File name:

Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N

Full analysis: https://app.any.run/tasks/f1651f97-7b21-4b5d-9a8b-85a7ee855f0f
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: September 17, 2024, 08:57:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
remcos
rat
remote
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

22CE3D0FC9F92829BE87F978FC573680

SHA1:

2A55144AED0886304B490FBCC623BE46A8871065

SHA256:

8741E2FC5B709526EAEC1E791C56C7D2C65F312940B81E6027BD6EE2B181D940

SSDEEP:

12288:j1eur+yiTgkF444VAw7ge/Q4fR4kunYcWGcK4oZ+VpWVVVVVVVVVVVVVVVVVBL:drdQ0BunO1oZwpK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REMCOS has been detected

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
      • COM Surrogate.exe (PID: 3184)
      • iexplore.exe (PID: 3852)
      • iexplore.exe (PID: 3852)
      • svchost.exe (PID: 4876)
      • COM Surrogate.exe (PID: 3184)
    • Changes the autorun value in the registry

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
      • COM Surrogate.exe (PID: 3184)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 4680)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 4680)
    • REMCOS has been detected (SURICATA)

      • iexplore.exe (PID: 3852)
    • REMCOS has been detected (YARA)

      • svchost.exe (PID: 4876)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 4680)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 4680)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 4680)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 4680)
    • Contacting a server suspected of hosting an CnC

      • iexplore.exe (PID: 3852)
    • Reads security settings of Internet Explorer

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
    • The process executes VB scripts

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
  • INFO

    • Creates files in the program directory

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
      • iexplore.exe (PID: 3852)
    • Checks supported languages

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
      • COM Surrogate.exe (PID: 3184)
    • The process uses the downloaded file

      • wscript.exe (PID: 4680)
      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
    • Connects to unusual port

      • iexplore.exe (PID: 3852)
    • Create files in a temporary directory

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
    • Reads the computer name

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
    • Process checks computer location settings

      • Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe (PID: 780)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:08:20 16:47:03+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 345088
InitializedDataSize: 134656
UninitializedDataSize: -
EntryPoint: 0x327a4
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
8
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start trojan.win32.remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940n.exe wscript.exe no specs cmd.exe no specs conhost.exe no specs #REMCOS com surrogate.exe #REMCOS iexplore.exe #REMCOS svchost.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
780"C:\Users\admin\Desktop\Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe" C:\Users\admin\Desktop\Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\trojan.win32.remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940n.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3184"C:\ProgramData\COM Surrogate\COM Surrogate.exe"C:\ProgramData\COM Surrogate\COM Surrogate.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3
Modules
Images
c:\programdata\com surrogate\com surrogate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3852"c:\program files (x86)\internet explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe
COM Surrogate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\program files (x86)\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4680"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\install.vbs" C:\Windows\SysWOW64\wscript.exeTrojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4876svchost.exeC:\Windows\SysWOW64\svchost.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
5264\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5276"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\COM Surrogate\COM Surrogate.exe"C:\Windows\SysWOW64\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
1 811
Read events
1 652
Write events
157
Delete events
2

Modification events

(PID) Process:(780) Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:COM Surrogate
Value:
"C:\ProgramData\COM Surrogate\COM Surrogate.exe"
(PID) Process:(780) Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:COM Surrogate
Value:
"C:\ProgramData\COM Surrogate\COM Surrogate.exe"
(PID) Process:(780) Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(3184) COM Surrogate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:COM Surrogate
Value:
"C:\ProgramData\COM Surrogate\COM Surrogate.exe"
(PID) Process:(3184) COM Surrogate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:COM Surrogate
Value:
"C:\ProgramData\COM Surrogate\COM Surrogate.exe"
(PID) Process:(3184) COM Surrogate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-C5SENV
Operation:writeName:exepath
Value:
569FB04DFC7F26A6D0A38832C33CB50A1D404955C595EF3537A878F1D531C93C7B5E8CD5D14B63C13ED5484BAF09001C47E8B220EB7DF90186E8191C7C1CF30A5CA7D17D1BD1E7FA369BE65EC85BF78BF76079C20B8B45300C26720A0098
(PID) Process:(3184) COM Surrogate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-C5SENV
Operation:writeName:Inj
Value:
1
(PID) Process:(3852) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-C5SENV
Operation:delete valueName:Inj
Value:

(PID) Process:(3852) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-C5SENV
Operation:writeName:licence
Value:
58E7C2A1336E4F2E4E710250E77BD4D4
(PID) Process:(3852) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-C5SENV
Operation:writeName:WD
Value:
3852
Executable files
1
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
780Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exeC:\ProgramData\COM Surrogate\COM Surrogate.exeexecutable
MD5:22CE3D0FC9F92829BE87F978FC573680
SHA256:8741E2FC5B709526EAEC1E791C56C7D2C65F312940B81E6027BD6EE2B181D940
780Trojan.Win32.Remcos.pz8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940N.exeC:\Users\admin\AppData\Local\Temp\install.vbsbinary
MD5:01EA74DAF9B956185C45016B68449BB0
SHA256:1B22904A4106604DA03FD63FAD1663A3562F928FBE6BFC90AF4B8239142E83DA
3852iexplore.exeC:\ProgramData\Windows\logs.datbinary
MD5:16E4D760FF11D19C974D5CE89D8300C3
SHA256:B3C8776FF764EB75B3C17157A82D9BBA6FC4E15B8D53B405AB28B22C40803074
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
21
DNS requests
5
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6652
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2040
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2120
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2040
RUXIMICS.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6652
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3852
iexplore.exe
147.185.221.22:43206
stay-daughters.gl.at.ply.gg
PLAYIT-GG
US
malicious
6652
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2040
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2120
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6652
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
stay-daughters.gl.at.ply.gg
  • 147.185.221.22
malicious
www.microsoft.com
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Potentially Bad Traffic
ET INFO playit .gg Tunneling Domain in DNS Lookup
2256
svchost.exe
Misc activity
ET INFO Tunneling Service in DNS Lookup (* .ply .gg)
3852
iexplore.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
3852
iexplore.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
3852
iexplore.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
3852
iexplore.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
3852
iexplore.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
3852
iexplore.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
No debug info