| File name: | Havij 1.17 Pro.exe |
| Full analysis: | https://app.any.run/tasks/c02bb4b4-6366-4c1f-8383-6b34da2205f1 |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | September 18, 2023, 21:49:55 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 65EF6EEE7A262F5C02E9B266C25F05C8 |
| SHA1: | 8045AA05AD5DDDDE0FC28167F8CB675460C417E8 |
| SHA256: | 768B26A2C4F73347DD6E422E79EED1DE2D9BBD5DD8E0241789C3B596E2227707 |
| SSDEEP: | 196608:9NXMdpmPY9Hs+0uS2w9wypo6iXEujAmgYKqxmu8T19ueh:9NXMdJHhE2wVoRXnYzBZ9uO |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (62) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.5) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Win16/32 Executable Delphi generic (1.7) |
| AssemblyVersion: | 0.0.0.0 |
|---|---|
| ProductVersion: | 0.0.0.0 |
| OriginalFileName: | Havij v1.17 Pro.Scr |
| LegalCopyright: | |
| InternalName: | Havij v1.17 Pro.Scr |
| FileVersion: | 0.0.0.0 |
| FileDescription: | |
| CharacterSet: | Unicode |
| LanguageCode: | Neutral |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 0.0.0.0 |
| FileVersionNumber: | 0.0.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | - |
| OSVersion: | 4 |
| EntryPoint: | 0x669b2e |
| UninitializedDataSize: | - |
| InitializedDataSize: | 8704 |
| CodeSize: | 6716416 |
| LinkerVersion: | 8 |
| PEType: | PE32 |
| ImageFileCharacteristics: | Executable, 32-bit |
| TimeStamp: | 2017:01:26 23:33:44+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 600 | "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\tabctl32.ocx" | C:\Windows\System32\regsvr32.exe | — | LocalRxzRCaYgEo..tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1080 | "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\comdlg32.ocx" | C:\Windows\System32\regsvr32.exe | — | LocalRxzRCaYgEo..tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1140 | "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\RICHTX32.ocx" | C:\Windows\System32\regsvr32.exe | — | LocalRxzRCaYgEo..tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1872 | "C:\Users\admin\AppData\Local\Temp\Havij 1.17 Pro.exe" | C:\Users\admin\AppData\Local\Temp\Havij 1.17 Pro.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 2032 | "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\Mscomctl.ocx" | C:\Windows\System32\regsvr32.exe | — | LocalRxzRCaYgEo..tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2188 | "C:\Users\admin\AppData\Local\Temp\is-NPUOH.tmp\LocalRxzRCaYgEo..tmp" /SL5="$80148,6394355,53248,C:\Users\admin\AppData\LocalRxzRCaYgEo..exe" /SPAWNWND=$7015C /NOTIFYWND=$501A8 | C:\Users\admin\AppData\Local\Temp\is-NPUOH.tmp\LocalRxzRCaYgEo..tmp | — | LocalRxzRCaYgEo..exe | |||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.49.0.0 Modules
| |||||||||||||||
| 2372 | "C:\Users\admin\AppData\LocalWWUfYhvZ_Q.exe" | C:\Users\admin\AppData\LocalWWUfYhvZ_Q.exe | — | Havij 1.17 Pro.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2500 | "C:\Users\admin\AppData\LocalRxzRCaYgEo..exe" | C:\Users\admin\AppData\LocalRxzRCaYgEo..exe | — | Havij 1.17 Pro.exe | |||||||||||
User: admin Company: ITSecTeam Integrity Level: MEDIUM Description: Havij Setup Exit code: 0 Version: Modules
| |||||||||||||||
| 2508 | "C:\Users\admin\AppData\LocalRxzRCaYgEo..exe" /SPAWNWND=$7015C /NOTIFYWND=$501A8 | C:\Users\admin\AppData\LocalRxzRCaYgEo..exe | LocalRxzRCaYgEo..tmp | ||||||||||||
User: admin Company: ITSecTeam Integrity Level: HIGH Description: Havij Setup Exit code: 0 Version: Modules
| |||||||||||||||
| 2780 | "C:\Users\admin\AppData\Roaming\svchost.exe" | C:\Users\admin\AppData\Roaming\svchost.exe | LocalWWUfYhvZ_Q.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1872) Havij 1.17 Pro.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1872) Havij 1.17 Pro.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1872) Havij 1.17 Pro.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1872) Havij 1.17 Pro.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2372) LocalWWUfYhvZ_Q.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2372) LocalWWUfYhvZ_Q.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2372) LocalWWUfYhvZ_Q.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2372) LocalWWUfYhvZ_Q.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3244) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2780) svchost.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | 23556fb1360f366337f97c924e76ead3 |
Value: "C:\Users\admin\AppData\Roaming\svchost.exe" .. | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2500 | LocalRxzRCaYgEo..exe | C:\Users\admin\AppData\Local\Temp\is-V822A.tmp\LocalRxzRCaYgEo..tmp | executable | |
MD5:52950AC9E2B481453082F096120E355A | SHA256:25FBC88C7C967266F041AE4D47C2EAE0B96086F9E440CCA10729103AEE7EF6CD | |||
| 2372 | LocalWWUfYhvZ_Q.exe | C:\Users\admin\AppData\Roaming\svchost.exe | executable | |
MD5:96CB03170A631751D8AA1F6F4DCB6C26 | SHA256:1B69C4AE3C541EA875A7A467A6D7D8E4212AC4A7EB92938128174E86649B0CCF | |||
| 1872 | Havij 1.17 Pro.exe | C:\Users\admin\AppData\LocalWWUfYhvZ_Q.exe | executable | |
MD5:96CB03170A631751D8AA1F6F4DCB6C26 | SHA256:1B69C4AE3C541EA875A7A467A6D7D8E4212AC4A7EB92938128174E86649B0CCF | |||
| 1872 | Havij 1.17 Pro.exe | C:\Users\admin\AppData\LocalRxzRCaYgEo..exe | executable | |
MD5:7174885A28D74433457F718B592FE141 | SHA256:883EC8F4371547D297895632D59CCD2E50AD1826F6CC47D09873390A53393344 | |||
| 2188 | LocalRxzRCaYgEo..tmp | C:\Program Files\ITSecTeam\Havij Pro\is-RPQLH.tmp | executable | |
MD5:5B378CD74524AF6C5598ED941353F553 | SHA256:44E3A322DE318415B267993C21551F92F7DA4B6B63015472C6F6F3877EEE3A22 | |||
| 2188 | LocalRxzRCaYgEo..tmp | C:\Windows\System32\RICHTX32.ocx | executable | |
MD5:21034A336E16F30345A96DE9BD8CEC25 | SHA256:251A419BB5998882227A11188311B82F20C4952865FF916397973BD9A50C69D5 | |||
| 2188 | LocalRxzRCaYgEo..tmp | C:\Program Files\ITSecTeam\Havij Pro\unins000.exe | executable | |
MD5:5B378CD74524AF6C5598ED941353F553 | SHA256:44E3A322DE318415B267993C21551F92F7DA4B6B63015472C6F6F3877EEE3A22 | |||
| 2188 | LocalRxzRCaYgEo..tmp | C:\Windows\system32\is-1977U.tmp | executable | |
MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6 | SHA256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311 | |||
| 2188 | LocalRxzRCaYgEo..tmp | C:\Windows\System32\comdlg32.ocx | executable | |
MD5:D76F0EAB36F83A31D411AEAF70DA7396 | SHA256:46F4FDB12C30742FF4607876D2F36CF432CDC7EC3D2C99097011448FC57E997C | |||
| 2188 | LocalRxzRCaYgEo..tmp | C:\Windows\System32\Mswinsck.ocx | executable | |
MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6 | SHA256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2780 | svchost.exe | 139.99.66.103:1177 | hacksimo.linkpc.net | OVH SAS | SG | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
hacksimo.linkpc.net |
| unknown |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
1088 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to DynDNS Domain (linkpc .net) |