File name:

FRD52114.js

Full analysis: https://app.any.run/tasks/58e9c3eb-e171-433a-9cdd-ba50d8b0e3d5
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: December 18, 2018, 12:07:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
revenge
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

5EE91894AFD04880996766C20E0EFE18

SHA1:

7415D454CCBB1D3DE8BD10E22DA9B6A74EC247E9

SHA256:

39FA2753738AEA7E2CCF56747B76038F2AFA91976107DD8ED6192B455C33BF54

SSDEEP:

24576:Xoz1TiXItfFG7rnIdBjq8A1caEm6yMcol1Diq9ePus8mK/t30vrphcMSLYPHIGZM:w

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • jubv.exe (PID: 2540)
      • vvrt.exe (PID: 3932)
    • REVENGE was detected

      • jubv.exe (PID: 2540)
      • vvrt.exe (PID: 3932)
    • Connects to CnC server

      • jubv.exe (PID: 2540)
      • vvrt.exe (PID: 3932)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3068)
      • jubv.exe (PID: 2540)
    • Connects to unusual port

      • jubv.exe (PID: 2540)
      • vvrt.exe (PID: 3932)
    • Starts itself from another location

      • jubv.exe (PID: 2540)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start wscript.exe #REVENGE jubv.exe #REVENGE vvrt.exe

Process information

PID
CMD
Path
Indicators
Parent process
2540"C:\Users\admin\AppData\Local\Temp\jubv.exe" C:\Users\admin\AppData\Local\Temp\jubv.exe
WScript.exe
User:
admin
Company:
Canneverbe Limited
Integrity Level:
MEDIUM
Description:
CDBurnerXP
Exit code:
0
Version:
4.5.8.7041
Modules
Images
c:\users\admin\appdata\local\temp\jubv.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3068"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\FRD52114.js"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3932"C:\Users\admin\Documents\vvrt.exe" C:\Users\admin\Documents\vvrt.exe
jubv.exe
User:
admin
Company:
Canneverbe Limited
Integrity Level:
MEDIUM
Description:
CDBurnerXP
Exit code:
0
Version:
4.5.8.7041
Modules
Images
c:\users\admin\documents\vvrt.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
796
Read events
788
Write events
8
Delete events
0

Modification events

(PID) Process:(3068) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3068) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2540) jubv.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2540) jubv.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3068WScript.exeC:\Users\admin\AppData\Local\Temp\jubv.exeexecutable
MD5:
SHA256:
2540jubv.exeC:\Users\admin\Documents\vvrt.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
0
Threats
28

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2540
jubv.exe
207.180.235.201:85
River City Internet Group (Primary Networks)
US
malicious
3932
vvrt.exe
207.180.235.201:85
River City Internet Group (Primary Networks)
US
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge-RAT (Win32.Netsha.RAT) C2 response
15 ETPRO signatures available at the full report
No debug info