Malicious
Classifications
Keylogger Spyware Backdoor
Threat Names
njRAT njRAT.07dDanger Mal/Generic-S Mal/HTMLGen-A
Dynamic Analysis Report
Created on 2023-02-14T20:55:52+00:00
792ad1aa7d042b3a51290003dd51befe14499c85103f02d75cb4a022e1713160.exe
Windows Exe (x86-32)
Remarks (2/2)
(0x02000008): One or more processes crashed during the analysis. Analysis results may be incomplete.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
| Filters: |
There are no files for this filter
There are no files in this analysis
| File Name | Category | Type | Verdict | Actions |
|---|
| C:\Users\kEecfMwgj\Desktop\792ad1aa7d042b3a51290003dd51befe14499c85103f02d75cb4a022e1713160.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
| Verdict |
Malicious
|
| Names | Mal/Generic-S |
PE Information
»
| Image Base | 0x00400000 |
| Entry Point | 0x00418ECE |
| Size Of Code | 0x00017000 |
| Size Of Initialized Data | 0x00000200 |
| File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
| Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Machine Type | IMAGE_FILE_MACHINE_I386 |
| Compile Timestamp | 2023-02-10 14:31 (UTC+1) |
Sections (2)
»
| Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
|---|---|---|---|---|---|---|
| .text | 0x00402000 | 0x00016ED4 | 0x00017000 | 0x00000200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.6 |
| .reloc | 0x0041A000 | 0x0000000C | 0x00000200 | 0x00017200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
| API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
|---|---|---|---|---|---|
| _CorExeMain | - | 0x00402000 | 0x00018EA4 | 0x000170A4 | 0x00000000 |
Memory Dumps (20)
»
| Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 792ad1aa7d042b3a51290003dd51befe14499c85103f02d75cb4a022e1713160.exe | 1 | 0x01370000 | 0x0138BFFF | Relevant Image |
|
32-bit | - |
|
...
|
| 792ad1aa7d042b3a51290003dd51befe14499c85103f02d75cb4a022e1713160.exe | 1 | 0x01370000 | 0x0138BFFF | Process Termination |
|
32-bit | - |
|
...
|
| server.exe | 2 | 0x00D60000 | 0x00D7BFFF | Relevant Image |
|
32-bit | - |
|
...
|
| server.exe | 2 | 0x00D60000 | 0x00D7BFFF | Final Dump |
|
32-bit | - |
|
...
|
| system.exe | 7 | 0x00080000 | 0x0009BFFF | Relevant Image |
|
32-bit | - |
|
...
|
| bf4b86d937e29b1b51011983fd5145bbwindows update.exe | 6 | 0x00EB0000 | 0x00ECBFFF | Relevant Image |
|
32-bit | - |
|
...
|
| buffer | 6 | 0x00470000 | 0x00479FFF | Reflectively Loaded .NET Assembly |
|
32-bit | - |
|
...
|
| system.exe | 7 | 0x00080000 | 0x0009BFFF | Process Termination |
|
32-bit | - |
|
...
|
| server.exe | 9 | 0x01260000 | 0x0127BFFF | Relevant Image |
|
32-bit | - |
|
...
|
| bf4b86d937e29b1b51011983fd5145bbwindows update.exe | 6 | 0x00EB0000 | 0x00ECBFFF | Process Termination |
|
32-bit | - |
|
...
|
| buffer | 9 | 0x0528B000 | 0x0528FFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| buffer | 9 | 0x055AD000 | 0x055AFFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| buffer | 9 | 0x0520D000 | 0x0520FFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| buffer | 9 | 0x050AE000 | 0x050AFFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| buffer | 9 | 0x04BDD000 | 0x04BDFFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| buffer | 9 | 0x0491B000 | 0x0491FFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| buffer | 9 | 0x047BE000 | 0x047BFFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| buffer | 9 | 0x00349000 | 0x0034FFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| server.exe | 9 | 0x01260000 | 0x0127BFFF | First Network Behavior |
|
32-bit | - |
|
...
|
| server.exe | 9 | 0x01260000 | 0x0127BFFF | Final Dump |
|
32-bit | - |
|
...
|
YARA Matches (1)
»
| Rule Name | Rule Description | Classification | Score | Actions |
|---|---|---|---|---|
| njRAT | njRAT | Backdoor |
5/5
|
...
|
File Reputation Information
»
| Verdict |
Malicious
|
| Names | Mal/Generic-S |
| C:\Users\kEecfMwgj\AppData\Local\Temp\FransescoPast.txt | Dropped File | Text |
Clean
|
...
|
»
| C:\Users\kEecfMwgj\AppData\Roaming\app | Dropped File | Text |
Clean
Known to be clean.
|
...
|
»