File name:

New-Client.exe

Full analysis: https://app.any.run/tasks/7d6526ca-b995-490f-b87b-f10795342efc
Verdict: Malicious activity
Threats:

LimeRAT is Remote Administration Trojan malware that boasts an array of harmful capabilities. While masquerading as a legitimate tool, it can perform malicious operations like encryption, keylogging, and cryptomining, which makes it appealing to cybercriminals

Analysis date: December 14, 2024, 05:15:43
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
limerat
pastebin
trojan
rat
njrat
bladabindi
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

B8813BA4749B8BEA32E1EF702AD83C34

SHA1:

AA849260F51FE5DE7715C7891D2ECDB451D9D64C

SHA256:

46C414D0DA7AB1033AE781C9DA1A37914CFBC8EBA076F1A77887C69D333DAEA1

SSDEEP:

768:vneEySmLewQW0mr90ed3Xbp45NjiQshjED80DSNz0s:/e1LeGr90ed3XbePBshjEDtyz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • New-Client.exe (PID: 3560)
    • LIMERAT has been detected (YARA)

      • New-Client.exe (PID: 3560)
      • svhost.exe (PID: 2012)
    • LimeRAT is detected

      • svhost.exe (PID: 2012)
    • NJRAT has been detected (SURICATA)

      • svhost.exe (PID: 2012)
    • Starts CMD.EXE for self-deleting

      • svhost.exe (PID: 2012)
    • Connects to the CnC server

      • svhost.exe (PID: 2012)
  • SUSPICIOUS

    • Starts itself from another location

      • New-Client.exe (PID: 3560)
    • Executable content was dropped or overwritten

      • New-Client.exe (PID: 3560)
    • Reads security settings of Internet Explorer

      • New-Client.exe (PID: 3560)
    • The process creates files with name similar to system file names

      • New-Client.exe (PID: 3560)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 4716)
    • Starts CMD.EXE for commands execution

      • svhost.exe (PID: 2012)
    • Connects to unusual port

      • svhost.exe (PID: 2012)
    • Contacting a server suspected of hosting an CnC

      • svhost.exe (PID: 2012)
  • INFO

    • Checks supported languages

      • New-Client.exe (PID: 3560)
      • svhost.exe (PID: 2012)
    • Reads the computer name

      • svhost.exe (PID: 2012)
      • New-Client.exe (PID: 3560)
    • Reads the machine GUID from the registry

      • New-Client.exe (PID: 3560)
      • svhost.exe (PID: 2012)
    • Creates files or folders in the user directory

      • New-Client.exe (PID: 3560)
    • Process checks computer location settings

      • New-Client.exe (PID: 3560)
    • The process uses the downloaded file

      • New-Client.exe (PID: 3560)
    • Checks proxy server information

      • svhost.exe (PID: 2012)
    • Disables trace logs

      • svhost.exe (PID: 2012)
    • Reads the software policy settings

      • svhost.exe (PID: 2012)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (55.8)
.exe | Win64 Executable (generic) (21)
.scr | Windows screen saver (9.9)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x8d3e
UninitializedDataSize: -
InitializedDataSize: 512
CodeSize: 28160
LinkerVersion: 11
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2024:12:14 05:02:28+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LIMERAT new-client.exe #LIMERAT svhost.exe schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3560"C:\Users\admin\Desktop\New-Client.exe" C:\Users\admin\Desktop\New-Client.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\new-client.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2012"C:\Users\admin\AppData\Roaming\Sys\svhost.exe" C:\Users\admin\AppData\Roaming\Sys\svhost.exe
New-Client.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\sys\svhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4716schtasks /Delete /tn LimeRAT-Admin /FC:\Windows\SysWOW64\schtasks.exesvhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4944\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5588cmd.exe /c ping 0 -n 2 & del "C:\Users\admin\AppData\Roaming\Sys\svhost.exe"C:\Windows\SysWOW64\cmd.exesvhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4512ping 0 -n 2 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
5 473
Read events
5 451
Write events
20
Delete events
2

Modification events

(PID) Process:(3560) New-Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:svhost.exe
Value:
C:\Users\admin\AppData\Roaming\Sys\svhost.exe
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2012) svhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\svhost_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3560New-Client.exeC:\Users\admin\AppData\Roaming\Sys\svhost.exeexecutable
MD5:B8813BA4749B8BEA32E1EF702AD83C34
SHA256:46C414D0DA7AB1033AE781C9DA1A37914CFBC8EBA076F1A77887C69D333DAEA1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
8
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
104.20.4.235:443
https://pastebin.com/raw/aNRufvVn
unknown
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3508
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
172.67.19.24:443
https://pastebin.com/raw/aNRufvVn
unknown
text
18 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3508
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.23.209.140:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3508
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3508
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.23.209.140
  • 2.23.209.182
  • 2.23.209.179
  • 2.23.209.189
  • 2.23.209.176
  • 2.23.209.133
  • 2.23.209.185
  • 2.23.209.149
whitelisted
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
pastebin.com
  • 104.20.4.235
  • 172.67.19.24
  • 104.20.3.235
shared
self.events.data.microsoft.com
  • 20.189.173.27
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Online Pastebin Text Storage
1 ETPRO signatures available at the full report
No debug info