| File name: | Extreme Injector v3.7.3.exe |
| Full analysis: | https://app.any.run/tasks/73400547-20a7-4181-a290-2db09816036d |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | July 05, 2023, 19:01:21 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | C239929068F7078F664C67D4EE295058 |
| SHA1: | F879857ED6CB591D341ACE73B1A32CCA2FEC1877 |
| SHA256: | 233ABE1029C0EBD8395C5CB62C0707294F02950D43D416FC4BCFCF97488384EB |
| SSDEEP: | 49152:TQCoCHblagLunu0iKs5jYcgL/vm6RXJZH:cCoCHb8gZ9V5jY7RX |
| .exe | | | Win64 Executable (generic) (76.3) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| OriginalFileName: | Extreme Injector v3.exe |
|---|---|
| LegalCopyright: | Copyright © 2019 |
| ProductVersion: | 3.7.3.0 |
| FileVersion: | 3.7.3.0 |
| ProductName: | Extreme Injector v3 |
| FileDescription: | Extreme Injector v3 |
| CharacterSet: | Windows, Latin1 |
| LanguageCode: | English (U.S.) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x0000 |
| ProductVersionNumber: | 3.7.3.0 |
| FileVersionNumber: | 3.7.3.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | - |
| OSVersion: | 1 |
| EntryPoint: | 0x1000 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 17408 |
| CodeSize: | 3266048 |
| LinkerVersion: | 1.73 |
| PEType: | PE32 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| TimeStamp: | 2023:07:05 18:20:57+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 05-Jul-2023 18:20:57 |
| Detected languages: |
|
| FileDescription: | Extreme Injector v3 |
| ProductName: | Extreme Injector v3 |
| FileVersion: | 3.7.3.0 |
| ProductVersion: | 3.7.3.0 |
| LegalCopyright: | Copyright © 2019 |
| OriginalFilename: | Extreme Injector v3.exe |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0080 |
| Pages in file: | 0x0001 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0010 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x0140 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000080 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 3 |
| Time date stamp: | 05-Jul-2023 18:20:57 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0031D5B6 | 0x0031D600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.23229 |
.idata | 0x0031F000 | 0x000001FC | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.15362 |
.rsrc | 0x00320000 | 0x000041BC | 0x00004200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.74305 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.15976 | 712 | UNKNOWN | UNKNOWN | RT_MANIFEST |
2 | 4.74847 | 4264 | UNKNOWN | UNKNOWN | RT_ICON |
3 | 4.48683 | 9640 | UNKNOWN | UNKNOWN | RT_ICON |
Shlwapi.dll |
kernel32.dll |
msvcrt.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 116 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe | — | Extreme Injector v3.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 10 Modules
| |||||||||||||||
| 124 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe | — | Extreme Injector.exe | |||||||||||
User: admin Company: Helpfeel Inc. Integrity Level: HIGH Description: Gyazo Setup Exit code: 0 Version: 4.6.1.0 Modules
| |||||||||||||||
| 148 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe | — | Extreme Injector.exe | |||||||||||
User: admin Company: Helpfeel Inc. Integrity Level: HIGH Description: Gyazo Setup Exit code: 0 Version: 4.6.1.0 Modules
| |||||||||||||||
| 148 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe | — | Extreme Injector.exe | |||||||||||
User: admin Company: Helpfeel Inc. Integrity Level: HIGH Description: Gyazo Setup Exit code: 0 Version: 4.6.1.0 Modules
| |||||||||||||||
| 188 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe | — | Extreme Injector v3.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 10 Modules
| |||||||||||||||
| 240 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe | — | Extreme Injector v3.exe | |||||||||||
User: admin Company: Helpfeel Inc. Integrity Level: HIGH Description: Gyazo Setup Exit code: 0 Version: 4.6.1.0 Modules
| |||||||||||||||
| 268 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe | — | Extreme Injector v3.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 10 Modules
| |||||||||||||||
| 268 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe | — | Extreme Injector v3.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 10 Modules
| |||||||||||||||
| 268 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe | — | Extreme Injector v3.exe | |||||||||||
User: admin Company: Helpfeel Inc. Integrity Level: HIGH Description: Gyazo Setup Exit code: 0 Version: 4.6.1.0 Modules
| |||||||||||||||
| 372 | "C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe" | C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe | — | Extreme Injector.exe | |||||||||||
User: admin Company: Helpfeel Inc. Integrity Level: HIGH Description: Gyazo Setup Exit code: 0 Version: 4.6.1.0 Modules
| |||||||||||||||
| (PID) Process: | (3440) Extreme Injector v3.7.3.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3440) Extreme Injector v3.7.3.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3440) Extreme Injector v3.7.3.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3440) Extreme Injector v3.7.3.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3440) Extreme Injector v3.7.3.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1836) Server.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1836) Server.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1836) Server.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1836) Server.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2888) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3456 | Extreme Injector v3.exe | C:\Users\admin\AppData\Local\Temp\Extreme Injector.exe | — | |
MD5:— | SHA256:— | |||
| 3440 | Extreme Injector v3.7.3.exe | C:\Users\admin\AppData\Local\Temp\Server.exe | executable | |
MD5:114ACAD75CD4D734F7131C851FC7FD5F | SHA256:1A91B7FA1B8348700A8BD99599A7BD4B77509F19C81E01FB3D5414C71719EEC3 | |||
| 3440 | Extreme Injector v3.7.3.exe | C:\Users\admin\AppData\Local\Temp\Extreme Injector v3.exe | executable | |
MD5:5542D72132509AD32394BB8322DF27FD | SHA256:2349735F4CECD14C012D456A29C30FB27148527E1C027A6A9EFB6D69C8DE965A | |||
| 924 | server.exe | C:\Windows\system32\Windows Service.exe | executable | |
MD5:114ACAD75CD4D734F7131C851FC7FD5F | SHA256:1A91B7FA1B8348700A8BD99599A7BD4B77509F19C81E01FB3D5414C71719EEC3 | |||
| 1836 | Server.exe | C:\Users\admin\AppData\Roaming\app | text | |
MD5:C6BDBC9D86009CCF7E8DE878C9603213 | SHA256:36A067FDFCEE95EB270F0B72E3B9E40D52C907D749FB9A8490D82F8EE56B29EB | |||
| 1836 | Server.exe | C:\Users\admin\server.exe | executable | |
MD5:114ACAD75CD4D734F7131C851FC7FD5F | SHA256:1A91B7FA1B8348700A8BD99599A7BD4B77509F19C81E01FB3D5414C71719EEC3 | |||
| 924 | server.exe | C:\Umbrella.flv.exe | executable | |
MD5:114ACAD75CD4D734F7131C851FC7FD5F | SHA256:1A91B7FA1B8348700A8BD99599A7BD4B77509F19C81E01FB3D5414C71719EEC3 | |||
| 924 | server.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fe12c62687d67faf2b33e4f203c44897Windows Update.exe | executable | |
MD5:114ACAD75CD4D734F7131C851FC7FD5F | SHA256:1A91B7FA1B8348700A8BD99599A7BD4B77509F19C81E01FB3D5414C71719EEC3 | |||
| 924 | server.exe | C:\Program Files\Windows Service.exe | executable | |
MD5:114ACAD75CD4D734F7131C851FC7FD5F | SHA256:1A91B7FA1B8348700A8BD99599A7BD4B77509F19C81E01FB3D5414C71719EEC3 | |||
| 924 | server.exe | C:\Users\admin\Desktop\Windows Service.exe | executable | |
MD5:114ACAD75CD4D734F7131C851FC7FD5F | SHA256:1A91B7FA1B8348700A8BD99599A7BD4B77509F19C81E01FB3D5414C71719EEC3 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2780 | Extreme Injector.exe | GET | 200 | 173.231.16.76:80 | http://api.ipify.org/?format=efd | US | text | 15 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1076 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
820 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2780 | Extreme Injector.exe | 173.231.16.76:80 | api.ipify.org | WEBNX | US | malicious |
Domain | IP | Reputation |
|---|---|---|
api.ipify.org |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
2780 | Extreme Injector.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup (ipify .org) |