File name:

Remote Access-windows32-online.exe

Full analysis: https://app.any.run/tasks/57441a7c-231c-4222-864c-202407a7c785
Verdict: Malicious activity
Analysis date: February 25, 2024, 23:13:29
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

32E89783E86429FE516EFC29CC02197A

SHA1:

20E5A8FAB4F0B6DA17ECBBE78B6A8CC00EE2D948

SHA256:

52E508C739AAE8EE5525556326519BB5ADB452F02A969A9FF8BC58AD90BB4C63

SSDEEP:

98304:Ra+ld8YiWRxzXysa4gtho1Bk3NvjRauiw7Un3s68o7DVqXDITytUAArLPM5PA0q6:9jT/TIh7n7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Remote Access-windows32-online.exe (PID: 2848)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Remote Access-windows32-online.exe (PID: 2848)
    • Reads the Internet Settings

      • Remote Access-windows32-online.exe (PID: 2848)
    • Reads security settings of Internet Explorer

      • Remote Access-windows32-online.exe (PID: 2848)
  • INFO

    • Checks supported languages

      • Remote Access-windows32-online.exe (PID: 2848)
    • Reads the machine GUID from the registry

      • Remote Access-windows32-online.exe (PID: 2848)
    • Creates files in the program directory

      • Remote Access-windows32-online.exe (PID: 2848)
    • Reads the computer name

      • Remote Access-windows32-online.exe (PID: 2848)
    • Checks proxy server information

      • Remote Access-windows32-online.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (46.3)
.exe | Win64 Executable (generic) (41)
.exe | Win32 Executable (generic) (6.6)
.exe | Generic Win/DOS Executable (2.9)
.exe | DOS Executable Generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:19 11:52:38+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 225280
InitializedDataSize: 118784
UninitializedDataSize: -
EntryPoint: 0x1ebe0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.4.10.0
ProductVersionNumber: 10.10.10.10
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileVersion: 5.4.10.0
ProductVersion: 5.4.10.0
OriginalFileName:
InternalName:
FileDescription: SimpleHelp Remote Access Client
CompanyName: SimpleHelp Ltd
LegalCopyright: Copyright (c) 2023
ProductName: Remote Access
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start remote access-windows32-online.exe remote access-windows32-online.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2160"C:\Users\admin\AppData\Local\Temp\Remote Access-windows32-online.exe" C:\Users\admin\AppData\Local\Temp\Remote Access-windows32-online.exeexplorer.exe
User:
admin
Company:
SimpleHelp Ltd
Integrity Level:
MEDIUM
Description:
SimpleHelp Remote Access Client
Exit code:
3221226540
Version:
5.4.10.0
Modules
Images
c:\users\admin\appdata\local\temp\remote access-windows32-online.exe
c:\windows\system32\ntdll.dll
2848"C:\Users\admin\AppData\Local\Temp\Remote Access-windows32-online.exe" C:\Users\admin\AppData\Local\Temp\Remote Access-windows32-online.exe
explorer.exe
User:
admin
Company:
SimpleHelp Ltd
Integrity Level:
HIGH
Description:
SimpleHelp Remote Access Client
Exit code:
1
Version:
5.4.10.0
Modules
Images
c:\users\admin\appdata\local\temp\remote access-windows32-online.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
807
Read events
751
Write events
44
Delete events
12

Modification events

(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
5
Suspicious files
10
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\jwutils_win64.dllexecutable
MD5:3BC9749F5118F7D5F8C652CB59A60787
SHA256:061E2AA6FE2E27B6F2595B4703486C9BFB603CB276B780BC43F63B1F1B844198
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\elev_macbinary
MD5:B97A70B14F288D37D6F77229451D0E13
SHA256:B0E0EE51314CD117E94EB53FF46CAFAB951A76E62C0FD6B54D68F6942522F347
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\jwrapperlib\jwstandalonelaunch.jarcompressed
MD5:4D29ECCF3866C3FA82EFCA9DC8859CA9
SHA256:82132C71ED8AB43F1389AAA8B7FB51B9BA6332B05946B298A7660F3436B0F84F
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\elev_win.exeexecutable
MD5:1952652E80A05149214A0F3D332BEC75
SHA256:2322434020CA91AD96FCCA38A7E5508EF9CFA29443DA637CBB44A6230D928D9E
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\jwBuildVersiontext
MD5:2A63324B3049E610EFE09D2168C150C5
SHA256:1ED7F01050BFF23C74D9CF214C6B535DE0E8D913A96D7270C902BC96C7E8CA59
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\logs\Wrapper-2024-02-25-23-13-41-544.logtext
MD5:AB740C465184DAF3864B91B534C2C487
SHA256:1BD788991E1E222A960312E0E95D6E640AB1DB5BC751C0F493ED9A52F31B2EFF
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\session_win.exeexecutable
MD5:C2152C0947E47BFB8AFDEDC6D283E9ED
SHA256:D0F5A3695E6460445DCA8A4C2790F2881DA0F929C6156EB686789EB36E6557C1
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\libjwutils_linux64arm.soo
MD5:7D1547979BC4100F953BCADDE660FEB2
SHA256:1891ED1FBEDF1AFFF0C9A16919CDC8EBFCB6EAD6D4AC6DAFE5E2808B667CD56D
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\libjwutils_linux32arm.soo
MD5:8A7574C4F327D70B144C92C126870C34
SHA256:BBEC792801A81F7521F27FD872C9E1A2CA19456525A4E201E81A0F19776D0E0E
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\nativesplash.pngimage
MD5:A3BE1246247CFC9A93352D288E81F358
SHA256:2F7D3BC8FFBE9B3152EC9C332363247A4E89591FC1349BC0EB2E3A3D93055043
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info