analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

pddetallescobroo987765234289383pddetallescobroo987765234289383pddet (1).lha

Full analysis: https://app.any.run/tasks/17995a5e-c35d-4d58-98a9-ed14fda1a561
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: September 18, 2019, 16:56:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
njrat
bladabindi
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

2AA770E4EADDF63BD5642F239ED29B91

SHA1:

6EE575BB75D1F9BDA4DD33A68ACD1568F0B75B4C

SHA256:

1C606976A2255965FC24A01193AC373B4E87ADB0B8930B7B31D5ACC899576CAA

SSDEEP:

12288:o1dlD6k/2kYw9qXGHORYE5cMIIXLRMtBIdP1byfqbQMgqmxZiVDMXU1C:orgE2cDHmcMpNMtBIPWqbnqyC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383.exe (PID: 2892)
    • Uses Task Scheduler to run other applications

      • RegSvcs.exe (PID: 3944)
    • Writes to a start menu file

      • pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383.exe (PID: 2892)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2900)
      • schtasks.exe (PID: 3264)
    • NJRAT was detected

      • RegSvcs.exe (PID: 3944)
    • Connects to CnC server

      • RegSvcs.exe (PID: 3944)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3004)
    • Creates files in the user directory

      • pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383.exe (PID: 2892)
    • Connects to unusual port

      • RegSvcs.exe (PID: 3944)
    • Executed via Task Scheduler

      • RegSvcs.exe (PID: 3876)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383.exe #NJRAT regsvcs.exe schtasks.exe no specs schtasks.exe no specs regsvcs.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3004"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\pddetallescobroo987765234289383pddetallescobroo987765234289383pddet (1).lha.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2892"C:\Users\admin\AppData\Local\Temp\Rar$EXa3004.34654\pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3004.34654\pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383.exe
WinRAR.exe
User:
admin
Company:
mpnotify
Integrity Level:
MEDIUM
Description:
RtkAudioService64
Version:
893.91.509.670
3944"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.7.3062.0 built by: NET472REL1
2900schtasks /Delete /tn NYAN /FC:\Windows\system32\schtasks.exeRegSvcs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3264schtasks /create /tn NYAN /tr "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" /sc minute /mo 1C:\Windows\system32\schtasks.exeRegSvcs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3876C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.7.3062.0 built by: NET472REL1
Total events
468
Read events
451
Write events
17
Delete events
0

Modification events

(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3004) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\pddetallescobroo987765234289383pddetallescobroo987765234289383pddet (1).lha.rar
(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3004) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3004WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3004.34654\pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383pddetallescobroo987765234289383.exeexecutable
MD5:978D5547A982CE9C09A9D3447603B9CB
SHA256:B5D5F6646FC657DB12F60BD146588383B1BB2F302772471CB35ECF87EDF4D528
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3944
RegSvcs.exe
181.58.132.31:1992
villataxi.duckdns.org
Telmex Colombia S.A.
CO
malicious

DNS requests

Domain
IP
Reputation
villataxi.duckdns.org
  • 181.58.132.31
malicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3944
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] njRAT.Gen RAT outbound connection
2 ETPRO signatures available at the full report
No debug info