Malicious
Classifications
Keylogger Backdoor
Threat Names
njRAT njRAT.07d
Dynamic Analysis Report
Created on 2024-05-15T16:40:36+00:00
7075.exe
Windows Exe (x86-32)
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\7075.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x0040747E |
Size Of Code | 0x00005600 |
Size Of Initialized Data | 0x00000600 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2024-05-15 14:00 (UTC+2) |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x00005484 | 0x00005600 | 0x00000200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.57 |
.rsrc | 0x00408000 | 0x00000240 | 0x00000400 | 0x00005800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.97 |
.reloc | 0x0040A000 | 0x0000000C | 0x00000200 | 0x00005C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x0000744C | 0x0000564C | 0x00000000 |
Memory Dumps (18)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
7075.exe | 1 | 0x00860000 | 0x0086BFFF | Relevant Image | 32-bit | - |
...
|
||
server.exe | 2 | 0x00140000 | 0x0014BFFF | Relevant Image | 32-bit | - |
...
|
||
7075.exe | 1 | 0x00860000 | 0x0086BFFF | Process Termination | 32-bit | - |
...
|
||
server.exe | 2 | 0x00140000 | 0x0014BFFF | Final Dump | 32-bit | - |
...
|
||
buffer | 2 | 0x048D8000 | 0x048DFFFF | First Network Behavior | 32-bit | - |
...
|
||
buffer | 2 | 0x0485A000 | 0x0485FFFF | First Network Behavior | 32-bit | - |
...
|
||
buffer | 2 | 0x045CE000 | 0x045CFFFF | First Network Behavior | 32-bit | - |
...
|
||
buffer | 2 | 0x004F6000 | 0x004FFFFF | First Network Behavior | 32-bit | - |
...
|
||
server.exe | 2 | 0x00140000 | 0x0014BFFF | First Network Behavior | 32-bit | - |
...
|
||
server.exe | 5 | 0x00010000 | 0x0001BFFF | Relevant Image | 32-bit | - |
...
|
||
server.exe | 6 | 0x00470000 | 0x0047BFFF | Relevant Image | 32-bit | - |
...
|
||
server.exe | 6 | 0x00470000 | 0x0047BFFF | Process Termination | 32-bit | - |
...
|
||
buffer | 5 | 0x0528B000 | 0x0528FFFF | First Network Behavior | 32-bit | - |
...
|
||
buffer | 5 | 0x0520A000 | 0x0520FFFF | First Network Behavior | 32-bit | - |
...
|
||
buffer | 5 | 0x0466E000 | 0x0466FFFF | First Network Behavior | 32-bit | - |
...
|
||
buffer | 5 | 0x001A6000 | 0x001AFFFF | First Network Behavior | 32-bit | - |
...
|
||
server.exe | 5 | 0x00010000 | 0x0001BFFF | First Network Behavior | 32-bit | - |
...
|
||
server.exe | 5 | 0x00010000 | 0x0001BFFF | Final Dump | 32-bit | - |
...
|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
njRAT | njRAT | Backdoor |
5/5
|
...
|