URL: | https://disk.yandex.ru/d/ULOvJcTG9218qg |
Full analysis: | https://app.any.run/tasks/8684e6ca-cb14-46e1-b77c-8a877a4a686b |
Verdict: | Malicious activity |
Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
Analysis date: | February 21, 2022, 11:38:43 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MD5: | 3D56601E48F86A3D218AF5576994F037 |
SHA1: | 01C65B99B1B132B7DE69DD5F395490567DCE4DE9 |
SHA256: | 3042D85890D308F034B4EDB46BBE10BE3818C6C3CE3295015322A5882065D64D |
SSDEEP: | 3:N8U2wu/EWC:2U2j/EF |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1252 | "C:\Program Files\Internet Explorer\iexplore.exe" "https://disk.yandex.ru/d/ULOvJcTG9218qg" | C:\Program Files\Internet Explorer\iexplore.exe | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
3096 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1252 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
1096 | "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\AmongUs.exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\AmongUs.exe | iexplore.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3184 | "C:\Users\admin\AppData\Local\Temp\FILENAMES.exe" | C:\Users\admin\AppData\Local\Temp\FILENAMES.exe | AmongUs.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3112 | "C:\Users\admin\AppData\Local\Temp\GTA3_protected.exe" | C:\Users\admin\AppData\Local\Temp\GTA3_protected.exe | AmongUs.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3604 | "C:\ProgramData\svchost32.exe" | C:\ProgramData\svchost32.exe | GTA3_protected.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
1544 | netsh firewall add allowedprogram "C:\ProgramData\svchost32.exe" "svchost32.exe" ENABLE | C:\Windows\system32\netsh.exe | — | svchost32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 1 | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchLowDateTime |
Value: | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 30942999 | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateLowDateTime |
Value: | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30942999 | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
Operation: | write | Name: | CachePrefix |
Value: | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
(PID) Process: | (1252) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3096 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\watch[1].js | text | |
MD5:145C45973695FC80821C5B2B4CED41D6 | SHA256:09E8C5AA4B7A32888E5006C05BFADE343007FC20E59EB038C7B0CA93772D0699 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE432C2EE45E016635C9B13C029DA7E7 | binary | |
MD5:5947CDD23FAC3F4D02A522E1EA290F53 | SHA256:1A4E459F8DAE659CDB6EA5ED72FF26CCAAD497B3D603FC303A841144FEAECD33 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E887E036775F4159E2816B7B9E527E5F_ADE58CF9589C2D8854882E94BDAA0990 | der | |
MD5:52ED616EC9730A80D63912642ED4AC22 | SHA256:BAC088B9F06F909826042C16B6CA3362A14786E9378C86A6021724C404D1BB69 | |||
1252 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63 | der | |
MD5:76283AF373B7472EA5F8BC5E31759631 | SHA256:67296BD703E29E0F61383AFB155E97F33FDB03259DED4216C60E67CF339A5335 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE432C2EE45E016635C9B13C029DA7E7 | der | |
MD5:398C93980B475EDE281287185CB8E1B0 | SHA256:2434D087B3F932C49D0037D2A10583B0FFC47F119C8F12F3A064DEE3323F5376 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E887E036775F4159E2816B7B9E527E5F_D0F3378B0A5E09534CCA8798569940EB | binary | |
MD5:6C9C6367A2F954E92E11CF5CF3B4159F | SHA256:6A41A2F41230540D3E2AB75971721AD41573E1DDD34BC47ABC0C660F0EEEC529 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\RMUQ5QAK.txt | text | |
MD5:81E2AAE4B781FC0D53F6B08D10EE6709 | SHA256:7E94B5B0B1AABC1E6A32F4E6A47FFE7304A229BE456C7D214B75838C4E6F63DE | |||
3096 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\856FDBDDFEAC90A3D62D621EBF196637 | binary | |
MD5:8B71B4852CD04BC6C27E6E8EE23C6C03 | SHA256:650571F7C818E4E7CD4096E3BCE1ED84A4AF1BE959002494952D44B810706086 | |||
1252 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63 | binary | |
MD5:1BC714885EBA903BA374D1984C135DD6 | SHA256:CAB6096122C17D7C4D49B334D2555F596BB7F78CCC0000157B3AC0D887BFCBC6 | |||
3096 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\ULOvJcTG9218qg[1].htm | html | |
MD5:1AE869071F231E1A7B6AB4D2EC316BEF | SHA256:71C1661CF51CB9A6CB965D1814B239E46A06B56CA3BA094B452E5DD041EC5243 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3096 | iexplore.exe | GET | 200 | 5.45.205.245:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CEGlTKIPuh018TJJ9M3J8QXw%3D | RU | der | 1.48 Kb | whitelisted |
3096 | iexplore.exe | GET | 200 | 5.45.205.245:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CEHRZJfRPMHgFPZtk3%2Bcwtlc%3D | RU | der | 1.48 Kb | whitelisted |
3096 | iexplore.exe | GET | 200 | 5.45.205.245:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CED3qPfT1yuXcCePg2RUC75o%3D | RU | der | 1.48 Kb | whitelisted |
3096 | iexplore.exe | GET | 200 | 2.16.186.232:80 | http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR5iK7tYk9tqQEoeQhZNkKcAol9bgQUjEPEy22YwaechGnr30oNYJY6w%2FsCEQCTkoVAAWVxX5R%2FKI%2FvyZso | unknown | der | 1.50 Kb | whitelisted |
3096 | iexplore.exe | GET | 200 | 5.45.205.245:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CEDOB3I9UeYBPeBwD%2BBgMzcg%3D | RU | der | 1.48 Kb | whitelisted |
1252 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D | US | der | 1.47 Kb | whitelisted |
3096 | iexplore.exe | GET | 200 | 2.16.186.208:80 | http://crl.certum.pl/ca.crl | unknown | der | 845 b | whitelisted |
3096 | iexplore.exe | GET | 200 | 2.16.186.208:80 | http://crl.certum.pl/ctnca.crl | unknown | der | 619 b | whitelisted |
3096 | iexplore.exe | GET | 200 | 5.45.205.245:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CEHoHzpzggMLl%2Fc8M87bvClo%3D | RU | der | 1.48 Kb | whitelisted |
3096 | iexplore.exe | GET | 200 | 2.16.186.232:80 | http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEQDkBUeDDgxkUpdvejVJwN1I | unknown | der | 1.54 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1252 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
3096 | iexplore.exe | 2.16.186.163:80 | subca.ocsp-certum.com | Akamai International B.V. | — | whitelisted |
3096 | iexplore.exe | 87.250.250.119:443 | mc.yandex.ru | YANDEX LLC | RU | whitelisted |
3096 | iexplore.exe | 5.45.205.245:80 | yandex.ocsp-responder.com | YANDEX LLC | RU | whitelisted |
3096 | iexplore.exe | 178.154.131.215:443 | yastatic.net | YANDEX LLC | RU | whitelisted |
1252 | iexplore.exe | 131.253.33.200:443 | www.bing.com | Microsoft Corporation | US | whitelisted |
3096 | iexplore.exe | 87.250.250.50:443 | disk.yandex.ru | YANDEX LLC | RU | whitelisted |
3096 | iexplore.exe | 2.16.186.208:80 | crl.certum.pl | Akamai International B.V. | — | whitelisted |
3096 | iexplore.exe | 8.248.133.254:80 | ctldl.windowsupdate.com | Level 3 Communications, Inc. | US | malicious |
3096 | iexplore.exe | 2.16.186.232:80 | subca.ocsp-certum.com | Akamai International B.V. | — | whitelisted |
Domain | IP | Reputation |
---|---|---|
disk.yandex.ru |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
subca.ocsp-certum.com |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
crl.certum.pl |
| whitelisted |
yandex.ocsp-responder.com |
| whitelisted |
mc.yandex.ru |
| whitelisted |
yastatic.net |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) |