File name:

0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879

Full analysis: https://app.any.run/tasks/15868bd8-8cc8-42b8-8c1e-ba6891e9aaac
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: January 11, 2025, 00:22:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
remcos
upx
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

B596EDF7EBFB3A944A94685A207677BD

SHA1:

E6776DF73C784FEC5DE9C79BCE860081D2915ED2

SHA256:

0D9239013E7F6FAB8AAB618CE46B5225D0283DA9F81D937CAE7A3988A127F879

SSDEEP:

49152:zPP9zj8qACXQgCy6AMGibKza52WbN4pB0P7dP8wdpSPh4zqmCqSfwKDa8yam3VhG:j8Cgzkib1obp+hPWh4VCZ4KfHm3XLh6R

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • Graff.exe (PID: 6760)
    • REMCOS has been detected

      • Graff.exe (PID: 6996)
      • Graff.exe (PID: 6996)
    • REMCOS mutex has been found

      • Graff.exe (PID: 6996)
    • REMCOS has been detected (YARA)

      • Graff.exe (PID: 6996)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe (PID: 6552)
    • Starts itself from another location

      • 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe (PID: 6552)
    • Application launched itself

      • Graff.exe (PID: 6760)
    • There is functionality for taking screenshot (YARA)

      • Graff.exe (PID: 6996)
    • Connects to unusual port

      • Graff.exe (PID: 6996)
  • INFO

    • Reads mouse settings

      • 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe (PID: 6552)
      • Graff.exe (PID: 6760)
      • Graff.exe (PID: 6996)
    • Creates files or folders in the user directory

      • Graff.exe (PID: 6760)
      • 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe (PID: 6552)
    • Reads the machine GUID from the registry

      • 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe (PID: 6552)
    • Checks supported languages

      • Graff.exe (PID: 6760)
      • 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe (PID: 6552)
      • Graff.exe (PID: 6996)
    • Create files in a temporary directory

      • Graff.exe (PID: 6760)
      • 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe (PID: 6552)
      • Graff.exe (PID: 6996)
    • The sample compiled with english language support

      • 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe (PID: 6552)
    • Reads the computer name

      • Graff.exe (PID: 6996)
    • Creates files in the program directory

      • Graff.exe (PID: 6996)
    • UPX packer has been detected

      • Graff.exe (PID: 6996)
    • The process uses AutoIt

      • Graff.exe (PID: 6996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (43.5)
.exe | Win32 EXE Yoda's Crypter (42.7)
.exe | Win32 Executable (generic) (7.2)
.exe | Generic Win/DOS Executable (3.2)
.exe | DOS Executable Generic (3.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:17 06:19:43+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 380928
InitializedDataSize: 581632
UninitializedDataSize: 1134592
EntryPoint: 0x172750
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe graff.exe #REMCOS graff.exe

Process information

PID
CMD
Path
Indicators
Parent process
6552"C:\Users\admin\AppData\Local\Temp\0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe" C:\Users\admin\AppData\Local\Temp\0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6760"C:\Users\admin\AppData\Local\Temp\0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe" C:\Users\admin\AppData\Local\misruling\Graff.exe
0d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\misruling\graff.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6996"C:\Users\admin\AppData\Local\misruling\Graff.exe"C:\Users\admin\AppData\Local\misruling\Graff.exe
Graff.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\misruling\graff.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
274
Read events
271
Write events
3
Delete events
0

Modification events

(PID) Process:(6996) Graff.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-MKYDDH
Operation:writeName:exepath
Value:
9B8A190947C78ED6C3D9B7D534B61B849B5787C895EAFE59FDA049BD589C3F6E37AA0FC9E40CA53EFF33DE7F861481C73D6F20D87ACF5CA3A62C6CA9B37A902CF472F41A7CDA76CE20A63054044A8D5CDA79E0A66916F22478EE0FCBD0C030EC5FF8
(PID) Process:(6996) Graff.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-MKYDDH
Operation:writeName:licence
Value:
0EB06E9879E22DB55E5768653EA77A5C
(PID) Process:(6996) Graff.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-MKYDDH
Operation:writeName:time
Value:
Executable files
1
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
65520d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exeC:\Users\admin\AppData\Local\Temp\aut55D4.tmpbinary
MD5:3C6EE36CB897BA9651CAA319D175C099
SHA256:ADAD26344BAE088FD07486C0E39DCEFA09C3EE980E3D209C40B48C6B030D836F
6996Graff.exeC:\Users\admin\AppData\Local\Temp\aut6312.tmpbinary
MD5:3C6EE36CB897BA9651CAA319D175C099
SHA256:ADAD26344BAE088FD07486C0E39DCEFA09C3EE980E3D209C40B48C6B030D836F
6760Graff.exeC:\Users\admin\AppData\Local\Temp\aut5CB9.tmpbinary
MD5:3C6EE36CB897BA9651CAA319D175C099
SHA256:ADAD26344BAE088FD07486C0E39DCEFA09C3EE980E3D209C40B48C6B030D836F
65520d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exeC:\Users\admin\AppData\Local\Temp\dewsbinary
MD5:DC5A9959D2CEA2EE2BCA9F5C0C114CAB
SHA256:5787DF4931839F750020EE47850BFED8F345212A3AD1722F9BFD5FBD04FE1D81
6760Graff.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Graff.vbsbinary
MD5:606C5E680A3849AF045F41F6B150B92C
SHA256:E29771EC2A6058BC9FD7EED2B7CB874FBDFEA743B8C342BF96831B5415A3E21A
65520d9239013e7f6fab8aab618ce46b5225d0283da9f81d937cae7a3988a127f879.exeC:\Users\admin\AppData\Local\misruling\Graff.exeexecutable
MD5:B596EDF7EBFB3A944A94685A207677BD
SHA256:0D9239013E7F6FAB8AAB618CE46B5225D0283DA9F81D937CAE7A3988A127F879
6996Graff.exeC:\ProgramData\remcos\logs.datbinary
MD5:9C4B4EE399E6A4B76E9CC3568E19BDA7
SHA256:A40038CF2145C3145D1E8C2D43A574DF096BA7E47B4679A6B291A0D46D64CBB4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
191
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6656
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6580
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6580
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2736
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2736
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2736
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2736
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
1176
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.68
  • 20.190.160.22
  • 40.126.32.134
  • 40.126.32.72
  • 40.126.32.133
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 2.23.242.9
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted

Threats

No threats detected
No debug info