E
1804WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1804.674\NjRat 0.7D Green Edition\GeoIP.datbinary
MD5:797B96CC417D0CDE72E5C25D0898E95E
SHA256:8A0675001B5BC63D8389FC7ED80B4A7B0F9538C744350F00162533519E106426
2952Server.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2bc2da243b888ddb954888782e6bdaa2.exeexecutable
MD5:
SHA256:
1804WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1804.674\NjRat 0.7D Green Edition\Plugin\plg.dllexecutable
MD5:0CBC2D9703FEEAD9783439E551C2B673
SHA256:EA9ECF8723788FEEF6492BF938CDFAB1266A1558DFFE75E1F78A998320F96E39
1804WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1804.674\NjRat 0.7D Green Edition\Plugin\pw.dllexecutable
MD5:872401528FC94C90F3DE6658E776CC36
SHA256:3A1CC072EFFD8C38406A6FDDF4D8F49C5366BB0E32071311D90DB669940987CE
1804WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1804.674\NjRat 0.7D Green Edition\Plugin\sc2.dllexecutable
MD5:19967E886EDCD2F22F8D4A58C8EA3773
SHA256:3E5141C75B7746C0EB2B332082A165DEACB943CEF26BD84668E6B79B47BDFD93
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info