File name:

SosClient.exe

Full analysis: https://app.any.run/tasks/b8df89fa-3799-45b7-89dd-67cac899eb4f
Verdict: Malicious activity
Threats:

Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.

Analysis date: February 09, 2024, 17:15:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ramnit
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed
MD5:

F6CF0FF0983A25B4CBBB939193397D0D

SHA1:

468F179349931CD26394A1374DFB049ABA5CC5F7

SHA256:

5F7AF1E3D830FBE46C799B7819D04DA416737A82992D1D65B71A0188B7A04743

SSDEEP:

6144:2X5jMGZi+P24+cJDuImH+TP789OCU96Is/tL:21MGZi+P/juj+Tz89OCUsIs/tL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Signature: RAMNIT has been detected

      • SosClient.exe (PID: 2472)
      • SosClientSrv.exe (PID: 3672)
      • iexplore.exe (PID: 3700)
    • Drops the executable file immediately after the start

      • SosClient.exe (PID: 2472)
    • Connects to the CnC server

      • iexplore.exe (PID: 3700)
    • RAMNIT has been detected (SURICATA)

      • iexplore.exe (PID: 3700)
    • Changes the autorun value in the registry

      • SosClient.exe (PID: 2472)
    • Changes the login/logoff helper path in the registry

      • iexplore.exe (PID: 3700)
  • SUSPICIOUS

    • Reads the Internet Settings

      • comp.exe (PID: 2964)
      • comp.exe (PID: 2232)
    • Accesses WMI object, sets custom ImpersonationLevel (SCRIPT)

      • comp.exe (PID: 2964)
      • comp.exe (PID: 2232)
    • Executable content was dropped or overwritten

      • SosClient.exe (PID: 2472)
  • INFO

    • Checks supported languages

      • SosClientSrv.exe (PID: 3672)
      • SosClient.exe (PID: 2472)
    • Reads security settings of Internet Explorer

      • comp.exe (PID: 2964)
      • comp.exe (PID: 2232)
    • Creates files or folders in the user directory

      • SosClient.exe (PID: 2472)
    • Checks proxy server information

      • comp.exe (PID: 2964)
      • comp.exe (PID: 2232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:01:19 04:39:30+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 118784
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0x56000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.2.4.1
ProductVersionNumber: 8.2.4.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
CompanyName: 360.cn
FileDescription: 360电脑专家
FileVersion: 8, 2, 4, 1
InternalName: SosClient
LegalCopyright: (C) 360.cn Inc. All Rights Reserved.
OriginalFileName: SosClient.exe
ProductName: 360电脑专家
ProductVersion: 8, 2, 4, 1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start sosclient.exe sosclientsrv.exe no specs #RAMNIT iexplore.exe comp.exe comp.exe

Process information

PID
CMD
Path
Indicators
Parent process
2232C:\Windows\System32\comp.exeC:\Windows\System32\comp.exe
SosClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
File Compare Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\comp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\ws2_32.dll
2472"C:\Users\admin\Desktop\SosClient.exe" C:\Users\admin\Desktop\SosClient.exe
explorer.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
360电脑专家
Exit code:
0
Version:
8, 2, 4, 1
Modules
Images
c:\users\admin\desktop\sosclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\desktop\sosclientsrv.exe
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2964C:\Windows\System32\comp.exeC:\Windows\System32\comp.exe
SosClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
File Compare Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\comp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\ws2_32.dll
3672C:\Users\admin\Desktop\SosClientSrv.exeC:\Users\admin\Desktop\SosClientSrv.exeSosClient.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\sosclientsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
3700"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe
SosClientSrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
2 427
Read events
2 258
Write events
153
Delete events
16

Modification events

(PID) Process:(3700) iexplore.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Operation:writeName:Userinit
Value:
c:\windows\system32\userinit.exe,,c:\users\admin\desktop\sosclientsrv.exe
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(2964) comp.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
Executable files
1
Suspicious files
0
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
2472SosClient.exeC:\Users\admin\AppData\Local\VirtualStore\Windows\8000text
MD5:4D77BD2361CA8B801D665328FC870375
SHA256:F00020654BFA6D2A9CAB4258DEBD30EF881281687C7676B2E2F1A0C6958E2E92
3700iexplore.exeC:\Program Files\Adobe\Acrobat Reader DC\Reader\ngl_resources\resources\ui\index.htmlhtml
MD5:9B84C4CD0B5175E64DADE1CE5F7402C1
SHA256:1EF8BF3C5D900334057922440B8BB351BB6FE0B8D7CA0080C1A839FDA7F4481E
3700iexplore.exeC:\Program Files\Adobe\Acrobat Reader DC\Reader\WebResources\Resource1\index.htmlhtml
MD5:6C86AA03269709BF9A69C1ACFE3A5D53
SHA256:E2A723B70B73074123A9DE3424C958E70D782B6423E12149FA2A256B29E0DC6E
3700iexplore.exeC:\Program Files\Adobe\Acrobat Reader DC\Reader\Legal\ENU\license.htmlhtml
MD5:A401071FB6275B6AC4079F10CEAD5DB0
SHA256:675C16ED5DDFC0725EB38953F20E4A81C34A4699D75D008C60A4C169B8364F10
2472SosClient.exeC:\Users\admin\Desktop\SosClientSrv.exeexecutable
MD5:8746774D1033048DCDC6F82FFAFFD80D
SHA256:FCC22FD4DD5172DEBFE0560E9222164CAD4D84F85767AFA3AF23A498C971C0D5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
10
DNS requests
8
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2232
comp.exe
GET
302
43.129.2.81:80
http://users.qzone.qq.com/fcg-bin/cgi_get_portrait.fcg?uins=3061249563?=65
unknown
html
137 b
unknown
2964
comp.exe
GET
302
43.159.233.101:80
http://users.qzone.qq.com/fcg-bin/cgi_get_portrait.fcg?uins=3061249563?=331
unknown
html
137 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3700
iexplore.exe
216.58.212.142:80
google.com
GOOGLE
US
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1080
svchost.exe
192.168.100.2:53
whitelisted
2964
comp.exe
43.159.233.101:80
users.qzone.qq.com
Tencent Building, Kejizhongyi Avenue
HK
unknown
3700
iexplore.exe
34.175.230.209:443
zahlung.name
GOOGLE-CLOUD-PLATFORM
ES
unknown
2232
comp.exe
43.129.2.81:80
users.qzone.qq.com
Tencent Building, Kejizhongyi Avenue
HK
unknown

DNS requests

Domain
IP
Reputation
zahlung.name
  • 34.175.230.209
malicious
users.qzone.qq.com
  • 43.159.233.101
  • 43.129.2.81
malicious
google.com
  • 216.58.212.142
whitelisted

Threats

PID
Process
Class
Message
3700
iexplore.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
No debug info