File name:

btc checker@.rar

Full analysis: https://app.any.run/tasks/ad6ecfb7-b233-445c-8741-67b0ffe2d702
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: July 12, 2020, 21:35:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
njrat
bladabindi
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

4AEB0A314EF2A4C50ADEF2711D3B8210

SHA1:

D48D275DACE5347FE6F2A54012D30931C496BE17

SHA256:

AC1E94A0CCB26FDF90A44545C35C529AF5F7B13640FF922D83E701A601AE59E5

SSDEEP:

196608:bYa+x+5L0kXYSeziYcsGtsBux0P04cur97c7bsV54VFys9GNTRTS3jlll:bRakoStYcsWsBuxq04cu4gVU5MMpr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 1.exe (PID: 2680)
      • 1.exe (PID: 2352)
      • WindowsFormsApplication1.exe (PID: 304)
      • Blockchain checker.exe (PID: 2400)
      • Blockchain checker.exe (PID: 2148)
      • svchost.exe (PID: 2764)
      • Blockchain checker.exe (PID: 1676)
      • 1.exe (PID: 1976)
      • 1.exe (PID: 2136)
      • WindowsFormsApplication1.exe (PID: 3032)
      • Blockchain checker.exe (PID: 760)
      • Blockchain checker.exe (PID: 2388)
      • 1.exe (PID: 2424)
      • 1.exe (PID: 3324)
      • WindowsFormsApplication1.exe (PID: 328)
      • Blockchain checker.exe (PID: 2004)
      • Blockchain checker.exe (PID: 1364)
      • 1.exe (PID: 2760)
      • WindowsFormsApplication1.exe (PID: 3128)
      • Blockchain checker.exe (PID: 3436)
    • Writes to a start menu file

      • svchost.exe (PID: 2764)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3568)
    • Changes the autorun value in the registry

      • svchost.exe (PID: 2764)
    • NJRAT was detected

      • svchost.exe (PID: 2764)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 988)
      • 1.exe (PID: 2680)
      • Blockchain checker.exe (PID: 2148)
      • WindowsFormsApplication1.exe (PID: 304)
      • svchost.exe (PID: 2764)
      • Blockchain checker.exe (PID: 1676)
      • 1.exe (PID: 2136)
      • Blockchain checker.exe (PID: 2388)
      • 1.exe (PID: 3324)
      • Blockchain checker.exe (PID: 1364)
      • 1.exe (PID: 2760)
    • Creates files in the user directory

      • 1.exe (PID: 2680)
      • WindowsFormsApplication1.exe (PID: 304)
      • svchost.exe (PID: 2764)
    • Creates executable files which already exist in Windows

      • WindowsFormsApplication1.exe (PID: 304)
    • Starts itself from another location

      • WindowsFormsApplication1.exe (PID: 304)
    • Uses NETSH.EXE for network configuration

      • svchost.exe (PID: 2764)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • 1.exe (PID: 2680)
      • 1.exe (PID: 2136)
      • 1.exe (PID: 3324)
      • 1.exe (PID: 2760)
    • Manual execution by user

      • Blockchain checker.exe (PID: 1676)
      • Blockchain checker.exe (PID: 2388)
      • Blockchain checker.exe (PID: 1364)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
80
Monitored processes
23
Malicious processes
6
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start winrar.exe blockchain checker.exe 1.exe no specs 1.exe windowsformsapplication1.exe blockchain checker.exe #NJRAT svchost.exe netsh.exe no specs searchprotocolhost.exe no specs blockchain checker.exe 1.exe no specs 1.exe windowsformsapplication1.exe no specs blockchain checker.exe blockchain checker.exe 1.exe no specs 1.exe windowsformsapplication1.exe no specs blockchain checker.exe blockchain checker.exe 1.exe windowsformsapplication1.exe no specs blockchain checker.exe

Process information

PID
CMD
Path
Indicators
Parent process
304"C:\Users\admin\AppData\Roaming\WindowsFormsApplication1.exe" C:\Users\admin\AppData\Roaming\WindowsFormsApplication1.exe
1.exe
User:
admin
Integrity Level:
HIGH
Description:
WindowsFormsApplication1
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\windowsformsapplication1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
328"C:\Users\admin\AppData\Roaming\WindowsFormsApplication1.exe" C:\Users\admin\AppData\Roaming\WindowsFormsApplication1.exe1.exe
User:
admin
Integrity Level:
HIGH
Description:
WindowsFormsApplication1
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\windowsformsapplication1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
760"C:\Users\admin\AppData\Roaming\Blockchain checker.exe" C:\Users\admin\AppData\Roaming\Blockchain checker.exe
1.exe
User:
admin
Integrity Level:
HIGH
Description:
BTCdotCom
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\blockchain checker.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
988"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\btc checker@.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1364"C:\Users\admin\Desktop\Blockchain checker.exe" C:\Users\admin\Desktop\Blockchain checker.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\blockchain checker.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1676"C:\Users\admin\Desktop\Blockchain checker.exe" C:\Users\admin\Desktop\Blockchain checker.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\blockchain checker.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1976"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exeBlockchain checker.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\1.exe
c:\systemroot\system32\ntdll.dll
2004"C:\Users\admin\AppData\Roaming\Blockchain checker.exe" C:\Users\admin\AppData\Roaming\Blockchain checker.exe
1.exe
User:
admin
Integrity Level:
HIGH
Description:
BTCdotCom
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\blockchain checker.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2120netsh firewall add allowedprogram "C:\Users\admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLEC:\Windows\system32\netsh.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2136"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exe
Blockchain checker.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
3 898
Read events
3 642
Write events
256
Delete events
0

Modification events

(PID) Process:(988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(988) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(988) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\btc checker@.rar
(PID) Process:(988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(988) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
Executable files
26
Suspicious files
0
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\Alternates.txttext
MD5:
SHA256:
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\btc.txttext
MD5:
SHA256:
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\Leaf.xNet.dllexecutable
MD5:
SHA256:
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\proxy.txttext
MD5:
SHA256:
2148Blockchain checker.exeC:\Users\admin\AppData\Local\Temp\1.exeexecutable
MD5:
SHA256:
26801.exeC:\Users\admin\AppData\Roaming\WindowsFormsApplication1.exeexecutable
MD5:
SHA256:
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\Blockchain checker.exeexecutable
MD5:
SHA256:
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa988.10934\btc checker@\Leaf.xNet.dllexecutable
MD5:
SHA256:
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa988.10934\btc checker@\Blockchain checker.exeexecutable
MD5:
SHA256:
304WindowsFormsApplication1.exeC:\Users\admin\AppData\Roaming\svchost.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
scarerose.servegame.com
unknown

Threats

PID
Process
Class
Message
1044
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.servegame .com
No debug info