analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.rar

Full analysis: https://app.any.run/tasks/c038e9bd-a206-4e70-95c7-3e0f1e7ae357
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 31, 2023, 23:11:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
Indicators:
MIME: application/x-rar
File info: RAR archive data, flags: Locked EncryptedBlockHeader
MD5:

FECE27B4884C071FCDBF66CCDFA52C2D

SHA1:

76DAE8C49CAE7E71FD9CA55D2AD22123F27B4F16

SHA256:

55F9D1F7767797AA6C9EEF0C2FB01E88C3050006B496B2FDB02F4F2B3E419579

SSDEEP:

24576:Ms58hBNs1DpSodGnaduQi9wEhKzmOu/8jCu/C4mSCpXP3vUqcmeFUVlAmzB2:Ms58KsxaEDiEhKzu/8uwmSCdfgFms

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 988)
    • Starts Visual C# compiler

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
    • Adds path to the Windows Defender exclusion list

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
    • Remcos is detected

      • csc.exe (PID: 3080)
    • REMCOS detected by memory dumps

      • csc.exe (PID: 3080)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
    • Reads the Internet Settings

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
      • powershell.exe (PID: 2700)
    • Starts POWERSHELL.EXE for commands execution

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
    • The process hide an interactive prompt from the user

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
    • Using PowerShell to operate with local accounts

      • powershell.exe (PID: 2700)
    • Connects to unusual port

      • csc.exe (PID: 3080)
  • INFO

    • Reads the computer name

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
      • csc.exe (PID: 3080)
    • Checks supported languages

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
      • csc.exe (PID: 3080)
    • The process checks LSA protection

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
      • powershell.exe (PID: 2700)
    • Creates files or folders in the user directory

      • cmd.exe (PID: 1764)
    • Reads the machine GUID from the registry

      • Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe (PID: 3864)
    • Reads product name

      • csc.exe (PID: 3080)
    • Reads Environment values

      • csc.exe (PID: 3080)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 2700)
    • Create files in a temporary directory

      • powershell.exe (PID: 2700)
    • Creates files in the program directory

      • csc.exe (PID: 3080)
    • Reads settings of System Certificates

      • powershell.exe (PID: 2700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Remcos

(PID) Process(3080) csc.exe
Max_keylog_file100000
Keylog_dirremcos
Copy_dirRemcos
Connect_delay0
Audio_dirMicRecords
Audio_path%ProgramFiles%
Audio_record_time5
Delete_fileFalse
Mouse_optionFalse
Screenshot_cryptFalse
Screenshot_fileScreenshots
Screenshot_path%APPDATA%
Take_ScreenshotFalse
Screenshot_time5
Screenshot_flagFalse
Hide_keylogFalse
Keylog_cryptFalse
Keylog_filelogs.dat
Keylog_path%LOCALAPPDATA%
Keylog_flag1
Mutex_nameRmc-KRVPQ3
Hide_fileFalse
Startup_valueRemcos
Copy_fileremcos.exe
Setup_path%LOCALAPPDATA%
Install_HKLM\Explorer\Run1
Install_HKLM\RunTrue
Install_HKCU\RunTrue
Install_flagFalse
Connect_interval1
BotnetRemoteHost
Hosts (2)127.0.0.1:8029
afgdsg.duckdns.org:8029
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
7
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs factura y comprobante de pago  detalle de transaccion -pdf-65478396473847389.exe no specs cmd.exe no specs cmd.exe no specs schtasks.exe no specs powershell.exe no specs #REMCOS csc.exe

Process information

PID
CMD
Path
Indicators
Parent process
1048"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\ntdll.dll
3864"C:\Users\admin\AppData\Local\Temp\Rar$EXb1048.29614\Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb1048.29614\Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb1048.29614\factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
988"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\admin\AppData\Roaming\AppData.exe'" /fC:\Windows\System32\cmd.exeFactura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1764"cmd" /c copy "C:\Users\admin\AppData\Local\Temp\Rar$EXb1048.29614\Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe" "C:\Users\admin\AppData\Roaming\AppData.exe"C:\Windows\System32\cmd.exeFactura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
1796schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\admin\AppData\Roaming\AppData.exe'" /fC:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\ole32.dll
c:\windows\system32\usp10.dll
2700"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "'C:\Users\admin\AppData\Local\Temp\Rar$EXb1048.29614\Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFactura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\atl.dll
3080"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Remcos
(PID) Process(3080) csc.exe
Max_keylog_file100000
Keylog_dirremcos
Copy_dirRemcos
Connect_delay0
Audio_dirMicRecords
Audio_path%ProgramFiles%
Audio_record_time5
Delete_fileFalse
Mouse_optionFalse
Screenshot_cryptFalse
Screenshot_fileScreenshots
Screenshot_path%APPDATA%
Take_ScreenshotFalse
Screenshot_time5
Screenshot_flagFalse
Hide_keylogFalse
Keylog_cryptFalse
Keylog_filelogs.dat
Keylog_path%LOCALAPPDATA%
Keylog_flag1
Mutex_nameRmc-KRVPQ3
Hide_fileFalse
Startup_valueRemcos
Copy_fileremcos.exe
Setup_path%LOCALAPPDATA%
Install_HKLM\Explorer\Run1
Install_HKLM\RunTrue
Install_HKCU\RunTrue
Install_flagFalse
Connect_interval1
BotnetRemoteHost
Hosts (2)127.0.0.1:8029
afgdsg.duckdns.org:8029
Total events
10 928
Read events
10 836
Write events
92
Delete events
0

Modification events

(PID) Process:(1048) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1048) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
0
Suspicious files
6
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
1048WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1048.29614\Factura y comprobante de pago detalle de transaccion -pdf-65478396473847389.exe
MD5:
SHA256:
1764cmd.exeC:\Users\admin\AppData\Roaming\AppData.exe
MD5:
SHA256:
3080csc.exeC:\ProgramData\remcos\logs.datbinary
MD5:161252DADE8B424F5F4B82E59E08A2F7
SHA256:DF47346480278B2D38EBE4C075B4BFF3A9D45BEB648BC5DEDE3164F38A34959E
2700powershell.exeC:\Users\admin\AppData\Local\Temp\pthz0zcp.ycg.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
2700powershell.exeC:\Users\admin\AppData\Local\Temp\ybchbkja.hka.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
2700powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivedbf
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3080
csc.exe
177.255.88.17:8029
afgdsg.duckdns.org
Colombia Movil
CO
malicious
177.255.88.17:8029
afgdsg.duckdns.org
Colombia Movil
CO
malicious

DNS requests

Domain
IP
Reputation
afgdsg.duckdns.org
  • 177.255.88.17
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info