download:

/uploads/0e1ed8/in.vbs

Full analysis: https://app.any.run/tasks/7aae7b0f-f8fe-4185-b5cb-3d8e56dfdd87
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 16, 2024, 16:35:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
remote
stealer
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with CRLF line terminators
MD5:

DD54225B541568A683EDEDE7CB988628

SHA1:

430C08997DE6E0843FED90AAD4DFE1257722B6B9

SHA256:

25E2FF66FBFC1D850D167CBE6EAE7E3AFCB3A576AB631026F6A5B79707478C5F

SSDEEP:

24576:+RRURRn5tlxuSylBNxaR0G3wRRqRR1RRORRVRRXRRRjjjTRRjRRmRRzRRXRRoRRz:IjjjX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Gets %appdata% folder path (SCRIPT)

      • wscript.exe (PID: 1592)
    • Creates a new folder (SCRIPT)

      • wscript.exe (PID: 1592)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 1592)
    • Opens a text file (SCRIPT)

      • wscript.exe (PID: 1592)
    • Opens an HTTP connection (SCRIPT)

      • wscript.exe (PID: 1592)
    • Creates internet connection object (SCRIPT)

      • wscript.exe (PID: 1592)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 1592)
      • wscript.exe (PID: 3756)
    • Sends HTTP request (SCRIPT)

      • wscript.exe (PID: 1592)
    • Create files in the Startup directory

      • wscript.exe (PID: 1592)
    • Gets a file object corresponding to the file in a specified path (SCRIPT)

      • wscript.exe (PID: 1592)
    • Accesses environment variables (SCRIPT)

      • wscript.exe (PID: 1592)
    • Unusual connection from system programs

      • wscript.exe (PID: 1592)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4092)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 1264)
    • REMCOS has been detected

      • RegSvcs.exe (PID: 3472)
      • RegSvcs.exe (PID: 2740)
      • RegSvcs.exe (PID: 2740)
    • Drops the executable file immediately after the start

      • powershell.exe (PID: 4092)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 3024)
      • RegSvcs.exe (PID: 2824)
      • RegSvcs.exe (PID: 2740)
      • RegSvcs.exe (PID: 1932)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 1932)
    • Uses NirSoft utilities to collect credentials

      • RegSvcs.exe (PID: 1932)
      • RegSvcs.exe (PID: 3024)
    • REMCOS has been detected (YARA)

      • RegSvcs.exe (PID: 2740)
    • Steals credentials

      • RegSvcs.exe (PID: 1932)
      • RegSvcs.exe (PID: 3024)
  • SUSPICIOUS

    • Accesses current user name via WMI (SCRIPT)

      • wscript.exe (PID: 1592)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • wscript.exe (PID: 1592)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 1592)
      • wscript.exe (PID: 3756)
    • Executes WMI query (SCRIPT)

      • wscript.exe (PID: 1592)
    • Checks whether a specific file exists (SCRIPT)

      • wscript.exe (PID: 1592)
      • wscript.exe (PID: 3756)
    • Reads the Internet Settings

      • wscript.exe (PID: 1592)
      • RegSvcs.exe (PID: 2740)
    • Adds/modifies Windows certificates

      • wscript.exe (PID: 1592)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 1592)
    • Executing commands from ".cmd" file

      • wscript.exe (PID: 1592)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 1592)
    • The process executes Powershell scripts

      • cmd.exe (PID: 1264)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 1264)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 4092)
    • Process drops legitimate windows executable

      • powershell.exe (PID: 4092)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 1592)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1264)
    • Converts a specified value to a byte (POWERSHELL)

      • powershell.exe (PID: 4092)
    • Starts a Microsoft application from unusual location

      • RegSvcs.exe (PID: 2740)
      • RegSvcs.exe (PID: 3472)
      • RegSvcs.exe (PID: 2824)
      • RegSvcs.exe (PID: 1932)
      • RegSvcs.exe (PID: 3024)
    • Reads security settings of Internet Explorer

      • RegSvcs.exe (PID: 2740)
    • Application launched itself

      • RegSvcs.exe (PID: 2740)
    • Connects to unusual port

      • RegSvcs.exe (PID: 2740)
    • Reads browser cookies

      • RegSvcs.exe (PID: 2740)
    • Loads DLL from Mozilla Firefox

      • RegSvcs.exe (PID: 2824)
    • Accesses Microsoft Outlook profiles

      • RegSvcs.exe (PID: 3024)
    • The process executes VB scripts

      • RegSvcs.exe (PID: 2740)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 3756)
  • INFO

    • Checks proxy server information

      • wscript.exe (PID: 1592)
      • RegSvcs.exe (PID: 2740)
    • Checks supported languages

      • RegSvcs.exe (PID: 3472)
      • RegSvcs.exe (PID: 2740)
      • RegSvcs.exe (PID: 1932)
      • RegSvcs.exe (PID: 2824)
      • RegSvcs.exe (PID: 3024)
    • Reads the computer name

      • RegSvcs.exe (PID: 2740)
      • RegSvcs.exe (PID: 1932)
      • RegSvcs.exe (PID: 2824)
      • RegSvcs.exe (PID: 3024)
    • Reads Environment values

      • RegSvcs.exe (PID: 2740)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 4092)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 4092)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 4092)
    • The executable file from the user directory is run by the Powershell process

      • RegSvcs.exe (PID: 2740)
      • RegSvcs.exe (PID: 3472)
    • Reads product name

      • RegSvcs.exe (PID: 2740)
    • Creates files or folders in the user directory

      • RegSvcs.exe (PID: 2740)
    • Reads the machine GUID from the registry

      • RegSvcs.exe (PID: 2740)
      • RegSvcs.exe (PID: 1932)
      • RegSvcs.exe (PID: 2824)
    • Create files in a temporary directory

      • RegSvcs.exe (PID: 2824)
      • RegSvcs.exe (PID: 1932)
      • RegSvcs.exe (PID: 2740)
      • RegSvcs.exe (PID: 3024)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Remcos

(PID) Process(2740) RegSvcs.exe
C2 (1)5.78.82.186:2405
Botnetlies
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_nameRmc-JR41S9
Keylog_flag0
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirremcos
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
9
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe cmd.exe no specs powershell.exe #REMCOS regsvcs.exe regsvcs.exe no specs regsvcs.exe regsvcs.exe regsvcs.exe wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1264C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Roaming\WindowsServices\MUVIL.cmd" "C:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1592"C:\Windows\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\in.vbsC:\Windows\System32\wscript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1932C:\Users\admin\AppData\Local\Temp\RegSvcs.exe /stext "C:\Users\admin\AppData\Local\Temp\qjyzabbshe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
RegSvcs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\users\admin\appdata\local\temp\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
2740"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\users\admin\appdata\local\temp\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Remcos
(PID) Process(2740) RegSvcs.exe
C2 (1)5.78.82.186:2405
Botnetlies
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_nameRmc-JR41S9
Keylog_flag0
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirremcos
2824C:\Users\admin\AppData\Local\Temp\RegSvcs.exe /stext "C:\Users\admin\AppData\Local\Temp\dgjctexnjupgsjyi"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
RegSvcs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\users\admin\appdata\local\temp\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3024C:\Users\admin\AppData\Local\Temp\RegSvcs.exe /stext "C:\Users\admin\AppData\Local\Temp\adertlmuvmxbi"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
RegSvcs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\users\admin\appdata\local\temp\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3472"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
2
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\users\admin\appdata\local\temp\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3756"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\urpkqqywgkcmu.vbs" C:\Windows\System32\wscript.exeRegSvcs.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4092PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\admin\AppData\Roaming\WindowsServices\LIYTI.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
Total events
12 282
Read events
12 173
Write events
74
Delete events
35

Modification events

(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(1592) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
1
Suspicious files
6
Text files
7
Unknown types
5

Dropped files

PID
Process
Filename
Type
1592wscript.exeC:\Users\admin\AppData\Roaming\WindowsServices\MUVIL.cmdtext
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FSVFX.vbstext
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsServices-IJXRJ.lnklnk
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFF36071456820AC60FD568DDF18F256der
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFF36071456820AC60FD568DDF18F256binary
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\MGYEDF9B.txttext
MD5:
SHA256:
1592wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\JFUK3VGN.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
15
DNS requests
7
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1592
wscript.exe
GET
304
217.20.57.40:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f460a99db30dbd61
unknown
unknown
1592
wscript.exe
GET
200
23.192.153.142:80
http://x1.c.lencr.org/
unknown
unknown
1592
wscript.exe
GET
200
2.16.241.15:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgM2Q%2FzRu0WaFnOiBBRPKmemDw%3D%3D
unknown
unknown
2740
RegSvcs.exe
GET
200
178.237.33.50:80
http://geoplugin.net/json.gp
unknown
unknown
1080
svchost.exe
GET
304
217.20.57.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0754c686571bd23f
unknown
unknown
1080
svchost.exe
GET
200
217.20.57.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3e412f7b4eff0943
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
1592
wscript.exe
148.72.177.212:443
textbin.net
AS-30083-GO-DADDY-COM-LLC
US
unknown
1592
wscript.exe
217.20.57.40:80
ctldl.windowsupdate.com
US
unknown
1592
wscript.exe
23.192.153.142:80
x1.c.lencr.org
AKAMAI-AS
GB
unknown
1592
wscript.exe
2.16.241.15:80
r3.o.lencr.org
Akamai International B.V.
DE
unknown
2740
RegSvcs.exe
5.78.82.186:2405
DE
unknown
2740
RegSvcs.exe
178.237.33.50:80
geoplugin.net
Schuberg Philis B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared
textbin.net
  • 148.72.177.212
whitelisted
ctldl.windowsupdate.com
  • 217.20.57.40
  • 217.20.57.37
  • 217.20.57.21
  • 217.20.57.24
  • 217.20.57.34
  • 217.20.57.36
  • 217.20.57.27
  • 217.20.57.35
  • 217.20.57.25
  • 217.20.57.42
  • 217.20.57.22
  • 217.20.57.18
  • 217.20.57.41
whitelisted
x1.c.lencr.org
  • 23.192.153.142
whitelisted
r3.o.lencr.org
  • 2.16.241.15
  • 2.16.241.8
shared
geoplugin.net
  • 178.237.33.50
malicious

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO Pastebin-style Service Domain in DNS Lookup (textbin .net)
1592
wscript.exe
Potentially Bad Traffic
ET INFO Pastebin-style Service (textbin .net in TLS SNI)
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS JA3 Hash
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS JA3 Hash
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS JA3 Hash
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS JA3 Hash
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS JA3 Hash
1 ETPRO signatures available at the full report
No debug info