| File name: | Keygen Xdecoder.exe |
| Full analysis: | https://app.any.run/tasks/61a1f201-31bc-4d82-922f-6f8fe2b5fede |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | October 08, 2023, 19:20:18 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | A26AFC4B230CDE67DEC5E341AEF0E90F |
| SHA1: | F5A7A08BBD039184C3E89F4EA4EF5EEB392B5FA1 |
| SHA256: | 567C4101AA7AD812B7BD42D87A5BA7D9C4F82DD7096DAA7B079CFA70649DEC2E |
| SSDEEP: | 98304:aoA0Bl+S3HvHV/xpGL63VIPPzeb75h3G9wVLWrKtOzf8rTtZbDoGyLBIjxiDNU71:MlA6Mb |
| .exe | | | Win64 Executable (generic) (61.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.6) |
| .exe | | | Win32 Executable (generic) (10) |
| .exe | | | Win16/32 Executable Delphi generic (4.6) |
| .exe | | | Generic Win/DOS Executable (4.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2014:06:10 10:39:38+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 5120 |
| InitializedDataSize: | 27136 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x9367bc |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | data.exe |
| LegalCopyright: | |
| OriginalFileName: | data.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 3.5.2.4 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1648 | "C:\Users\admin\AppData\Local\Temp\Keygen Xdecoder.exe" | C:\Users\admin\AppData\Local\Temp\Keygen Xdecoder.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 2636 | "C:\Users\admin\AppData\Local\Temp\Keygen (2).exe" | C:\Users\admin\AppData\Local\Temp\Keygen (2).exe | — | Keygen Xdecoder.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3272 | "C:\Users\admin\AppData\Local\Temp\paylod.exe" | C:\Users\admin\AppData\Local\Temp\paylod.exe | Keygen Xdecoder.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
NjRat(PID) Process(3272) paylod.exe C2ecutuning.ddns.net Ports11560 BotnetHacKed Options Auto-run registry keySoftware\Microsoft\Windows\CurrentVersion\Run\Windows Splitter|-F-| Versionnull | |||||||||||||||
| (PID) Process: | (1648) Keygen Xdecoder.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1648) Keygen Xdecoder.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1648) Keygen Xdecoder.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1648) Keygen Xdecoder.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3272) paylod.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Windows |
Value: C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.URL | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1648 | Keygen Xdecoder.exe | C:\Users\admin\AppData\Local\Temp\paylod.exe | executable | |
MD5:E6149ED0CDF7E22AAA3C79DFC7150900 | SHA256:B107529CCC4A4AD32AB1BD60EF6AE6B1CEBC5E5252C0A6CD53A0CF6028E346D2 | |||
| 3272 | paylod.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe | executable | |
MD5:E6149ED0CDF7E22AAA3C79DFC7150900 | SHA256:B107529CCC4A4AD32AB1BD60EF6AE6B1CEBC5E5252C0A6CD53A0CF6028E346D2 | |||
| 3272 | paylod.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk | binary | |
MD5:EADDF8DD7CEEFFF2DE8B265970ADD314 | SHA256:8920494EA918C0D1D4CA61C94211ECC84F7504D1C6310E85A1F1942E52452218 | |||
| 3272 | paylod.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk | binary | |
MD5:0BBF8B5C7BB547288F77898FEBE53999 | SHA256:0494B3C5ED0E3D4AE9D8659A8D46DFA4B5D78D8A4287DDFE4AA00CDE2B978FFE | |||
| 3272 | paylod.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe | executable | |
MD5:E6149ED0CDF7E22AAA3C79DFC7150900 | SHA256:B107529CCC4A4AD32AB1BD60EF6AE6B1CEBC5E5252C0A6CD53A0CF6028E346D2 | |||
| 1648 | Keygen Xdecoder.exe | C:\Users\admin\AppData\Local\Temp\Keygen (2).exe | executable | |
MD5:91B154D347D471B16C0662F071828792 | SHA256:83F395011AADF443178DC7FDFB4857A61872AB46F7D2EAC68905632965706042 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2656 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3272 | paylod.exe | 105.105.68.11:11560 | ecutuning.ddns.net | Telecom Algeria | DZ | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
ecutuning.ddns.net |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1088 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
1088 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3272 | paylod.exe | Malware Command and Control Activity Detected | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) |