analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

Heart-Sender-V1.2_1.zip

Full analysis: https://app.any.run/tasks/7cf49cf8-e808-441d-ae04-a60913a5a4da
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: February 22, 2020, 02:30:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
njrat
bladabindi
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

483F2CA873DEA94669CE1707335D84EE

SHA1:

4D8C52F9C4C0C5F30795994D292A48D2B58B635D

SHA256:

E1AC482B2273160DB19FA01F800F1358B49C22998B829E87B1F460EB5B86B543

SSDEEP:

12288:/KkGX3wLOhAi8csBbucu5laA+ehdXSfNDtZbxuKOs2GkI93FEZx:/5GX3wA6cebgyA+e7XSFlu5sddS7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Heart-Sender-V1.2.exe (PID: 1544)
      • Windows Network.exe (PID: 3392)
      • setup.exe (PID: 3604)
      • Windows Network.exe (PID: 580)
      • Heart-Sender-V1.2.exe (PID: 2956)
      • setup.exe (PID: 2248)
    • NJRAT was detected

      • Windows Network.exe (PID: 3392)
    • Writes to a start menu file

      • Windows Network.exe (PID: 580)
    • Connects to CnC server

      • Windows Network.exe (PID: 3392)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2952)
      • setup.exe (PID: 2248)
    • Creates files in the user directory

      • Windows Network.exe (PID: 3392)
      • Windows Network.exe (PID: 580)
      • setup.exe (PID: 2248)
    • Starts itself from another location

      • setup.exe (PID: 2248)
    • Application launched itself

      • Windows Network.exe (PID: 580)
    • Connects to unusual port

      • Windows Network.exe (PID: 3392)
    • Uses NETSH.EXE for network configuration

      • Windows Network.exe (PID: 3392)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: logs/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2020:02:20 13:17:15
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start drop and start winrar.exe heart-sender-v1.2.exe no specs setup.exe no specs setup.exe windows network.exe #NJRAT windows network.exe netsh.exe no specs heart-sender-v1.2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2952"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Heart-Sender-V1.2_1.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1544"C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.18633\Heart-Sender-V1.2.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.18633\Heart-Sender-V1.2.exeWinRAR.exe
User:
admin
Company:
HeartFamily
Integrity Level:
MEDIUM
Description:
Heart Sender V1
Exit code:
0
Version:
1.0.0.0
3604"C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
2248"C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
580"C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe"C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe
setup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
3392"C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe"C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe
Windows Network.exe
User:
admin
Integrity Level:
HIGH
2564netsh firewall add allowedprogram "C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe" "Windows Network.exe" ENABLEC:\Windows\system32\netsh.exeWindows Network.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2956"C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.22972\Heart-Sender-V1.2.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.22972\Heart-Sender-V1.2.exeWinRAR.exe
User:
admin
Company:
HeartFamily
Integrity Level:
MEDIUM
Description:
Heart Sender V1
Version:
1.0.0.0
Total events
613
Read events
536
Write events
0
Delete events
0

Modification events

No data
Executable files
10
Suspicious files
0
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
2248setup.exeC:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe:ZoneIdentifier
MD5:
SHA256:
3392Windows Network.exeC:\Users\admin\AppData\Local\Temp\FransescoPast.txttext
MD5:999B8E36DD8728EFB1C5846A50106F59
SHA256:CF8273FE85EF2985623E89A0DAD31A75527139C89C77D3D4308CC6A8A3698783
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\Settings.initext
MD5:41679E215270290E80D2264E5335AA18
SHA256:A2D5E22F98B7E97D90D7F2BBB0FB514B3951D0FFA9F4E87537BF1BAAFB5311E7
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.18633\setup.exeexecutable
MD5:A323D08293166506A9BA81A953ECD156
SHA256:93A044F25C84FE757C1ED0AD5D7D75AB42BF6BBAC393AE3CCD78649A1183DA89
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.18633\Settings.initext
MD5:41679E215270290E80D2264E5335AA18
SHA256:A2D5E22F98B7E97D90D7F2BBB0FB514B3951D0FFA9F4E87537BF1BAAFB5311E7
2248setup.exeC:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exeexecutable
MD5:A323D08293166506A9BA81A953ECD156
SHA256:93A044F25C84FE757C1ED0AD5D7D75AB42BF6BBAC393AE3CCD78649A1183DA89
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.22972\Settings.initext
MD5:41679E215270290E80D2264E5335AA18
SHA256:A2D5E22F98B7E97D90D7F2BBB0FB514B3951D0FFA9F4E87537BF1BAAFB5311E7
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exeexecutable
MD5:A323D08293166506A9BA81A953ECD156
SHA256:93A044F25C84FE757C1ED0AD5D7D75AB42BF6BBAC393AE3CCD78649A1183DA89
580Windows Network.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Network.vbstext
MD5:63E83CAC146354F1B2660FB3C533B22C
SHA256:E295DFCD2A515D4631A86E132996E0929DAA03EAA6863C798806C5DC1491231F
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.22972\setup.exeexecutable
MD5:A323D08293166506A9BA81A953ECD156
SHA256:93A044F25C84FE757C1ED0AD5D7D75AB42BF6BBAC393AE3CCD78649A1183DA89
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3392
Windows Network.exe
18.188.14.65:13732
0.tcp.ngrok.io
US
shared

DNS requests

Domain
IP
Reputation
0.tcp.ngrok.io
  • 18.188.14.65
shared

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY DNS Query to a *.ngrok domain (ngrok.io)
3392
Windows Network.exe
A Network Trojan was detected
MALWARE [PTsecurity] njRAT/Bladabindi
3392
Windows Network.exe
A Network Trojan was detected
MALWARE [PTsecurity] njRAT.Gen RAT outbound connection
2 ETPRO signatures available at the full report
No debug info