| File name: | njrat arabic lol.zip |
| Full analysis: | https://app.any.run/tasks/d72abc4e-ab66-4676-a38c-a0d195994d15 |
| Verdict: | Malicious activity |
| Threats: | XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails. |
| Analysis date: | July 16, 2024, 11:49:56 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | FB6B93CFADE113C0782EB771FBAB74EA |
| SHA1: | B1D51B2C23EF09AA91FAFCF30C7FC423DF4B00DD |
| SHA256: | DC351A165C3953569C5D8D226EB229F6655511653B57C2C2803587CE753806EF |
| SSDEEP: | 12288:mfbQ52OIvnObpX5rvo9z8+M4uOIE10cV1wES/2vQ/cnUo:mfEwOIvn+pX5rgJ8+MB3Q0saEa2vQ/cd |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2024:07:15 21:35:16 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | njRAT-v0.3.5---Arabic-main/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1356 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\njrat arabic lol.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 Modules
| |||||||||||||||
| 2140 | "C:\Users\admin\Desktop\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\njRAT-Arabic.exe" | C:\Users\admin\Desktop\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\njRAT-Arabic.exe | — | explorer.exe | |||||||||||
User: admin Company: njq8 Integrity Level: MEDIUM Description: njRAT Exit code: 0 Version: 0.3.5.0 Modules
| |||||||||||||||
| 2284 | "C:\Users\admin\Desktop\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\njRAT-Arabic.exe" | C:\Users\admin\Desktop\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\njRAT-Arabic.exe | njRAT-Arabic.exe | ||||||||||||
User: admin Company: njq8 Integrity Level: HIGH Description: njRAT Exit code: 0 Version: 0.3.5.0 Modules
| |||||||||||||||
| 2340 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Local\Temp\njRAT-Arabic.exe' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | njRAT-Arabic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 2464 | "C:\Windows\System32\schtasks.exe" /Create /F /TN "njRAT-Arabic" /SC ONLOGON /TR "C:\Users\admin\AppData\Local\Temp\njRAT-Arabic.exe" /RL HIGHEST | C:\Windows\System32\schtasks.exe | — | njRAT-Arabic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2500 | "C:\Users\admin\AppData\Local\Temp\njRAT-Arabic.exe" | C:\Users\admin\AppData\Local\Temp\njRAT-Arabic.exe | — | njRAT-Arabic.exe | |||||||||||
User: admin Company: njq8 Integrity Level: HIGH Description: njRAT Version: 0.3.5.0 Modules
| |||||||||||||||
| 2508 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\admin\AppData\Local\Temp\sevhost.exe.exe' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | njRAT-Arabic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 2664 | "C:\Windows\System32\schtasks.exe" /Create /F /TN "sevhost.exe" /SC ONLOGON /TR "C:\Users\admin\AppData\Local\Temp\sevhost.exe.exe" /RL HIGHEST | C:\Windows\System32\schtasks.exe | — | njRAT-Arabic.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2700 | "C:\Users\admin\AppData\Local\Temp\sevhost.exe.exe" | C:\Users\admin\AppData\Local\Temp\sevhost.exe.exe | njRAT-Arabic.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Version: 1.0.0.0 Modules
XWorm(PID) Process(2700) sevhost.exe.exe C2147.185.221.16:45115 Keys AES<123456789> Options Splitter<Xwormmm> Sleep time3 USB drop nameUSB.exe MutexeAq9whzQKapdlyuN | |||||||||||||||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\Win7AndW2K8R2-KB3191566-x64.zip | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_3-win64-mingw.zip | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\njrat arabic lol.zip | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1356) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1356 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1356.41538\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\Plugin\sc.dll | executable | |
MD5:DD9DE81A6B3CE967892D4351045362AB | SHA256:A5A0938FACED63D100DB28590A17FFE258893E4E2EAC9F75E15847FA9A2FBE41 | |||
| 1356 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1356.41538\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\Plugin\fm.dll | executable | |
MD5:D79AB7D962F7A4415AB5CDABD7B713DE | SHA256:A8A98D4F79C483364C18A0EEE4E9BD0F8E7C61D5535302BC37E1DEC5B8926C31 | |||
| 1356 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1356.41538\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\Plugin\kl.dll | executable | |
MD5:5E106B219C3FC2008322DF1CEEB2B9C8 | SHA256:357B72E1850D4C87AB0AD9D0FDE2EEF4BFAF571E7E4767A1C861CE2C07A28606 | |||
| 1356 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1356.41538\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\Plugin\proc.dll | executable | |
MD5:96A93B99C77CB368A71E1AE95ED64072 | SHA256:FFA633CAA0E1DC0B5515F01BCB723B13EA9A0AD99DB0BA6EDC8E2907375E5E6F | |||
| 1356 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1356.41538\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\Plugin\pw.dll | executable | |
MD5:008E4E04DD4AF5B9F030FF5A083BE411 | SHA256:99DCD0315A8109931F9A3DD5FC631A113141992196452BEDAFAC91860448338E | |||
| 2340 | powershell.exe | C:\Users\admin\AppData\Local\Temp\05cfbaue.quj.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 1356 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1356.41538\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\Plugin\cam.dll | executable | |
MD5:CDBADC56FF4F49DB676B3EFF525C1112 | SHA256:B3C47607B95311D414F63EE219DC6437A7CE7BF6D96720E1AEEA29F3D39E8E9A | |||
| 1356 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1356.41538\njRAT-v0.3.5---Arabic-main\njRAT v0.3.5 - Arabic\njRAT-Arabic.exe | executable | |
MD5:2ABDBE09E5E13B8ED1DFAC169A56BDAB | SHA256:02BD738AC6451E0C179441B6599D8543ECBA2184DB65ACC226CC0DD8FBB37085 | |||
| 2284 | njRAT-Arabic.exe | C:\Users\admin\AppData\Local\Temp\sevhost.exe.exe | executable | |
MD5:C507D0949003462E673BA243A73724FB | SHA256:E28FA866C0BC1ACA3DD2B2643C998305A6BE8BF136A4BDF310D23F4826D8F228 | |||
| 2700 | sevhost.exe.exe | C:\Users\admin\AppData\Roaming\sevhost.exe.exe | executable | |
MD5:C507D0949003462E673BA243A73724FB | SHA256:E28FA866C0BC1ACA3DD2B2643C998305A6BE8BF136A4BDF310D23F4826D8F228 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
360 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
2700 | sevhost.exe.exe | 147.185.221.16:45115 | — | PLAYIT-GG | US | malicious |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
dns.msftncsi.com |
| whitelisted |