File name:

Remote Access-windows32-online.exe

Full analysis: https://app.any.run/tasks/57441a7c-231c-4222-864c-202407a7c785
Verdict: Malicious activity
Analysis date: February 25, 2024, 23:13:29
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

32E89783E86429FE516EFC29CC02197A

SHA1:

20E5A8FAB4F0B6DA17ECBBE78B6A8CC00EE2D948

SHA256:

52E508C739AAE8EE5525556326519BB5ADB452F02A969A9FF8BC58AD90BB4C63

SSDEEP:

98304:Ra+ld8YiWRxzXysa4gtho1Bk3NvjRauiw7Un3s68o7DVqXDITytUAArLPM5PA0q6:9jT/TIh7n7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Remote Access-windows32-online.exe (PID: 2848)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Remote Access-windows32-online.exe (PID: 2848)
    • Reads security settings of Internet Explorer

      • Remote Access-windows32-online.exe (PID: 2848)
    • Reads the Internet Settings

      • Remote Access-windows32-online.exe (PID: 2848)
  • INFO

    • Checks supported languages

      • Remote Access-windows32-online.exe (PID: 2848)
    • Reads the computer name

      • Remote Access-windows32-online.exe (PID: 2848)
    • Creates files in the program directory

      • Remote Access-windows32-online.exe (PID: 2848)
    • Checks proxy server information

      • Remote Access-windows32-online.exe (PID: 2848)
    • Reads the machine GUID from the registry

      • Remote Access-windows32-online.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (46.3)
.exe | Win64 Executable (generic) (41)
.exe | Win32 Executable (generic) (6.6)
.exe | Generic Win/DOS Executable (2.9)
.exe | DOS Executable Generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:19 11:52:38+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 225280
InitializedDataSize: 118784
UninitializedDataSize: -
EntryPoint: 0x1ebe0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.4.10.0
ProductVersionNumber: 10.10.10.10
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileVersion: 5.4.10.0
ProductVersion: 5.4.10.0
OriginalFileName:
InternalName:
FileDescription: SimpleHelp Remote Access Client
CompanyName: SimpleHelp Ltd
LegalCopyright: Copyright (c) 2023
ProductName: Remote Access
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start remote access-windows32-online.exe remote access-windows32-online.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2160"C:\Users\admin\AppData\Local\Temp\Remote Access-windows32-online.exe" C:\Users\admin\AppData\Local\Temp\Remote Access-windows32-online.exeexplorer.exe
User:
admin
Company:
SimpleHelp Ltd
Integrity Level:
MEDIUM
Description:
SimpleHelp Remote Access Client
Exit code:
3221226540
Version:
5.4.10.0
Modules
Images
c:\users\admin\appdata\local\temp\remote access-windows32-online.exe
c:\windows\system32\ntdll.dll
2848"C:\Users\admin\AppData\Local\Temp\Remote Access-windows32-online.exe" C:\Users\admin\AppData\Local\Temp\Remote Access-windows32-online.exe
explorer.exe
User:
admin
Company:
SimpleHelp Ltd
Integrity Level:
HIGH
Description:
SimpleHelp Remote Access Client
Exit code:
1
Version:
5.4.10.0
Modules
Images
c:\users\admin\appdata\local\temp\remote access-windows32-online.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
807
Read events
751
Write events
44
Delete events
12

Modification events

(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2848) Remote Access-windows32-online.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
5
Suspicious files
10
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\libjwutils_linux64.soo
MD5:D28409795FB3212DC5621A680388AA8E
SHA256:D08B475F3E40077E40BF949DB73DE4836C0318A7D4CFBE310135F445AE7403FB
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\jwutils_win64.dllexecutable
MD5:3BC9749F5118F7D5F8C652CB59A60787
SHA256:061E2AA6FE2E27B6F2595B4703486C9BFB603CB276B780BC43F63B1F1B844198
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\jwrapperlib\jwstandalone.jarcompressed
MD5:C339A8066A3EE3B6D98BC98CEAF360CC
SHA256:2A176D30AD6123832D9C9D871A0C6511E53027CD3850FF2E73754C019937191D
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\libjwutils_linux64arm.soo
MD5:7D1547979BC4100F953BCADDE660FEB2
SHA256:1891ED1FBEDF1AFFF0C9A16919CDC8EBFCB6EAD6D4AC6DAFE5E2808B667CD56D
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\JWrapper-Remote Access-ICNS.icnsbinary
MD5:3BDB58CA8A307004CFD790F85CC52C6C
SHA256:BA35A3E3787AFEE05EDE6B63806DEEC25FCCD9B560844F615AD86F0DACF18DE1
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\session_win.exeexecutable
MD5:C2152C0947E47BFB8AFDEDC6D283E9ED
SHA256:D0F5A3695E6460445DCA8A4C2790F2881DA0F929C6156EB686789EB36E6557C1
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\SimpleService.exeexecutable
MD5:FAD0C307C2978CDED05839BCD49AF8C9
SHA256:D01071B437563EBA247DCC897169828C30CB9546F662AC25CF18A217DA496CA4
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\elev_win.exeexecutable
MD5:1952652E80A05149214A0F3D332BEC75
SHA256:2322434020CA91AD96FCCA38A7E5508EF9CFA29443DA637CBB44A6230D928D9E
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\libjwutils_macos.jnilibbinary
MD5:0A4AC2CC7A3C46C036CBBD8A79FDA72B
SHA256:3ED83BAC9E0A0756DD4D15EB43A8428FDBFF16D3D6094E8B832E8F1C0B1FF312
2848Remote Access-windows32-online.exeC:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1708902821-0-app\jwrapperlib\jwstandalonelaunch.jarcompressed
MD5:4D29ECCF3866C3FA82EFCA9DC8859CA9
SHA256:82132C71ED8AB43F1389AAA8B7FB51B9BA6332B05946B298A7660F3436B0F84F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info