| File name: | fud.exe |
| Full analysis: | https://app.any.run/tasks/eab689c0-fb07-4adb-adc9-69bb16bc009b |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | December 16, 2023, 18:51:13 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 53117B1F1D3561445694538754BF77AF |
| SHA1: | 9520417281890265F3988B985549D65558D76F6E |
| SHA256: | 35ADCEAC514FD31440CF0E7A71405028B45CC650B4411BE6D3448A5AD2FDC535 |
| SSDEEP: | 24576:sPCFUdOoAAMS5vNu7wZDpoSy+lkhSlkOtQxbanxhXRRO3TTlkAmV5wq:ICFbOMSVNud+l/BQxbanxhXRRWTTlkAs |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (49) |
|---|---|---|
| .exe | | | Win32 Executable MS Visual C++ (generic) (20.9) |
| .exe | | | Win64 Executable (generic) (18.5) |
| .dll | | | Win32 Dynamic Link Library (generic) (4.4) |
| .exe | | | Win32 Executable (generic) (3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2017:11:04 19:13:20+01:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 11 |
| CodeSize: | 93184 |
| InitializedDataSize: | 13312 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x18bbe |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 1.0.0.0 |
| InternalName: | protect.exe |
| LegalCopyright: | Copyright © 2017 |
| OriginalFileName: | protect.exe |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Users\admin\AppData\Local\Temp\fud.exe" | C:\Users\admin\AppData\Local\Temp\fud.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 572 | "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate | C:\ProgramData\Synaptics\Synaptics.exe | fud.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 764 | C:\ProgramData\Synaptics\Synaptics.exe | C:\ProgramData\Synaptics\Synaptics.exe | Synaptics.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1776 | C:\Users\admin\AppData\Local\Temp\fud.exe | C:\Users\admin\AppData\Local\Temp\fud.exe | — | fud.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1852 | taskkill /f /im Wireshark.exe | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1992 | "cmd.exe" | C:\Windows\System32\cmd.exe | — | dllhost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 4294967295 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2000 | "C:\Users\admin\AppData\Local\Temp\._cache_Synaptics.exe" | C:\Users\admin\AppData\Local\Temp\._cache_Synaptics.exe | Synaptics.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2028 | schtasks /delete /tn CleanSweepCheck /f | C:\Windows\System32\schtasks.exe | — | dllhost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2032 | "C:\Users\admin\AppData\Local\Temp\._cache_fud.exe" | C:\Users\admin\AppData\Local\Temp\._cache_fud.exe | — | fud.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2448 | "C:\Users\admin\AppData\Local\Temp\dllhost.exe" | C:\Users\admin\AppData\Local\Temp\dllhost.exe | ._cache_fud.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
NjRat(PID) Process(2448) dllhost.exe C2subjects-movements.gl.at.ply.gg Ports25176 BotnetVictim Options Auto-run registry keySoftware\Microsoft\Windows\CurrentVersion\Run\36fa2486aeb9c7d7ba4441896d6a9543 SplitterY262SUCZ4UJJ Version<- NjRAT 0.7d Horror Edition -> | |||||||||||||||
| (PID) Process: | (1776) fud.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1776) fud.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1776) fud.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1776) fud.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1776) fud.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (764) Synaptics.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (764) Synaptics.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (764) Synaptics.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (764) Synaptics.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (764) Synaptics.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2032 | ._cache_fud.exe | C:\Users\admin\AppData\Local\Temp\dllhost.exe | executable | |
MD5:EC543508A04E9B85A9A5EF9F90E50A43 | SHA256:C35BA2387ECEB2622B64854346EDF8F2120A7C73C796FDC6C076E9EB98C5D640 | |||
| 764 | Synaptics.exe | C:\Users\admin\AppData\Local\Temp\._cache_Synaptics.exe | executable | |
MD5:EC543508A04E9B85A9A5EF9F90E50A43 | SHA256:C35BA2387ECEB2622B64854346EDF8F2120A7C73C796FDC6C076E9EB98C5D640 | |||
| 1776 | fud.exe | C:\Users\admin\AppData\Local\Temp\._cache_fud.exe | executable | |
MD5:EC543508A04E9B85A9A5EF9F90E50A43 | SHA256:C35BA2387ECEB2622B64854346EDF8F2120A7C73C796FDC6C076E9EB98C5D640 | |||
| 2448 | dllhost.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\36fa2486aeb9c7d7ba4441896d6a9543.exe | executable | |
MD5:EC543508A04E9B85A9A5EF9F90E50A43 | SHA256:C35BA2387ECEB2622B64854346EDF8F2120A7C73C796FDC6C076E9EB98C5D640 | |||
| 2000 | ._cache_Synaptics.exe | C:\ClickMe.exe | executable | |
MD5:EC543508A04E9B85A9A5EF9F90E50A43 | SHA256:C35BA2387ECEB2622B64854346EDF8F2120A7C73C796FDC6C076E9EB98C5D640 | |||
| 1776 | fud.exe | C:\ProgramData\Synaptics\Synaptics.exe | executable | |
MD5:53117B1F1D3561445694538754BF77AF | SHA256:35ADCEAC514FD31440CF0E7A71405028B45CC650B4411BE6D3448A5AD2FDC535 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
764 | Synaptics.exe | GET | 200 | 69.42.215.252:80 | http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978 | unknown | text | 31 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
764 | Synaptics.exe | 69.42.215.252:80 | freedns.afraid.org | AWKNET | US | unknown |
2448 | dllhost.exe | 147.185.221.17:25176 | subjects-movements.gl.at.ply.gg | PLAYIT-GG | US | malicious |
Domain | IP | Reputation |
|---|---|---|
xred.mooo.com |
| unknown |
freedns.afraid.org |
| whitelisted |
subjects-movements.gl.at.ply.gg |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to Abused Domain *.mooo.com |
1080 | svchost.exe | Potentially Bad Traffic | ET INFO playit .gg Tunneling Domain in DNS Lookup |
2448 | dllhost.exe | Malware Command and Control Activity Detected | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) |