| File name: | AgentSetup_Megalabs+USA.exe |
| Full analysis: | https://app.any.run/tasks/c23384c9-94f1-4e1b-b81d-d497d897d262 |
| Verdict: | Malicious activity |
| Analysis date: | January 19, 2024, 22:34:13 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 48AEBC66053B2D4DEBAF237FDBBA3B2E |
| SHA1: | B868DC50B4B6D4B5333A68DBDD7E2F86F6984551 |
| SHA256: | 06707E05F18CCE51E5F6672EDEB57B35E938FB710BFCD5BF862BF512A5B63FC0 |
| SSDEEP: | 98304:QA2a6WTv7klWurdCe8O0lENnVMNNFgN25udAL4ZB2u2jv+zj6YbYqOJeDcaB6Q07:p2ZixMj+2TCOQ/0bOgNM |
| .exe | | | InstallShield setup (36.8) |
|---|---|---|
| .exe | | | Win32 Executable MS Visual C++ (generic) (26.6) |
| .exe | | | Win64 Executable (generic) (23.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:04:27 03:27:51+02:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug |
| PEType: | PE32 |
| LinkerVersion: | 2.26 |
| CodeSize: | 35328 |
| InitializedDataSize: | 38912 |
| UninitializedDataSize: | 154112 |
| EntryPoint: | 0x4167 |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Users\admin\Desktop\AgentSetup_Megalabs+USA.exe" | C:\Users\admin\Desktop\AgentSetup_Megalabs+USA.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 532 | "netsh" advfirewall firewall add rule name="RMM RTC Proxy" dir=in action=allow program="C:\ProgramData\CentraStage\AEMAgent\RMM.WebRemote\12.6.0.2409\RMM.RTC.Proxy\RMM.RTC.Proxy.exe" enable=yes | C:\Windows\System32\netsh.exe | — | RMM.WebRemote.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 560 | wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpComputerStatus get /format:list | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: WMI Commandline Utility Exit code: 2147749902 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 632 | "C:\Windows\system32\cmd.exe" /c wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpComputerStatus get /format:list | C:\Windows\System32\cmd.exe | — | AEMAgent.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 2147749902 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 668 | wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpComputerStatus get /format:list | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: WMI Commandline Utility Exit code: 2147749902 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 712 | "netsh" advfirewall firewall add rule name="RMM RTO Proxy" dir=in action=allow program="C:\ProgramData\CentraStage\AEMAgent\RMM.WebRemote\12.6.0.2409\RMM.RTO.Proxy\RMM.RTO.Proxy.exe" enable=yes | C:\Windows\System32\netsh.exe | — | RMM.WebRemote.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 880 | "C:\Windows\system32\cmd.exe" /c wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpComputerStatus get /format:list | C:\Windows\System32\cmd.exe | — | AEMAgent.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 2147749902 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 920 | "netsh" advfirewall firewall delete rule name="RMM WINVNC" | C:\Windows\System32\netsh.exe | — | CagService.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 948 | wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpComputerStatus get /format:list | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: WMI Commandline Utility Exit code: 2147749902 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1016 | "C:\ProgramData\CentraStage\AEMAgent\RMM.WebRemote\12.6.0.2409\RMM.WebRemote.exe" --web-remote-daemon c8b9c6b2-beb8-431b-a326-75084b95665b | C:\ProgramData\CentraStage\AEMAgent\RMM.WebRemote\12.6.0.2409\RMM.WebRemote.exe | AEMAgent.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Description: RMM WebRemote Agent Exit code: 0 Version: 12.6.0.2409 Modules
| |||||||||||||||
| (PID) Process: | (2016) AgentSetup_Megalabs+USA.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager |
| Operation: | write | Name: | PendingFileRenameOperations |
Value: \??\C:\Users\admin\AppData\Local\Temp\nsy3E5.tmp\nsProcess.dll | |||
| (PID) Process: | (1652) CagService.exe | Key: | HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1652) CagService.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1652) CagService.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (1216) Gui.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1216) Gui.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1216) Gui.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1216) Gui.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1216) Gui.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1652) CagService.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\CentraStage |
| Operation: | write | Name: | AgentFolderStatus |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Users\admin\AppData\Local\Temp\nsy3E5.tmp\System.dll | executable | |
MD5:C17103AE9072A06DA581DEC998343FC1 | SHA256:DC58D8AD81CACB0C1ED72E33BFF8F23EA40B5252B5BB55D393A0903E6819AE2F | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\AxInterop.ViewerX.dll | executable | |
MD5:EDC5E696C4AD70F0BE6301F703AB3672 | SHA256:C6E5F17B2BC91202A1C6A9F3F0547CD7F208368B4CFEBB53F234A55F87C5ACD5 | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\CagService.exe | executable | |
MD5:037DFCD0BF0EA59F0CA84754B84CB454 | SHA256:59D0CAC3452893491D0CB3A07C13476FBBAA432A89E13AE8627B1F6E77DD5F71 | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\defaultbrand.zip | compressed | |
MD5:BE0A3C9E7408BDD9A9D9D004CA01ABF2 | SHA256:865CC74F5B77E1DDFFA260084633236186F16139E08B4FB81DB4AAD2442BDC34 | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\FsLexYacc.Runtime.dll | executable | |
MD5:06B971620BDA7960F7D8E43CE69E3BBE | SHA256:B635BA89E9CC8455F252B7E24E5D2838F50AAF75121CA7D070BB7D6CF41A6235 | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\Common.dll | executable | |
MD5:461512677DF70D4F5DD79C5EBC93581B | SHA256:4B0D0DD963320AEE3E7766578C1E7C5A09FC97F37232846316646FE2A204B46D | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\Gui.exe | executable | |
MD5:662EB4BCD2E039CC9D5F31AF268CFB01 | SHA256:9AAB6B35F26B77F4205868A6D1D1CAC62B7C19E36F8B01AD445AE656AEC8EDC8 | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\CagService.exe.config | xml | |
MD5:ADBF1381C4BD54BD681A095A95E0D8CE | SHA256:FBEEAF6E9FB96D33E74B8631BCE0FC88352DE5D241611E13A349F6F89D2E2730 | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\Core.XmlSerializers.dll | executable | |
MD5:A63585435C0939CD87A2CC30BE7DD987 | SHA256:E04D2FDB0FCF243E47DA40C9DA55F925C9A46DD176A6F935244AF076126F5E09 | |||
| 2016 | AgentSetup_Megalabs+USA.exe | C:\Program Files\CentraStage\Core.dll | executable | |
MD5:B64DCC032A34B5E1AB117E4DD8567794 | SHA256:C482D745198D0B28479F863CE8FC84A33C0069BE05AE39238AF041A8358C1C04 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
488 | lsass.exe | GET | 304 | 23.32.238.192:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fa455765e490287c | unknown | — | — | unknown |
488 | lsass.exe | GET | 200 | 18.245.39.64:80 | http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D | unknown | binary | 1.49 Kb | unknown |
488 | lsass.exe | GET | 200 | 108.138.2.107:80 | http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D | unknown | binary | 2.02 Kb | unknown |
488 | lsass.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAz1vQYrVgL0erhQLCPM8GY%3D | unknown | binary | 471 b | unknown |
488 | lsass.exe | GET | 200 | 13.32.26.76:80 | http://ocsp.r2m01.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBShdVEFnSEQ0gG5CBtzM48cPMe9XwQUgbgOY4qJEhjl%2Bjs7UJWf5uWQE4UCEAzJ2HMRXZ9fh2bdFC4AxME%3D | unknown | binary | 471 b | unknown |
488 | lsass.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSnxLiz3Fu1WB6n1%2FE6xWn1b0jXiQQUdIWAwGbH3zfez70pN6oDHb7tzRcCEAE79EFCzkbsC5kkahtMoSM%3D | unknown | binary | 471 b | unknown |
488 | lsass.exe | GET | 200 | 18.245.39.64:80 | http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEjgLnWaIozse2b%2BczaaODg8%3D | unknown | binary | 1.37 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1652 | CagService.exe | 34.232.189.146:443 | vidalcc.centrastage.net | AMAZON-AES | US | unknown |
1652 | CagService.exe | 13.32.99.103:443 | update-vidal.centrastage.net | AMAZON-02 | US | unknown |
1652 | CagService.exe | 99.83.220.89:443 | vidal-agent.centrastage.net | AMAZON-02 | US | unknown |
1652 | CagService.exe | 68.232.34.200:443 | download.visualstudio.microsoft.com | EDGECAST | US | whitelisted |
3012 | AEMAgent.exe | 13.32.99.78:443 | update-vidal.centrastage.net | AMAZON-02 | US | unknown |
3012 | AEMAgent.exe | 100.24.149.210:443 | features.vidal.rmm.datto.com | AMAZON-AES | US | unknown |
3012 | AEMAgent.exe | 3.33.190.122:443 | agent-gateway.vidal.rmm.datto.com | AMAZON-02 | US | unknown |
Domain | IP | Reputation |
|---|---|---|
vidalcc.centrastage.net |
| unknown |
update-vidal.centrastage.net |
| unknown |
vidal-agent.centrastage.net |
| unknown |
download.visualstudio.microsoft.com |
| whitelisted |
features.vidal.rmm.datto.com |
| unknown |
agent-gateway.vidal.rmm.datto.com |
| unknown |
vidal-agent-notifications.centrastage.net |
| unknown |
vidal-agent-comms.centrastage.net |
| unknown |
vidal-monitoring.centrastage.net |
| unknown |
webrtc.rmm.datto.com |
| unknown |
Process | Message |
|---|---|
AEMAgent.exe | Profiler was prevented from loading notification profiler due to app settings.
Process ID (decimal): 2316. Message ID: [0x2509].
|
AEMAgent.exe | Profiler was prevented from loading notification profiler due to app settings.
Process ID (decimal): 3012. Message ID: [0x2509].
|
RMM.WebRemote.exe | Profiler was prevented from loading notification profiler due to app settings.
Process ID (decimal): 1016. Message ID: [0x2509].
|