| File name: | Cobra Crypter 2019.zip |
| Full analysis: | https://app.any.run/tasks/8896212e-12ee-4ac9-8e50-92bd776d72e5 |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | September 07, 2019, 18:42:38 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract |
| MD5: | 0B53220BF4DBE6BA60E0F26CBA88EA93 |
| SHA1: | B68B1EF55C041C375EF627E89AF29B1A84C2D8E9 |
| SHA256: | 3C0CB0FE3E3A8ACC447B4CF9BC2C042A2A73BC38FD2C2C93D53095F5E22B7290 |
| SSDEEP: | 49152:9ouOsHrseCJDBVt+pe+ZDKrJdP9R4EKeWi9VxLgnjAG+q1eS1YwgoOJeVmt5:73HweODBVtO78lR4iWoKjAjq1T9g0on |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0009 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2019:06:24 01:00:08 |
| ZipCRC: | 0x9db09254 |
| ZipCompressedSize: | 2531529 |
| ZipUncompressedSize: | 2813952 |
| ZipFileName: | Cobra Crypter 2019.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1440 | "C:\Users\admin\Desktop\AgJeB.exe" | C:\Users\admin\Desktop\AgJeB.exe | explorer.exe | ||||||||||||
User: admin Company: Cobra Inc. Integrity Level: HIGH Description: Setup Exit code: 0 Version: 2.21.19.529 Modules
| |||||||||||||||
| 2064 | "{path}" | C:\Users\admin\Desktop\QzKyR.exe | — | QzKyR.exe | |||||||||||
User: admin Company: Cobra Inc. Integrity Level: HIGH Description: Setup Exit code: 3221225784 Version: 2.21.19.529 Modules
| |||||||||||||||
| 2232 | "powershell" Get-MpPreference -verbose | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | Cobra-Crypter.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2344 | "{path}" | C:\Users\admin\Desktop\AgJeB.exe | — | AgJeB.exe | |||||||||||
User: admin Company: Cobra Inc. Integrity Level: HIGH Description: Setup Exit code: 0 Version: 2.21.19.529 Modules
| |||||||||||||||
| 2492 | "C:\Users\admin\AppData\Local\Temp\Cobra-Crypter.exe" 0 | C:\Users\admin\AppData\Local\Temp\Cobra-Crypter.exe | — | Cobra Crypter 2019.exe | |||||||||||
User: admin Company: Cobra Integrity Level: HIGH Description: Cobra Crypter 2019 Exit code: 0 Version: 1.2.0.3 Modules
| |||||||||||||||
| 2528 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\pjxsptdf\pjxsptdf.cmdline" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe | Cobra Crypter 2019.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Visual C# Command Line Compiler Exit code: 0 Version: 8.0.50727.4927 (NetFXspW7.050727-4900) Modules
| |||||||||||||||
| 2544 | "C:\Users\admin\Desktop\AgJeB.exe" | C:\Users\admin\Desktop\AgJeB.exe | — | explorer.exe | |||||||||||
User: admin Company: Cobra Inc. Integrity Level: MEDIUM Description: Setup Exit code: 3221226540 Version: 2.21.19.529 Modules
| |||||||||||||||
| 2632 | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESB68F.tmp" "c:\Users\admin\Desktop\CSCB68E.tmp" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 8.00.50727.4940 (Win7SP1.050727-5400) Modules
| |||||||||||||||
| 2752 | "C:\Users\admin\AppData\Local\Temp\Cobra Crypter 2019.exe" 0 | C:\Users\admin\AppData\Local\Temp\Cobra Crypter 2019.exe | Cobra Crypter 2019.exe | ||||||||||||
User: admin Company: Cobra Crypter Integrity Level: HIGH Description: Cobra Crypter Exit code: 0 Version: 1.1.0.2 Modules
| |||||||||||||||
| 2784 | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES83E2.tmp" "c:\Users\admin\Desktop\CSC83E1.tmp" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 8.00.50727.4940 (Win7SP1.050727-5400) Modules
| |||||||||||||||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Cobra Crypter 2019.zip | |||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3604) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (2232) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2232 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\U9O92SHZ38LVP001HWU9.temp | — | |
MD5:— | SHA256:— | |||
| 3372 | csc.exe | C:\Users\admin\Desktop\CSCB68E.tmp | — | |
MD5:— | SHA256:— | |||
| 2632 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RESB68F.tmp | — | |
MD5:— | SHA256:— | |||
| 3372 | csc.exe | C:\Users\admin\AppData\Local\Temp\qbmcqg1p\qbmcqg1p.out | — | |
MD5:— | SHA256:— | |||
| 2752 | Cobra Crypter 2019.exe | C:\Users\admin\AppData\Local\Temp\pjxsptdf\pjxsptdf.0.cs | — | |
MD5:— | SHA256:— | |||
| 3604 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb3604.29217\Cobra Crypter 2019.exe | executable | |
MD5:— | SHA256:— | |||
| 2528 | csc.exe | C:\Users\admin\Desktop\CSC83E1.tmp | — | |
MD5:— | SHA256:— | |||
| 2784 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RES83E2.tmp | — | |
MD5:— | SHA256:— | |||
| 1440 | AgJeB.exe | C:\Users\Administrator\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG1 | log | |
MD5:— | SHA256:— | |||
| 2528 | csc.exe | C:\Users\admin\AppData\Local\Temp\pjxsptdf\pjxsptdf.out | — | |
MD5:— | SHA256:— | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3972 | Interface Microsoft Windows Search.exe | 79.134.225.122:10140 | fal92.duckdns.org | Andreas Fink trading as Fink Telecom Services | CH | malicious |
Domain | IP | Reputation |
|---|---|---|
fal92.duckdns.org |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1060 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
3972 | Interface Microsoft Windows Search.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT/Bladabindi |
3972 | Interface Microsoft Windows Search.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
3972 | Interface Microsoft Windows Search.exe | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |
3972 | Interface Microsoft Windows Search.exe | A Network Trojan was detected | ET TROJAN njrat ver 0.7d Malware CnC Callback (Remote Desktop) |
3972 | Interface Microsoft Windows Search.exe | A Network Trojan was detected | ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop) |
3972 | Interface Microsoft Windows Search.exe | A Network Trojan was detected | ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture) |
3972 | Interface Microsoft Windows Search.exe | A Network Trojan was detected | ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop) |
Process | Message |
|---|---|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|