download: | IMG-872364%20NOTIFCACION%20CITACION%20POR%20FALSIFICACION%20DE%20DOCUMENTO.uu |
Full analysis: | https://app.any.run/tasks/18c2e642-e1d9-4d22-b25c-844973316cac |
Verdict: | Malicious activity |
Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
Analysis date: | January 17, 2020, 17:11:16 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-rar |
File info: | RAR archive data, v4, os: Win32 |
MD5: | E8BECCA6AEF4C1545FA181258FD8157C |
SHA1: | F00A88B58959C28E52571AE152013320A7BF50D4 |
SHA256: | 9E3BF48D2D51EC7A9E3B4AABA8866013B2DC5CCA85D1E9F805650E17EA728E4C |
SSDEEP: | 3072:Lr4yQ/RMby5Isyd+8Sbz5D3viocRCFe2V44IfPGhEZ:Lr4yQ/iV5P8z5zIyZdIH4EZ |
.rar | | | RAR compressed archive (v-4.x) (58.3) |
---|---|---|
.rar | | | RAR compressed archive (gen) (41.6) |
ArchivedFileName: | IMG-872364 NOTIFCACION DE CITACION POR FALSIFICACION DE DOCUMENTO.exe |
---|---|
PackingMethod: | Normal |
ModifyDate: | 2020:01:17 08:22:19 |
OperatingSystem: | Win32 |
UncompressedSize: | 146805 |
CompressedSize: | 109155 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2104 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\2ac612a5-264f-4f34-942d-6b3aeb3a6980.rar" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
2836 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa2104.11192\IMG-872364 NOTIFCACION DE CITACION POR FALSIFICACION DE DOCUMENTO.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa2104.11192\IMG-872364 NOTIFCACION DE CITACION POR FALSIFICACION DE DOCUMENTO.exe | WinRAR.exe | |
User: admin Company: Nota Inc. Integrity Level: MEDIUM Description: GyazoReplay Version: 4.1.0.0 | ||||
2884 | C:\Users\admin\Pictures\GWUgdpESktgsgwntma5.exe dontreversemekid | C:\Users\admin\Pictures\GWUgdpESktgsgwntma5.exe | IMG-872364 NOTIFCACION DE CITACION POR FALSIFICACION DE DOCUMENTO.exe | |
User: admin Integrity Level: MEDIUM | ||||
584 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\221uyvop.cmdline" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | — | GWUgdpESktgsgwntma5.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 | ||||
504 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESE6D0.tmp" "c:\Users\admin\AppData\Local\Temp\CSC9D171738DD0E4758816E9F386E9D95C9.TMP" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | — | csc.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 12.00.52519.0 built by: VSWINSERVICING | ||||
2144 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\hdzjeicf.cmdline" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | — | GWUgdpESktgsgwntma5.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 | ||||
520 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESE7CA.tmp" "c:\Users\admin\AppData\Local\Temp\CSC6348BA366CA545938181511167D5C554.TMP" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | — | csc.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 12.00.52519.0 built by: VSWINSERVICING | ||||
2420 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | GWUgdpESktgsgwntma5.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Version: 4.7.3062.0 built by: NET472REL1 | ||||
2608 | "C:\Users\admin\Pictures\GWUgdpESktgsgwntma5.exe" | C:\Users\admin\Pictures\GWUgdpESktgsgwntma5.exe | GWUgdpESktgsgwntma5.exe | |
User: admin Integrity Level: MEDIUM | ||||
3920 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\wzmejyl1.cmdline" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | — | GWUgdpESktgsgwntma5.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2884 | GWUgdpESktgsgwntma5.exe | C:\Users\admin\AppData\Local\Temp\221uyvop.0.cs | — | |
MD5:— | SHA256:— | |||
2884 | GWUgdpESktgsgwntma5.exe | C:\Users\admin\AppData\Local\Temp\221uyvop.cmdline | — | |
MD5:— | SHA256:— | |||
584 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSC9D171738DD0E4758816E9F386E9D95C9.TMP | — | |
MD5:— | SHA256:— | |||
504 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RESE6D0.tmp | — | |
MD5:— | SHA256:— | |||
584 | csc.exe | C:\Users\admin\AppData\Local\Temp\221uyvop.dll | — | |
MD5:— | SHA256:— | |||
584 | csc.exe | C:\Users\admin\AppData\Local\Temp\221uyvop.out | — | |
MD5:— | SHA256:— | |||
2144 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSC6348BA366CA545938181511167D5C554.TMP | — | |
MD5:— | SHA256:— | |||
2144 | csc.exe | C:\Users\admin\AppData\Local\Temp\hdzjeicf.dll | — | |
MD5:— | SHA256:— | |||
520 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RESE7CA.tmp | — | |
MD5:— | SHA256:— | |||
2144 | csc.exe | C:\Users\admin\AppData\Local\Temp\hdzjeicf.out | — | |
MD5:— | SHA256:— |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2420 | RegAsm.exe | 181.52.109.69:1800 | zdfhsfj.duckdns.org | Telmex Colombia S.A. | CO | malicious |
Domain | IP | Reputation |
---|---|---|
zdfhsfj.duckdns.org |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
2420 | RegAsm.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |