analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

C:\Users\admin\AppData\Local\Temp\Rar$EXa3116.24136\Facebook Hijacker.exe

Full analysis: https://app.any.run/tasks/cc16f7a1-ebfd-4eef-9a17-5f5fac183977
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: October 09, 2022, 18:22:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
njrat
bladabindi
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C2AFBB63C036423C1B8BD1FBAF071635

SHA1:

37EC6DE5CA9C7527023ABB68E9E799E6D4EE72C2

SHA256:

84C12628FE25B5F98CACFF169F031E005067BB9D71494D67715B54D815406CD8

SSDEEP:

12288:LToPWBv/cpGrU3yBGkN1qHxQ/D0S/g0PbmlImGr59aAqgR:LTbBv5rUDpubRbmlImGrfAm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Facebook Hijacker.exe (PID: 3028)
      • Microsoft.exe (PID: 1588)
    • Writes to the Start menu file

      • Facebook Hijacker.exe (PID: 3028)
    • Application was dropped or rewritten from another process

      • Facebok.exe (PID: 3648)
      • Microsoft.exe (PID: 1588)
      • tmp7722.tmp.exe (PID: 924)
      • tmp84DF.tmp.exe (PID: 2976)
    • NJRAT was detected

      • Microsoft.exe (PID: 1588)
    • Connects to the CnC server

      • Microsoft.exe (PID: 1588)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Facebook Hijacker.exe (PID: 3028)
      • Microsoft.exe (PID: 1588)
    • Reads Internet Settings

      • Facebook Hijacker.exe (PID: 3028)
      • Microsoft.exe (PID: 1588)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 2104)
      • Facebook Hijacker.exe (PID: 3028)
      • Microsoft.exe (PID: 1588)
    • Application launched itself

      • cmd.exe (PID: 2104)
    • Uses NETSH.EXE for network configuration

      • Microsoft.exe (PID: 1588)
    • Starts CMD.EXE for self-deleting

      • Microsoft.exe (PID: 1588)
    • Reads settings of System Certificates

      • Microsoft.exe (PID: 1588)
  • INFO

    • Process checks LSA protection

      • Facebook Hijacker.exe (PID: 3028)
      • Facebok.exe (PID: 3648)
      • Microsoft.exe (PID: 1588)
      • tmp84DF.tmp.exe (PID: 2976)
    • Reads the computer name

      • Facebook Hijacker.exe (PID: 3028)
      • Microsoft.exe (PID: 1588)
    • Checks supported languages

      • Facebook Hijacker.exe (PID: 3028)
      • Facebok.exe (PID: 3648)
      • Microsoft.exe (PID: 1588)
      • tmp84DF.tmp.exe (PID: 2976)
      • tmp7722.tmp.exe (PID: 924)
    • Creates a file in a temporary directory

      • Facebook Hijacker.exe (PID: 3028)
      • Facebok.exe (PID: 3648)
      • Microsoft.exe (PID: 1588)
      • tmp84DF.tmp.exe (PID: 2976)
    • Creates files in the user directory

      • Facebook Hijacker.exe (PID: 3028)
    • Reads the machine GUID from the registry

      • Facebok.exe (PID: 3648)
      • Microsoft.exe (PID: 1588)
      • Facebook Hijacker.exe (PID: 3028)
      • tmp84DF.tmp.exe (PID: 2976)
    • Reads Environment values

      • Microsoft.exe (PID: 1588)
    • Reads product name

      • Microsoft.exe (PID: 1588)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2022-Mar-03 13:15:57
Detected languages:
  • English - United States
  • Process Default Language
Debug artifacts:
  • D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 272

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 6
TimeDateStamp: 2022-Mar-03 13:15:57
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
203740
203776
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.71296
.rdata
208896
44736
45056
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.26161
.data
253952
149280
4096
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.38746
.didat
405504
400
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.33273
.rsrc
409600
208696
208896
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.03444
.reloc
618496
9020
9216
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.62301

Resources

Title
Entropy
Size
Codepage
Language
Type
1
7.95349
27684
Latin 1 / Western European
Process Default Language
RT_ICON
2
5.08556
67624
Latin 1 / Western European
Process Default Language
RT_ICON
3
5.38878
38056
Latin 1 / Western European
Process Default Language
RT_ICON
4
5.38429
21640
Latin 1 / Western European
Process Default Language
RT_ICON
5
5.24396
16936
Latin 1 / Western European
Process Default Language
RT_ICON
6
5.50856
9640
Latin 1 / Western European
Process Default Language
RT_ICON
7
5.64845
4264
Latin 1 / Western European
Process Default Language
RT_ICON
8
5.83139
2440
Latin 1 / Western European
Process Default Language
RT_ICON
9
5.78486
1128
Latin 1 / Western European
Process Default Language
RT_ICON
10
2.99727
326
Latin 1 / Western European
English - United States
RT_STRING

Imports

KERNEL32.dll
OLEAUT32.dll
USER32.dll (delay-loaded)
gdiplus.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
11
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start facebook hijacker.exe cmd.exe no specs cmd.exe no specs facebok.exe no specs cmd.exe no specs #NJRAT microsoft.exe tmp7722.tmp.exe no specs tmp84df.tmp.exe no specs netsh.exe no specs cmd.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3028"C:\Users\admin\AppData\Local\Temp\Facebook Hijacker.exe" C:\Users\admin\AppData\Local\Temp\Facebook Hijacker.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\facebook hijacker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2104C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\RarSFX0\Sys.cmd" "C:\Windows\system32\cmd.exeFacebook Hijacker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3560cmd /c start Facebok.exeC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3648Facebok.exe C:\Users\admin\AppData\Local\Temp\RarSFX0\Facebok.execmd.exe
User:
admin
Company:
Madrid
Integrity Level:
MEDIUM
Exit code:
4294967295
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\facebok.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
664cmd /c start Microsoft.exeC:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1588Microsoft.exe C:\Users\admin\AppData\Local\Temp\RarSFX0\Microsoft.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\microsoft.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
924"C:\Users\admin\AppData\Local\Temp\tmp7722.tmp.exe" C:\Users\admin\AppData\Local\Temp\tmp7722.tmp.exeMicrosoft.exe
User:
admin
Company:
BSG
Integrity Level:
MEDIUM
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\tmp7722.tmp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2976"C:\Users\admin\AppData\Local\Temp\tmp84DF.tmp.exe" C:\Users\admin\AppData\Local\Temp\tmp84DF.tmp.exeMicrosoft.exe
User:
admin
Company:
BSG
Integrity Level:
MEDIUM
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\tmp84df.tmp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1580"C:\Windows\System32\netsh.exe" firewall delete allowedprogram "C:\Users\admin\AppData\Local\Temp\RarSFX0\Microsoft.exe"C:\Windows\System32\netsh.exeMicrosoft.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2400"C:\Windows\System32\cmd.exe" /c ping 0 -n 2 & del "C:\Users\admin\AppData\Local\Temp\RarSFX0\Microsoft.exe"C:\Windows\System32\cmd.exeMicrosoft.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
Total events
5 441
Read events
5 329
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
1
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
3028Facebook Hijacker.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Sys.cmdtext
MD5:B32E330D111894722C3A062454756A2D
SHA256:8A4480946FCCF48DF836B9C02B2A4122C7CC4C18F0AF6BCE643159784DE4AF6F
3028Facebook Hijacker.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Microsoft.exeexecutable
MD5:EC66102014000040E566229D431AA206
SHA256:B7C257AAC74C25F3FC568F579F64155D664F59A3743A5238DF279C35D6435380
3028Facebook Hijacker.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Facebok.exeexecutable
MD5:B2B34266E3C38F89F70B4CAFA817334E
SHA256:2260A3643F899C70B7FB44E1FCFD101AC79EDCA33AA457B9D705A8E367C7825B
3028Facebook Hijacker.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32fix.lnklnk
MD5:C68FAD3DABAD18FB28D752CCA284BDD9
SHA256:0307C045DC12133131582A8B59626287834A4E425345C0D3629EA4BB8196D0B3
3648Facebok.exeC:\Users\admin\AppData\Local\Temp\~DFBCAFE196DE0A3070.TMPbinary
MD5:F56BE3F0CD4824AB2ABB10AC3DAA623E
SHA256:960F07CE5BEFC91E17B2245F41D82DFA8E9178FE0C6B4D3F8CB57702C31FE2EF
1588Microsoft.exeC:\Users\admin\AppData\Local\Temp\tmp84DF.tmp.exeexecutable
MD5:62CBB85434223022A0B0E369B227A3D9
SHA256:EA3087204E3ED644308A0A96BBF319590A9B2701AC850BB63F2BA3DC4955F1FD
1588Microsoft.exeC:\Users\admin\AppData\Local\Temp\tmp7722.tmp.exeexecutable
MD5:19796E0D82A76BE6DAFA5CB7B80E2506
SHA256:65D4C633BF347ED4766DBB6E003776A017CCB632D73C6138C3E880A94C114C2D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1588
Microsoft.exe
3.126.224.214:14065
7.tcp.eu.ngrok.io
AMAZON-02
DE
malicious
1588
Microsoft.exe
172.67.34.170:443
pastebin.com
CLOUDFLARENET
US
malicious

DNS requests

Domain
IP
Reputation
pastebin.com
  • 172.67.34.170
  • 104.20.68.143
  • 104.20.67.143
shared
7.tcp.eu.ngrok.io
  • 3.126.224.214
malicious

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET INFO DNS Query to a *.ngrok domain (ngrok.io)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN njrat ver 0.7d Malware CnC Callback (Remote Desktop)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
1588
Microsoft.exe
A Network Trojan was detected
ET TROJAN njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)
8 ETPRO signatures available at the full report
No debug info