File name: | SecuriteInfo.com.Win32.PWSX-gen.9839.6586 |
Full analysis: | https://app.any.run/tasks/17afec64-fcfd-43a4-920a-fb6bdb5373e9 |
Verdict: | Malicious activity |
Threats: | Remcos is a RAT type malware that attackers use to perform actions on infected machines remotely. This malware is extremely actively caped up to date with updates coming out almost every single month. |
Analysis date: | December 05, 2022, 17:30:44 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
MD5: | 05B2FB25C00FC2625348BA0C2F4AA99E |
SHA1: | 200F289CAC848D18C5EF3016A8B513AA9DBBC3B6 |
SHA256: | 6AA386BB66DF768B6A5B9CD24BC443E157905453FF014863DCD9FDF8B1EB3839 |
SSDEEP: | 12288:jJbgesRmxckJ+l3wBLiBzwwK2vkUUnFqY3IvqmA4hajIw2yXN4WqMv7sQhgQm4Gg:2Ac93iLozBRGqYYvMEYCMXGkaKbFX |
.exe | | | Generic CIL Executable (.NET, Mono, etc.) (56.7) |
---|---|---|
.exe | | | Win64 Executable (generic) (21.3) |
.scr | | | Windows screen saver (10.1) |
.dll | | | Win32 Dynamic Link Library (generic) (5) |
.exe | | | Win32 Executable (generic) (3.4) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2022-Dec-05 14:33:24 |
Comments: | - |
CompanyName: | MagnaSolution |
FileDescription: | Leather Worker |
FileVersion: | 1.3.0.0 |
InternalName: | tYYs.exe |
LegalCopyright: | MagnaSolution 2022 |
LegalTrademarks: | - |
OriginalFilename: | tYYs.exe |
ProductName: | Leather Worker |
ProductVersion: | 1.3.0.0 |
Assembly Version: | 1.3.0.0 |
e_magic: | MZ |
---|---|
e_cblp: | 144 |
e_cp: | 3 |
e_crlc: | - |
e_cparhdr: | 4 |
e_minalloc: | - |
e_maxalloc: | 65535 |
e_ss: | - |
e_sp: | 184 |
e_csum: | - |
e_ip: | - |
e_cs: | - |
e_ovno: | - |
e_oemid: | - |
e_oeminfo: | - |
e_lfanew: | 128 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 3 |
TimeDateStamp: | 2022-Dec-05 14:33:24 |
PointerToSymbolTable: | - |
NumberOfSymbols: | - |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 8192 | 918180 | 918528 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.89051 |
.rsrc | 933888 | 1024 | 1024 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.9358 |
.reloc | 942080 | 12 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.10191 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.30438 | 832 | UNKNOWN | UNKNOWN | RT_VERSION |
mscoree.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3412 | "C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe" | C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | — | Explorer.EXE | |||||||||||
User: admin Company: MagnaSolution Integrity Level: MEDIUM Description: Leather Worker Exit code: 0 Version: 1.3.0.0 Modules
| |||||||||||||||
2180 | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ndEkaSZ" /XML "C:\Users\admin\AppData\Local\Temp\tmp8F28.tmp" | C:\Windows\System32\schtasks.exe | — | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3212 | "C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe" | C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | ||||||||||||
User: admin Company: MagnaSolution Integrity Level: MEDIUM Description: Leather Worker Version: 1.3.0.0 Modules
Remcos(PID) Process(3212) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe Hosts (1)185.136.161.189:1960 BotnetRemoteHost Reff Connect_interval1 Install_flagFalse Install_HKCU\RunTrue Install_HKLM\RunTrue Install_HKLM\Explorer\Run1 Setup_path%LOCALAPPDATA% Copy_fileremcos.exe Startup_valueRemcos Hide_fileFalse Mutex_nameRmc-IPL25E Keylog_flag1 Keylog_path%LOCALAPPDATA% Keylog_filelogs.dat Keylog_cryptFalse Hide_keylogFalse Screenshot_flagFalse Screenshot_time5 Take_ScreenshotFalse Screenshot_path%APPDATA% Screenshot_fileScreenshots Screenshot_cryptFalse Mouse_optionFalse Delete_fileFalse Audio_record_time5 Audio_path%ProgramFiles% Audio_dirMicRecords Connect_delay0 Copy_dirRemcos Keylog_dirremcos Max_keylog_file100000 |
(PID) Process: | (3412) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3412) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (3412) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (3412) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (3212) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Rmc-IPL25E |
Operation: | write | Name: | exepath |
Value: 5FC577312D2C67F9251785538AAF91AA71EF55320821391080D9460467583BAC3BC54CADE49614B3F1CA35BFC0347A3DB3A00EE215A40FCB01691BFD0D942E2389966B9ADD1BF554A55B399D2D1F15D61B78DE94842C2F14CC5B71F86F2ACF7149D0A090726D2EA34F9A4CDDA12ED083D5D93A9D78EAC1DCB3340168F19EEDD5AA444256F9A74D622ECD68B9B91C84F2792E1BEE508C5CFE2905F4FFF1F396C7 | |||
(PID) Process: | (3212) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Rmc-IPL25E |
Operation: | write | Name: | licence |
Value: 115529F37FFDA8A6272902CD7687247A | |||
(PID) Process: | (3212) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
(PID) Process: | (3212) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
Operation: | write | Name: | SavedLegacySettings |
Value: 460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (3212) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3212) SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3212 | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\json[1].json | binary | |
MD5:78B369B112C008FD7308C11CE4688058 | SHA256:E9DD2CB249C81E53EBBD497E20512CDB8E55CA7CD7E5A1C5B96DD6457828BE89 | |||
3412 | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | C:\Users\admin\AppData\Roaming\ndEkaSZ.exe | executable | |
MD5:05B2FB25C00FC2625348BA0C2F4AA99E | SHA256:6AA386BB66DF768B6A5B9CD24BC443E157905453FF014863DCD9FDF8B1EB3839 | |||
3412 | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | C:\Users\admin\AppData\Local\Temp\tmp8F28.tmp | xml | |
MD5:CE60280603E3778B45D277B9B5C7EF97 | SHA256:1EA8FE2E67455BB2D847F00E211BD02F8EFDC60E59B0D07636E28632E38E1104 | |||
3212 | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | C:\ProgramData\remcos\logs.dat | binary | |
MD5:497D32044D25B7395502CB314EBC7AAF | SHA256:829AD5EF7533EBA473D16B8C11B891FF1ECE1A7ADF8785E1C39170C38A7D8CC5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3212 | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | GET | 200 | 178.237.33.50:80 | http://geoplugin.net/json.gp | NL | binary | 915 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3212 | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | 185.136.161.189:1960 | — | Host Europe GmbH | FR | malicious |
3212 | SecuriteInfo.com.Win32.PWSX-gen.9839.6586.exe | 178.237.33.50:80 | geoplugin.net | Schuberg Philis B.V. | NL | suspicious |
Domain | IP | Reputation |
---|---|---|
geoplugin.net |
| suspicious |