File name:

1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe

Full analysis: https://app.any.run/tasks/f114ba2f-9a57-484c-8fbf-e187e093c266
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 24, 2025, 12:32:22
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
remcos
stealer
mpress
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

26045918287E7273F5B55F49250DBAF1

SHA1:

BFFF3BD78B177A9CCA3D2ED6649B50CC3773991D

SHA256:

01463D9240C52196B0DDB9BF21DA937953F625B342DA25F001BD478E8F84EA35

SSDEEP:

12288:uvrhf5oGfWrdQk4Jn6DmPaDNKPww7czUcETWZR4pWVVVVVVVVVVVVVVVVVnd:4oGfaUtPaD9w06WZWp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REMCOS has been detected

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • Steals credentials from Web Browsers

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7736)
    • Actions looks like stealing of personal data

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7744)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7752)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7736)
    • REMCOS has been detected (SURICATA)

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • Connects to the CnC server

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • REMCOS has been detected (YARA)

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • Application launched itself

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • There is functionality for taking screenshot (YARA)

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • Contacting a server suspected of hosting an CnC

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • Connects to unusual port

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
  • INFO

    • Checks supported languages

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7752)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7744)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7736)
    • Checks proxy server information

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
      • slui.exe (PID: 8124)
    • Reads the computer name

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7752)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7744)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7736)
    • Creates files or folders in the user directory

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • Create files in a temporary directory

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7736)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7744)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7752)
    • Reads the machine GUID from the registry

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7752)
      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7736)
    • Creates files in the program directory

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • Mpress packer has been detected

      • 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe (PID: 7636)
    • Reads the software policy settings

      • slui.exe (PID: 8124)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:06 22:46:57+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 352768
InitializedDataSize: 139264
UninitializedDataSize: -
EntryPoint: 0x33d45
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
5
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #REMCOS 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7636"C:\Users\admin\Desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe" C:\Users\admin\Desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7736C:\Users\admin\Desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe /stext "C:\Users\admin\AppData\Local\Temp\gttfnniqlvudieebvfwfitrfxajhbpqwx"C:\Users\admin\Desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7744C:\Users\admin\Desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe /stext "C:\Users\admin\AppData\Local\Temp\rngpff"C:\Users\admin\Desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7752C:\Users\admin\Desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe /stext "C:\Users\admin\AppData\Local\Temp\bpligyemn"C:\Users\admin\Desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8124C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 945
Read events
3 938
Write events
7
Delete events
0

Modification events

(PID) Process:(7636) 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeKey:HKEY_CURRENT_USER\SOFTWARE\oiuytu-9JC965
Operation:writeName:exepath
Value:
95E15585EE419317169C679CC0FE642831D21FC00FCD8F4208301C992F87D430CE1466F945DECC96DC78B93CC4096FF0C0A802F791EC1ED891F0A159F07B28B5AC52BAADBDBD8172AF6D05C1F402968C1E65070D7355CC1CDC3AFCDC8B0B03CF945CB606856984FD91D5491ADBEE6855C6A2454ADC7A506695FA04208593E8AC7F59B436430DB2FF45575A6507E9EBA7F527DF2934575191DF0DC60D11B63C3EBC5E384D9E67138100CA3E3D4CF3E1C229C55EB9EDE7CFCF217D013B2139769B1901E5F3FDBC18026B5DEC6DF37CEE358D7A486E6E97DF9C8295D98FBCC9E69616B0BFF1863297D473AF
(PID) Process:(7636) 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeKey:HKEY_CURRENT_USER\SOFTWARE\oiuytu-9JC965
Operation:writeName:licence
Value:
686503612CB3FE2B9C6DC3B764C86415
(PID) Process:(7636) 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeKey:HKEY_CURRENT_USER\SOFTWARE\oiuytu-9JC965
Operation:writeName:time
Value:
(PID) Process:(7636) 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeKey:HKEY_CURRENT_USER\SOFTWARE\oiuytu-9JC965
Operation:writeName:UID
Value:
691838182
(PID) Process:(7636) 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7636) 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7636) 1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
77361742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeC:\Users\admin\AppData\Local\Temp\bhvCEEA.tmp
MD5:
SHA256:
76361742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\json[1].jsonbinary
MD5:AADDECD9A0D1979E7176D69A97053002
SHA256:08C4A47DBB0B31ECFAB47F1AF79D98F861F0DE00EA4C345C8C12E6A21BDD986D
76361742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeC:\ProgramData\iuytrtyu\logs.datbinary
MD5:1CA8A2FEBEF463B8DABB54C033623EB5
SHA256:FBCC9EDB426CBEDA48C60BC21CF048601A0DBB429973056898050075F15AB62A
77361742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exeC:\Users\admin\AppData\Local\Temp\gttfnniqlvudieebvfwfitrfxajhbpqwxtext
MD5:73AFEF57A57FF8285682E59AEBA8FE4A
SHA256:9081F636845E9A6B7D781F2F35A28B33B7FDF5373075B435C5B373119D0934A3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
24
DNS requests
9
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.16.164.34:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7636
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
GET
200
178.237.33.50:80
http://geoplugin.net/json.gp
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
7636
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
45.144.214.126:4126
frontofficefax20.home-webserver.de
WINDSTREAM
US
malicious
7636
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
178.237.33.50:80
geoplugin.net
Schuberg Philis B.V.
NL
whitelisted
2104
svchost.exe
2.16.164.34:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7360
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8124
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
frontofficefax20.home-webserver.de
  • 45.144.214.126
malicious
geoplugin.net
  • 178.237.33.50
whitelisted
crl.microsoft.com
  • 2.16.164.34
  • 2.16.164.51
  • 2.16.164.40
  • 2.16.164.122
  • 2.16.164.9
  • 2.16.164.24
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
7636
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
Malware Command and Control Activity Detected
ET MALWARE Remcos 3.x Unencrypted Checkin
7636
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
Malware Command and Control Activity Detected
ET MALWARE Remcos 3.x Unencrypted Server Response
7636
1742819286b97c70c522b20a2178a394c8e0949cecbb8e44486b56f37ac5ede59ac633dd31808.dat-decoded.exe
Malware Command and Control Activity Detected
ET MALWARE Remcos 3.x Unencrypted Server Response
No debug info