File name:

X1 Emv chip writer V5.rar

Full analysis: https://app.any.run/tasks/476781ab-6503-4952-99c4-bc9b5211ca87
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: November 12, 2019, 07:39:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
njrat
bladabindi
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

6B536D3369F91BC7081D1339C1615F75

SHA1:

59644D1313ACF61E3F1BBBD5698E5E51938F966E

SHA256:

DCBFB408DC6A69CC5F18D0602275FE4F86C5675232BAF7736507870FA0BC9496

SSDEEP:

98304:PaAb3KAkRezbYnAnMd8a/ofNoRIFIDaHhBNf4PorRVX:PNb6LozbQz8a/o1oOCDuhBNf4PKRVX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3440)
    • Application was dropped or rewritten from another process

      • X1.exe (PID: 3576)
      • X1.exe (PID: 3908)
      • X1.exe (PID: 1932)
      • win7system.exe (PID: 1328)
      • SynTPHelper.exe (PID: 1704)
      • temp.exe (PID: 3300)
      • SynTPHelper.exe (PID: 2820)
      • win7system.exe (PID: 996)
      • ntsvc32.exe (PID: 3944)
      • ntsvc32.exe (PID: 1188)
    • Changes the autorun value in the registry

      • ntsvc32.exe (PID: 1188)
      • SynTPHelper.exe (PID: 2820)
    • NJRAT was detected

      • SynTPHelper.exe (PID: 2820)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2660)
      • X1.exe (PID: 1932)
      • X1.exe (PID: 3576)
      • SynTPHelper.exe (PID: 1704)
      • win7system.exe (PID: 996)
    • Creates files in the user directory

      • X1.exe (PID: 1932)
      • win7system.exe (PID: 996)
      • ntsvc32.exe (PID: 1188)
    • Creates files in the Windows directory

      • SynTPHelper.exe (PID: 1704)
    • Starts itself from another location

      • SynTPHelper.exe (PID: 1704)
      • win7system.exe (PID: 996)
    • Application launched itself

      • win7system.exe (PID: 1328)
      • ntsvc32.exe (PID: 3944)
    • Uses NETSH.EXE for network configuration

      • SynTPHelper.exe (PID: 2820)
  • INFO

    • Manual execution by user

      • X1.exe (PID: 3576)
      • X1.exe (PID: 3908)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 4842
UncompressedSize: 11264
OperatingSystem: Win32
ModifyDate: 2016:07:28 17:06:13
PackingMethod: Normal
ArchivedFileName: X1 Emv chip writer V5\X1v5\Bin.db
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
13
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start winrar.exe searchprotocolhost.exe no specs x1.exe no specs x1.exe x1.exe syntphelper.exe win7system.exe no specs temp.exe no specs #NJRAT syntphelper.exe win7system.exe ntsvc32.exe no specs netsh.exe no specs ntsvc32.exe

Process information

PID
CMD
Path
Indicators
Parent process
996"C:\Users\admin\AppData\Roaming\win7system.exe"C:\Users\admin\AppData\Roaming\win7system.exe
win7system.exe
User:
admin
Company:
ersanLander
Integrity Level:
HIGH
Description:
5.0
Exit code:
0
Version:
5.0
Modules
Images
c:\users\admin\appdata\roaming\win7system.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
1188"C:\Users\admin\AppData\Roaming\mscftmon\ntsvc32.exe"C:\Users\admin\AppData\Roaming\mscftmon\ntsvc32.exe
ntsvc32.exe
User:
admin
Company:
ersanLander
Integrity Level:
HIGH
Description:
5.0
Exit code:
0
Version:
5.0
Modules
Images
c:\users\admin\appdata\roaming\mscftmon\ntsvc32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
1328C:\Users\admin\AppData\Roaming/win7system.exeC:\Users\admin\AppData\Roaming\win7system.exeX1.exe
User:
admin
Company:
ersanLander
Integrity Level:
HIGH
Description:
5.0
Exit code:
0
Version:
5.0
Modules
Images
c:\users\admin\appdata\roaming\win7system.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
1704"C:\Users\admin\AppData\Local\Temp\SynTPHelper.exe" C:\Users\admin\AppData\Local\Temp\SynTPHelper.exe
X1.exe
User:
admin
Company:
Microsoft Inc
Integrity Level:
HIGH
Description:
SynTPHelper
Exit code:
0
Version:
6.10.01.01
Modules
Images
c:\users\admin\appdata\local\temp\syntphelper.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
1932"C:\Users\admin\AppData\Local\Temp\X1.exe" C:\Users\admin\AppData\Local\Temp\X1.exe
X1.exe
User:
admin
Company:
aZoolander
Integrity Level:
HIGH
Description:
<X1>
Exit code:
0
Version:
5.0
Modules
Images
c:\users\admin\appdata\local\temp\x1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2660"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\X1 Emv chip writer V5.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2820"C:\Windows\SynTPHelper.exe" C:\Windows\SynTPHelper.exe
SynTPHelper.exe
User:
admin
Company:
Microsoft Inc
Integrity Level:
HIGH
Description:
SynTPHelper
Exit code:
0
Version:
6.10.01.01
Modules
Images
c:\windows\syntphelper.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3060netsh firewall add allowedprogram "C:\Windows\SynTPHelper.exe" "SynTPHelper.exe" ENABLEC:\Windows\system32\netsh.exeSynTPHelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
3300C:\Users\admin\AppData\Local\Temp/temp.exeC:\Users\admin\AppData\Local\Temp\temp.exeX1.exe
User:
admin
Company:
<O Zoolander>
Integrity Level:
HIGH
Description:
<X1>
Exit code:
0
Version:
4.1.0.1
Modules
Images
c:\users\admin\appdata\local\temp\temp.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
3440"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 374
Read events
1 223
Write events
151
Delete events
0

Modification events

(PID) Process:(2660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2660) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\X1 Emv chip writer V5.rar
(PID) Process:(2660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2660) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(3440) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
11
Suspicious files
4
Text files
1
Unknown types
3

Dropped files

PID
Process
Filename
Type
2660WinRAR.exeC:\Users\admin\Desktop\X1 Emv chip writer V5\X1v5\X1.pdb
MD5:
SHA256:
1932X1.exeC:\Users\admin\AppData\Local\Temp\autF816.tmp
MD5:
SHA256:
1932X1.exeC:\Users\admin\AppData\Local\Temp\autF875.tmp
MD5:
SHA256:
2660WinRAR.exeC:\Users\admin\Desktop\X1 Emv chip writer V5\X1v5\Bin.dbsqlite
MD5:
SHA256:
2660WinRAR.exeC:\Users\admin\Desktop\X1 Emv chip writer V5\X1v5\X1.exeexecutable
MD5:
SHA256:
2660WinRAR.exeC:\Users\admin\Desktop\X1 Emv chip writer V5\X1v5\cardtemp.datbinary
MD5:
SHA256:
2660WinRAR.exeC:\Users\admin\Desktop\X1 Emv chip writer V5\X1v5\KEY.txttext
MD5:
SHA256:
2660WinRAR.exeC:\Users\admin\Desktop\X1 Emv chip writer V5\X1v5\X1.expexp
MD5:9658F4486DF81E316B74ED4FD729AA44
SHA256:13A2DEEDC0FC750D4221332747DAD7ACB00EA0F02AD4C0361473FB3D82043BDE
2660WinRAR.exeC:\Users\admin\Desktop\X1 Emv chip writer V5\X1v5\GPPcScConnectionPlugin.dllexecutable
MD5:D65463FC8A37261B6BF5AFBC4139BDD5
SHA256:789734BBAB7B606E27FAB43F4706250399108DBA98E4428D1B95589DB0A42EA2
1188ntsvc32.exeC:\Users\admin\AppData\Roaming\mscftmon\.Identifierbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
2
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2820
SynTPHelper.exe
91.109.178.4:1991
ccdollar.linkpc.net
Lost Oasis SARL
NL
malicious
125.163.67.97:3361
local.cable-modem.org
PT Telekomunikasi Indonesia
ID
unknown

DNS requests

Domain
IP
Reputation
ccdollar.linkpc.net
  • 91.109.178.4
malicious
local.cable-modem.org
  • 125.163.67.97
malicious

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.cable-modem .org
1 ETPRO signatures available at the full report
No debug info