| File name: | Сборка 10.1 виндовс.exe |
| Full analysis: | https://app.any.run/tasks/e0b707bf-e2f0-4689-8080-8de25d0cd124 |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | December 27, 2020, 18:41:36 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | AC469948B7FC719169A64434AC147C84 |
| SHA1: | 2117C9A3F2E6FFD12C60C00032D2B91780BA23D2 |
| SHA256: | 984DD849E6495D8F4C8A7157014E3EA1EC69EA95622591E40DCB944897721598 |
| SSDEEP: | 768:vY318AEX74tXUIM5YT8/GED60m9ZX7JVXQtSNOXxrjEtCdnl2pi1Rz4Rk3EsGdpV:g8Ao4dT8eOvm/YtFjEwzGi1dD8DlgS |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (56.7) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (21.3) |
| .scr | | | Windows screen saver (10.1) |
| .dll | | | Win32 Dynamic Link Library (generic) (5) |
| .exe | | | Win32 Executable (generic) (3.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:12:27 19:23:08+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 94208 |
| InitializedDataSize: | 512 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x18efe |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 27-Dec-2020 18:23:08 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000080 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 2 |
| Time date stamp: | 27-Dec-2020 18:23:08 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00002000 | 0x00016F04 | 0x00017000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.59288 |
.reloc | 0x0001A000 | 0x0000000C | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.0815394 |
mscoree.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 184 | "C:\Users\admin\AppData\Local\Temp\tmp6432.tmp.exe" | C:\Users\admin\AppData\Local\Temp\tmp6432.tmp.exe | — | Сборка 10.1 виндовс.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 348 | "C:\Users\admin\AppData\Local\Temp\tmp6432.tmp.exe" -sfxelevation | C:\Users\admin\AppData\Local\Temp\tmp6432.tmp.exe | tmp6432.tmp.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 444 | tskill /A mghtml* | C:\Windows\system32\tskill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Remote Desktop Services End Process Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 776 | tskill /A avas** | C:\Windows\system32\tskill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Remote Desktop Services End Process Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 788 | tskill /A guar** | C:\Windows\system32\tskill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Remote Desktop Services End Process Utility Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 824 | SCHTASKS.exe /Change /TN "Microsoft\Windows Defender\MP Scheduled Scan" /Disable | C:\Windows\system32\schtasks.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 828 | timeout /t 15 | C:\Windows\system32\timeout.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: timeout - pauses command processing Exit code: 3221225786 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 848 | powershell -NoLogo -NoProfile -Command "Write-Host ' 1 - To disable Windows Defender.' -ForegroundColor Yellow;Write-Host ' 2 - To turn Windows Defender back on.' -ForegroundColor Green;Write-Host ' 3 - To permanently remove Windows Defender.' -ForegroundColor Red" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1196 | Reg.exe delete "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f | C:\Windows\system32\reg.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1396 | "C:\Users\admin\AppData\Local\Temp\WDD\RunAsTI_x86.exe" "C:\Users\admin\AppData\Local\Temp\WDD\WDDisable.cmd" | C:\Users\admin\AppData\Local\Temp\WDD\RunAsTI_x86.exe | — | cmd.exe | |||||||||||
User: admin Company: Nikzzzz Soft Integrity Level: HIGH Description: Run As TrustedInstaller Exit code: 0 Version: 2020,4,7,1 Modules
| |||||||||||||||
| (PID) Process: | (2568) Сборка 10.1 виндовс.exe | Key: | HKEY_CURRENT_USER\Environment |
| Operation: | write | Name: | SEE_MASK_NOZONECHECKS |
Value: 1 | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-100 |
Value: DHCP Quarantine Enforcement Client | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-101 |
Value: Provides DHCP based enforcement for NAP | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-103 |
Value: 1.0 | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-102 |
Value: Microsoft Corporation | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-1 |
Value: IPsec Relying Party | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-2 |
Value: Provides IPsec based enforcement for Network Access Protection | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-4 |
Value: 1.0 | |||
| (PID) Process: | (4068) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-3 |
Value: Microsoft Corporation | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2308 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CWXRD1E6TZ3O09AO9L6J.temp | — | |
MD5:— | SHA256:— | |||
| 848 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KJU0KFHATQ7W56GW9U17.temp | — | |
MD5:— | SHA256:— | |||
| 2568 | Сборка 10.1 виндовс.exe | C:\Users\admin\AppData\Local\Temp\tmp6432.tmp.exe | executable | |
MD5:— | SHA256:— | |||
| 2568 | Сборка 10.1 виндовс.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f7a65db575b95f6f86bf37d2fe8b7a1dWindows Update.exe | executable | |
MD5:— | SHA256:— | |||
| 2568 | Сборка 10.1 виндовс.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe | executable | |
MD5:— | SHA256:— | |||
| 348 | tmp6432.tmp.exe | C:\Users\admin\AppData\Local\Temp\WDD\defender.preset | text | |
MD5:— | SHA256:— | |||
| 348 | tmp6432.tmp.exe | C:\Users\admin\AppData\Local\Temp\WDD\WDEnable.cmd | text | |
MD5:— | SHA256:— | |||
| 348 | tmp6432.tmp.exe | C:\Users\admin\AppData\Local\Temp\WDD\defender.psm1 | text | |
MD5:— | SHA256:— | |||
| 348 | tmp6432.tmp.exe | C:\Users\admin\AppData\Local\Temp\WDD\WDDisable.cmd | text | |
MD5:— | SHA256:— | |||
| 348 | tmp6432.tmp.exe | C:\Users\admin\AppData\Local\Temp\WDD\WDKiller.cmd | text | |
MD5:— | SHA256:— | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2568 | Сборка 10.1 виндовс.exe | 3.22.53.161:12266 | 2.tcp.ngrok.io | — | US | malicious |
Domain | IP | Reputation |
|---|---|---|
2.tcp.ngrok.io |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1044 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a *.ngrok domain (ngrok.io) |
2568 | Сборка 10.1 виндовс.exe | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |
2568 | Сборка 10.1 виндовс.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT/Bladabindi |
2568 | Сборка 10.1 виндовс.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |