download:

Heart-Sender-V1.2_1.zip

Full analysis: https://app.any.run/tasks/7cf49cf8-e808-441d-ae04-a60913a5a4da
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: February 22, 2020, 02:30:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
njrat
bladabindi
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

483F2CA873DEA94669CE1707335D84EE

SHA1:

4D8C52F9C4C0C5F30795994D292A48D2B58B635D

SHA256:

E1AC482B2273160DB19FA01F800F1358B49C22998B829E87B1F460EB5B86B543

SSDEEP:

12288:/KkGX3wLOhAi8csBbucu5laA+ehdXSfNDtZbxuKOs2GkI93FEZx:/5GX3wA6cebgyA+e7XSFlu5sddS7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Heart-Sender-V1.2.exe (PID: 1544)
      • setup.exe (PID: 3604)
      • setup.exe (PID: 2248)
      • Windows Network.exe (PID: 580)
      • Windows Network.exe (PID: 3392)
      • Heart-Sender-V1.2.exe (PID: 2956)
    • NJRAT was detected

      • Windows Network.exe (PID: 3392)
    • Writes to a start menu file

      • Windows Network.exe (PID: 580)
    • Connects to CnC server

      • Windows Network.exe (PID: 3392)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2952)
      • setup.exe (PID: 2248)
    • Starts itself from another location

      • setup.exe (PID: 2248)
    • Creates files in the user directory

      • setup.exe (PID: 2248)
      • Windows Network.exe (PID: 3392)
      • Windows Network.exe (PID: 580)
    • Application launched itself

      • Windows Network.exe (PID: 580)
    • Uses NETSH.EXE for network configuration

      • Windows Network.exe (PID: 3392)
    • Connects to unusual port

      • Windows Network.exe (PID: 3392)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2020:02:20 13:17:15
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: logs/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start drop and start winrar.exe heart-sender-v1.2.exe no specs setup.exe no specs setup.exe windows network.exe #NJRAT windows network.exe netsh.exe no specs heart-sender-v1.2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
580"C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe"C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe
setup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\windows network\windows network.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1544"C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.18633\Heart-Sender-V1.2.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.18633\Heart-Sender-V1.2.exeWinRAR.exe
User:
admin
Company:
HeartFamily
Integrity Level:
MEDIUM
Description:
Heart Sender V1
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2952.18633\heart-sender-v1.2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2248"C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2952.20303\setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2564netsh firewall add allowedprogram "C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe" "Windows Network.exe" ENABLEC:\Windows\system32\netsh.exeWindows Network.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2952"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Heart-Sender-V1.2_1.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2956"C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.22972\Heart-Sender-V1.2.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.22972\Heart-Sender-V1.2.exeWinRAR.exe
User:
admin
Company:
HeartFamily
Integrity Level:
MEDIUM
Description:
Heart Sender V1
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2952.22972\heart-sender-v1.2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3392"C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe"C:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe
Windows Network.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\windows network\windows network.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shlwapi.dll
3604"C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2952.20303\setup.exe
c:\systemroot\system32\ntdll.dll
Total events
613
Read events
536
Write events
77
Delete events
0

Modification events

(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2952) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Heart-Sender-V1.2_1.zip
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2952) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
10
Suspicious files
0
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
2248setup.exeC:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exe:ZoneIdentifier
MD5:
SHA256:
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\Settings.initext
MD5:
SHA256:
3392Windows Network.exeC:\Users\admin\AppData\Local\Temp\FransescoPast.txttext
MD5:
SHA256:
2248setup.exeC:\Users\admin\AppData\Roaming\Windows Network\Windows Network.exeexecutable
MD5:
SHA256:
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\setup.exeexecutable
MD5:
SHA256:
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.18633\setup.exeexecutable
MD5:
SHA256:
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.18633\Settings.initext
MD5:
SHA256:
3392Windows Network.exeC:\Users\admin\AppData\Roaming\apptext
MD5:D43C5B07C128B116B7BC8FAF7B8EFA9D
SHA256:80AD1CC7B3A784DAD618A445AF0C8CF3EFA903F82A814756F2AAA7B57F45791F
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.22972\Settings.initext
MD5:
SHA256:
2952WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2952.20303\Heart-Sender-V1.2.exeexecutable
MD5:9C7691FF597E9EFD7F796B31ACCB78E8
SHA256:1624AF752C9F85FD117FAFB28FEB42A079F283DC133CDCC5799810072A95A6CB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
5

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3392
Windows Network.exe
18.188.14.65:13732
0.tcp.ngrok.io
US
shared

DNS requests

Domain
IP
Reputation
0.tcp.ngrok.io
  • 18.188.14.65
malicious

Threats

PID
Process
Class
Message
1052
svchost.exe
Potential Corporate Privacy Violation
ET POLICY DNS Query to a *.ngrok domain (ngrok.io)
3392
Windows Network.exe
A Network Trojan was detected
MALWARE [PTsecurity] njRAT/Bladabindi
3392
Windows Network.exe
A Network Trojan was detected
MALWARE [PTsecurity] njRAT.Gen RAT outbound connection
2 ETPRO signatures available at the full report
No debug info