| File name: | trmm-testing-test-workstation-amd64.exe |
| Full analysis: | https://app.any.run/tasks/a9414a14-7653-40dc-8316-b7e3db33d658 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 16, 2025, 19:04:28 |
| OS: | Windows 11 Professional (build: 22000, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 7 sections |
| MD5: | 5C5A5108D7B01B5DAE1FEEB2F1461336 |
| SHA1: | A144C90D755DDF78F699544F75A622E8502F2289 |
| SHA256: | 3D550B8B386D201750D4C590E6A31C4A89FD9F409A7B8EE17541C9DD0227FB5A |
| SSDEEP: | 98304:b89z9qgAdj3+GaOhdwMVHM4ZSC9y1lYQau6q:g |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, No debug |
| PEType: | PE32+ |
| LinkerVersion: | 3 |
| CodeSize: | 2520576 |
| InitializedDataSize: | 246784 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x66fe0 |
| OSVersion: | 6.1 |
| ImageVersion: | 1 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 2.0.4.0 |
| ProductVersionNumber: | 2.0.4.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | AmidaWare LLC |
| FileDescription: | Tactical RMM Installer |
| FileVersion: | v2.0.4.0 |
| InternalName: | rmm.exe |
| LegalCopyright: | Copyright (c) 2022 AmidaWare LLC |
| OriginalFileName: | installer.go |
| ProductName: | Tactical RMM Installer |
| ProductVersion: | v2.0.4.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 440 | "cmd.exe" /c tacticalrmm.exe -m installsvc | C:\Windows\SysWOW64\cmd.exe | — | tacticalagent-v2.8.0-windows-amd64.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 440 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 932 | ping 127.0.0.1 -n 2 | C:\Windows\SysWOW64\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.22000.653 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1116 | "cmd.exe" /c taskkill /F /IM tacticalrmm.exe | C:\Windows\SysWOW64\cmd.exe | — | tacticalagent-v2.8.0-windows-amd64.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 128 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1140 | "C:\Program Files\Mesh Agent\MeshAgent.exe" --installedByUser="S-1-5-21-166304369-59083888-3082702900-1001" | C:\Program Files\Mesh Agent\MeshAgent.exe | services.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Description: MeshCentral Background Service Agent Version: 2022-Dec-2 11:42:16-0800 Modules
| |||||||||||||||
| 1232 | C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES | C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe | trmm-testing-test-workstation-amd64.exe | ||||||||||||
User: admin Company: AmidaWare Inc Integrity Level: HIGH Description: Tactical RMM Agent Setup Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1484 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | MeshAgent.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1568 | ping 127.0.0.1 -n 2 | C:\Windows\SysWOW64\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.22000.653 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1656 | C:\Windows\system32\svchost.exe -k NetworkService -p | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1668 | "C:\Users\admin\Desktop\trmm-testing-test-workstation-amd64.exe" | C:\Users\admin\Desktop\trmm-testing-test-workstation-amd64.exe | explorer.exe | ||||||||||||
User: admin Company: AmidaWare LLC Integrity Level: HIGH Description: Tactical RMM Installer Exit code: 0 Version: v2.0.4.0 Modules
| |||||||||||||||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-462 |
Value: Afghanistan Standard Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-461 |
Value: Afghanistan Daylight Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-222 |
Value: Alaskan Standard Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-221 |
Value: Alaskan Daylight Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-2392 |
Value: Aleutian Standard Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-2391 |
Value: Aleutian Daylight Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-2162 |
Value: Altai Standard Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-2161 |
Value: Altai Daylight Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-392 |
Value: Arab Standard Time | |||
| (PID) Process: | (6708) tacticalrmm.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\4c\52C64B7E |
| Operation: | write | Name: | C:\Windows\system32\,@tzres.dll,-391 |
Value: Arab Daylight Time | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1784 | meshagent.exe | C:\Program Files\Mesh Agent\MeshAgent.exe | — | |
MD5:— | SHA256:— | |||
| 1232 | tacticalagent-v2.8.0-windows-amd64.exe | C:\Users\admin\AppData\Local\Temp\is-58156.tmp\tacticalagent-v2.8.0-windows-amd64.tmp | executable | |
MD5:A639312111D278FEE4F70299C134D620 | SHA256:4B0BE5167A31A77E28E3F0A7C83C9D289845075B51E70691236603B1083649DF | |||
| 2132 | tacticalagent-v2.8.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\unins000.dat | binary | |
MD5:1FBCE55BD8B7BB9DC5A4E6F302AC5DFC | SHA256:C1C44B9632D2EDAA79BAF61248F9F3D451864D0DD426A59566D881A8F73F482A | |||
| 1140 | MeshAgent.exe | C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\09761E72EE969B4389FD99C90474F6851FC31C84 | binary | |
MD5:FCA50737B771864E92E771BD6527A356 | SHA256:52D487482F1405D8C9AA8C0E6F8783BC913AD90E79C60EF84EC3FA81630177BE | |||
| 2132 | tacticalagent-v2.8.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\unins000.exe | executable | |
MD5:5E81857286E2795352225BE245FBD62B | SHA256:2624C22DA19E89717DCD522D22B21849A1C3F0EB781333DF85BE5FCD57597278 | |||
| 2132 | tacticalagent-v2.8.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\is-KB6OR.tmp | executable | |
MD5:6CFBD2DA5F304A3B8972EAFE6FE4D191 | SHA256:AD29D4E9E01870FFBDB6F2498E6CE36A708E56DB2AD431BA2D80BF5A6CAAC069 | |||
| 2132 | tacticalagent-v2.8.0-windows-amd64.tmp | C:\Program Files\TacticalAgent\is-R0SGS.tmp | executable | |
MD5:5E81857286E2795352225BE245FBD62B | SHA256:2624C22DA19E89717DCD522D22B21849A1C3F0EB781333DF85BE5FCD57597278 | |||
| 6876 | tacticalrmm.exe | C:\ProgramData\TacticalRMM\953976249.py | text | |
MD5:14C2BDDAC34109E4BF190C93E175EE84 | SHA256:8EB837AA261848788CBDD8EF39BBB68B2D0BA22CF9A62F9A52C5180C6D6C83A6 | |||
| 6876 | tacticalrmm.exe | C:\Program Files\TacticalAgent\meshagent.exe | executable | |
MD5:B0CB851630A4E079BBD62BA830FBEF97 | SHA256:F32AB646E3D5345A13C52DF23A74A2BA3E3629163F5C22D9D8E73DB4ABDC6B38 | |||
| 6876 | tacticalrmm.exe | C:\Program Files\TacticalAgent\agent.log | text | |
MD5:10D2941A1AB8F575AED84FAA1D24566B | SHA256:6D66768226CBC40BC11546FD3E436CB316FC232F6B9CA4039DE4C8A06F9A8369 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.55.161.164:80 | http://www.msftconnecttest.com/connecttest.txt | unknown | — | — | whitelisted |
— | — | GET | 302 | 140.82.121.4:443 | https://github.com/amidaware/rmmagent/releases/download/v2.8.0/tacticalagent-v2.8.0-windows-amd64.exe | unknown | — | — | — |
2860 | svchost.exe | GET | 200 | 199.232.214.172:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?0811ccc60b3de69d | unknown | — | — | whitelisted |
— | — | GET | 101 | 138.199.153.14:443 | https://mesh.kf637.tech/agent.ashx | unknown | — | — | — |
— | — | GET | 101 | 138.199.153.14:443 | https://api.kf637.tech/natsws | unknown | — | — | — |
— | — | GET | 101 | 138.199.153.14:443 | https://api.kf637.tech/natsws | unknown | — | — | — |
— | — | GET | 302 | 140.82.121.4:443 | https://github.com/amidaware/rmmagent/releases/download/v2.8.0/py3.11.9_amd64.zip | unknown | — | — | — |
— | — | GET | 101 | 138.199.153.14:443 | https://mesh.kf637.tech/agent.ashx | unknown | — | — | — |
5896 | svchost.exe | POST | 403 | 23.219.128.25:80 | http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409 | unknown | — | — | whitelisted |
5896 | svchost.exe | POST | 403 | 23.219.128.25:80 | http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409 | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 23.55.161.164:80 | — | Akamai International B.V. | DE | unknown |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 217.20.57.36:80 | ctldl.windowsupdate.com | — | US | whitelisted |
1668 | trmm-testing-test-workstation-amd64.exe | 140.82.121.4:443 | github.com | GITHUB | US | whitelisted |
2860 | svchost.exe | 199.232.214.172:80 | ctldl.windowsupdate.com | FASTLY | US | whitelisted |
1668 | trmm-testing-test-workstation-amd64.exe | 185.199.111.133:443 | objects.githubusercontent.com | FASTLY | US | shared |
6876 | tacticalrmm.exe | 138.199.153.14:443 | api.kf637.tech | — | DE | unknown |
1140 | MeshAgent.exe | 138.199.153.14:443 | api.kf637.tech | — | DE | unknown |
6876 | tacticalrmm.exe | 188.114.97.3:443 | icanhazip.tacticalrmm.io | CLOUDFLARENET | NL | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
github.com |
| whitelisted |
objects.githubusercontent.com |
| shared |
api.kf637.tech |
| unknown |
mesh.kf637.tech |
| unknown |
icanhazip.tacticalrmm.io |
| unknown |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO Microsoft Connection Test |
— | — | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain (icanhazip .com in TLS SNI) |
1656 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (icanhazip .com) |
1656 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ifconfig .co) |
— | — | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain (ifconfig .co) in TLS SNI |
5956 | tacticalrmm.exe | Potentially Bad Traffic | ET INFO Observed Chocolatey Windows Package Management Domain (chocolatey .org in TLS SNI) |
3976 | powershell.exe | Potentially Bad Traffic | ET INFO Observed Chocolatey Windows Package Management Domain (chocolatey .org in TLS SNI) |