| File name: | XEN 1.0.4 [ FUD Crypter ].rar |
| Full analysis: | https://app.any.run/tasks/d8afadbe-ff6e-4929-b3b6-9128a66d4a54 |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | May 29, 2020, 22:17:11 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 1E8123D9329FB2ED123CED86C5E95DCB |
| SHA1: | DF7B6D460F19015140AC9ECD38B245D260AA9F07 |
| SHA256: | 7A3DAE1FADAD89A3EACC2E79DA5C7D844C083DD272CB13562AD7A3467C1BCED9 |
| SSDEEP: | 12288:tQSss2oytmEG2ypoLtfehF4ufg7IBTvp4+4G+iyfReYNT:WSss2oyY72QQtRufg7IBT2+yY2T |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 944 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 948 | "C:\Users\admin\AppData\Local\Temp\Server.exe" | C:\Users\admin\AppData\Local\Temp\Server.exe | simple server.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 956 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1004 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1344 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2088 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\script.vbs" | C:\Windows\System32\WScript.exe | — | simple server.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 2204 | "C:\Users\admin\AppData\Local\Temp\svhost5.exe" | C:\Users\admin\AppData\Local\Temp\svhost5.exe | Server5.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2240 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\script.vbs" /elevate | C:\Windows\System32\WScript.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 2260 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2284 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E |
| Operation: | write | Name: | @C:\Windows\system32\NetworkExplorer.dll,-1 |
Value: Network | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\XEN 1.0.4 [ FUD Crypter ].rar | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2796) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2796 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2796.48415\XEN 1.0.4 [ FUD Crypter ]\stub.exe | — | |
MD5:— | SHA256:— | |||
| 2796 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2796.48415\XEN 1.0.4 [ FUD Crypter ]\XEN Crypter.exe | — | |
MD5:— | SHA256:— | |||
| 3340 | XEN Crypter.exe | C:\Users\admin\AppData\Local\Temp\windows firewall.exe | executable | |
MD5:— | SHA256:— | |||
| 3340 | XEN Crypter.exe | C:\Users\admin\AppData\Local\Temp\FUD Server.exe | executable | |
MD5:— | SHA256:— | |||
| 2260 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OP3RMAUJ0OHJI7ICHQ8E.temp | — | |
MD5:— | SHA256:— | |||
| 3240 | vbc.exe | C:\Users\admin\AppData\Roaming\kzlglt3e\ohigtcy0.eed | text | |
MD5:— | SHA256:— | |||
| 3340 | XEN Crypter.exe | C:\Users\admin\AppData\Local\Temp\XEN.exe | executable | |
MD5:— | SHA256:— | |||
| 3948 | XEN Crypter.exe | C:\Users\admin\AppData\Local\Temp\XEN Crypter.exe | executable | |
MD5:— | SHA256:— | |||
| 2316 | XEN.exe | C:\Users\admin\AppData\Roaming\Notepad++K\WUDFHost.exe | executable | |
MD5:— | SHA256:— | |||
| 3240 | vbc.exe | C:\Users\admin\AppData\Roaming\kzlglt3e\wkp04hnm.nxq | sqlite | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3240 | vbc.exe | GET | 200 | 5.79.66.145:80 | http://mytestftpforme.kl.com.ua/HzwbM.png | NL | binary | 370 Kb | malicious |
2316 | XEN.exe | GET | 200 | 5.79.66.145:80 | http://mytestftpforme.kl.com.ua/kek.png | NL | binary | 1.02 Mb | malicious |
3240 | vbc.exe | GET | 200 | 54.225.66.103:80 | http://api.ipify.org/ | US | text | 13 b | shared |
3240 | vbc.exe | POST | 200 | 5.79.66.145:80 | http://mytestftpforme.kl.com.ua/cart.php | NL | html | 2.07 Kb | malicious |
2316 | XEN.exe | GET | 200 | 5.79.66.145:80 | http://mytestftpforme.kl.com.ua/cat.png | NL | binary | 356 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3240 | vbc.exe | 5.79.66.145:80 | mytestftpforme.kl.com.ua | LeaseWeb Netherlands B.V. | NL | malicious |
2316 | XEN.exe | 5.79.66.145:80 | mytestftpforme.kl.com.ua | LeaseWeb Netherlands B.V. | NL | malicious |
3240 | vbc.exe | 54.225.66.103:80 | api.ipify.org | Amazon.com, Inc. | US | shared |
4036 | svhost3.exe | 141.255.153.253:6666 | hackerguru.duckdns.org | Lost Oasis SARL | NL | malicious |
Domain | IP | Reputation |
|---|---|---|
mytestftpforme.kl.com.ua |
| malicious |
api.ipify.org |
| shared |
anonymousbaba460.ddns.net |
| malicious |
hackerguru.duckdns.org |
| malicious |
hackerguru.ddns.net |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3240 | vbc.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup api.ipify.org |
1044 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
1044 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
1044 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
1044 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |