File name:

NjRat-Platinum-Edtion-main.zip

Full analysis: https://app.any.run/tasks/a7601507-0f7f-4ebc-a0f0-da6b70464097
Verdict: Malicious activity
Analysis date: November 30, 2024, 11:41:22
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

8E2E40E372E68C8A7C47C8BF4D44F373

SHA1:

EBA133F255DC411B3495ECA8EEE38641DE7CA760

SHA256:

3F10DA55368841FDCDCC2D172D8B908D1763539B10EE1A42782F8DB546636CE6

SSDEEP:

196608:IQT6k2W88OpGNS5lluhaAfYeaMZYl6aEMA:t6k2x/llu0oRrZYlnO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • NjRat Platinum Edition.exe (PID: 7080)
    • Executable content was dropped or overwritten

      • NjRat Platinum Edition.exe (PID: 7080)
    • Process drops python dynamic module

      • NjRat Platinum Edition.exe (PID: 7080)
    • Application launched itself

      • NjRat Platinum Edition.exe (PID: 7080)
    • Process drops legitimate windows executable

      • NjRat Platinum Edition.exe (PID: 7080)
    • Loads Python modules

      • NjRat Platinum Edition.exe (PID: 7100)
  • INFO

    • Reads the computer name

      • NjRat Platinum Edition.exe (PID: 7080)
      • NjRat Platinum Edition.exe (PID: 7100)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6808)
    • Checks supported languages

      • NjRat Platinum Edition.exe (PID: 7080)
      • NjRat Platinum Edition.exe (PID: 7100)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6808)
    • Manual execution by a user

      • NjRat Platinum Edition.exe (PID: 7080)
    • Create files in a temporary directory

      • NjRat Platinum Edition.exe (PID: 7080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:11:29 15:04:32
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: NjRat-Platinum-Edtion-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs njrat platinum edition.exe njrat platinum edition.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6808"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\NjRat-Platinum-Edtion-main.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7040C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7080"C:\Users\admin\Desktop\NjRat-Platinum-Edtion-main\NjRat Platinum Edition.exe" C:\Users\admin\Desktop\NjRat-Platinum-Edtion-main\NjRat Platinum Edition.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\njrat-platinum-edtion-main\njrat platinum edition.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7100"C:\Users\admin\Desktop\NjRat-Platinum-Edtion-main\NjRat Platinum Edition.exe" C:\Users\admin\Desktop\NjRat-Platinum-Edtion-main\NjRat Platinum Edition.exeNjRat Platinum Edition.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\njrat-platinum-edtion-main\njrat platinum edition.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
1 489
Read events
1 481
Write events
8
Delete events
0

Modification events

(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\NjRat-Platinum-Edtion-main.zip
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6808) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
69
Suspicious files
2
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.21047\NjRat-Platinum-Edtion-main\NjRat Platinum Edition.exeexecutable
MD5:1D756AD44006FB65CF7814FF37BA4100
SHA256:9D87C3740849853EA177065A10BE3E88861F4A1C81917EE020E4432DA53F3BBF
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.21047\NjRat-Platinum-Edtion-main\GeoIP.datbinary
MD5:A0A228C187329AD148F33C81DDB430BB
SHA256:B4BFD1EBC50F0EAAB3D3F4C2152FEAE7AA8EFAD380B85064153A6BFD006C6210
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.21047\NjRat-Platinum-Edtion-main\NjRat Platinum Edition.exe.configxml
MD5:DA15A1D8D770B57356DDD384342B3034
SHA256:C45C9D1D30F940289498BE2AF978D74178A5C24CEB7755C2648F6C7A89353813
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.21047\NjRat-Platinum-Edtion-main\Mono.Cecil.dllexecutable
MD5:851EC9D84343FBD089520D420348A902
SHA256:CDADC26C09F869E21053EE1A0ACF3B2D11DF8EDD599FE9C377BD4D3CE1C9CDA9
7080NjRat Platinum Edition.exeC:\Users\admin\AppData\Local\Temp\_MEI70802\_cffi_backend.cp313-win_amd64.pydexecutable
MD5:5CBA92E7C00D09A55F5CBADC8D16CD26
SHA256:0E3D149B91FC7DC3367AB94620A5E13AF6E419F423B31D4800C381468CB8AD85
6808WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6808.21047\NjRat-Platinum-Edtion-main\NjRat Platinum Edition.xmlxml
MD5:0F2EE4833BFBF61F404BB982C40BA249
SHA256:25FDF1BF3806EF92E022C6085F63D44EE314764CB053B9456AD0C8D86ABD1301
7080NjRat Platinum Edition.exeC:\Users\admin\AppData\Local\Temp\_MEI70802\VCRUNTIME140_1.dllexecutable
MD5:68156F41AE9A04D89BB6625A5CD222D4
SHA256:82A2F9AE1E6146AE3CB0F4BC5A62B7227E0384209D9B1AEF86BBCC105912F7CD
7080NjRat Platinum Edition.exeC:\Users\admin\AppData\Local\Temp\_MEI70802\_socket.pydexecutable
MD5:FE896371430BD9551717EF12A3E7E818
SHA256:35246B04C6C7001CA448554246445A845CE116814A29B18B617EA38752E4659B
7080NjRat Platinum Edition.exeC:\Users\admin\AppData\Local\Temp\_MEI70802\_ssl.pydexecutable
MD5:1C0E3E447F719FBE2601D0683EA566FC
SHA256:63AE2FEFBFBBBC6EA39CDE0A622579D46FF55134BC8C1380289A2976B61F603E
7080NjRat Platinum Edition.exeC:\Users\admin\AppData\Local\Temp\_MEI70802\_hashlib.pydexecutable
MD5:32D76C9ABD65A5D2671AEEDE189BC290
SHA256:838D5C8B7C3212C8429BAF612623ABBBC20A9023EEC41E34E5461B76A285B86C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
28
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2736
SIHClient.exe
GET
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2736
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6384
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.53.40.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
104.126.37.145:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
23.218.210.69:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.53.40.177
  • 23.53.40.176
  • 23.53.40.178
  • 23.53.40.170
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 172.217.18.110
whitelisted
www.bing.com
  • 104.126.37.145
  • 104.126.37.137
  • 104.126.37.162
  • 104.126.37.139
  • 104.126.37.155
  • 104.126.37.146
  • 104.126.37.154
  • 104.126.37.170
  • 104.126.37.153
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.72
  • 40.126.32.68
  • 40.126.32.74
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.22
  • 20.190.160.14
  • 20.190.160.20
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info