File name:

932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe

Full analysis: https://app.any.run/tasks/7a05ddee-b771-4980-be2f-42918b7ffdb0
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: October 01, 2024, 06:46:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
remcos
evasion
netreactor
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

1D818C67CD7B934A84588A3207B2E50A

SHA1:

F143719DAFEA314EB6AE638E9A7694DA54C3A445

SHA256:

932C8687387B5FA94EF7B5C11358B0D0DC90EA488729382E09EC126D61457D6D

SSDEEP:

49152:/aLkndcopk6hqiEdMXLO9IVMxZiZUXPd1/LtUI4Hg+a5a/FR9OgFUA542fnFtHp2:ni0h9aMi/xZiID/pcHXqAnbU2fZS3ldd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REMCOS has been detected

      • vbc.exe (PID: 5996)
    • REMCOS mutex has been found

      • vbc.exe (PID: 5996)
    • REMCOS has been detected (SURICATA)

      • vbc.exe (PID: 5996)
    • Connects to the CnC server

      • vbc.exe (PID: 5996)
    • Uses Task Scheduler to run other applications

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
    • REMCOS has been detected (YARA)

      • vbc.exe (PID: 5996)
  • SUSPICIOUS

    • The process executes VB scripts

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
    • Contacting a server suspected of hosting an CnC

      • vbc.exe (PID: 5996)
    • Reads security settings of Internet Explorer

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
      • vbc.exe (PID: 5996)
    • Executable content was dropped or overwritten

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
    • There is functionality for taking screenshot (YARA)

      • vbc.exe (PID: 5996)
    • Connects to unusual port

      • vbc.exe (PID: 5996)
    • Checks for external IP

      • vbc.exe (PID: 5996)
  • INFO

    • Checks supported languages

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
      • vbc.exe (PID: 5996)
    • Process checks computer location settings

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
    • Create files in a temporary directory

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
    • .NET Reactor protector has been detected

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
    • Reads the machine GUID from the registry

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
    • Reads the computer name

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
      • vbc.exe (PID: 5996)
    • Creates files or folders in the user directory

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
      • vbc.exe (PID: 5996)
    • Checks proxy server information

      • vbc.exe (PID: 5996)
    • The process uses the downloaded file

      • 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe (PID: 5520)
    • Creates files in the program directory

      • vbc.exe (PID: 5996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Remcos

(PID) Process(5996) vbc.exe
C2 (3)www.c42staging.com:2404
www.vdoclabs.com:2404
www.ozkol-aluminyum.com:2404
BotnetRemoteHost
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_nameRmc-QCH1J0
Keylog_flag1
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirdfghj
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:27 03:13:11+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 897536
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0xdd08e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: AppSistemaGaragem
FileVersion: 1.0.0.0
InternalName: eALU.exe
LegalCopyright: Copyright © 2022
LegalTrademarks: -
OriginalFileName: eALU.exe
ProductName: AppSistemaGaragem
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT 932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe schtasks.exe no specs conhost.exe no specs vbc.exe no specs #REMCOS vbc.exe

Process information

PID
CMD
Path
Indicators
Parent process
2912"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
4294967295
Version:
14.8.9037.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\vbc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3924\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4032"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wTTruYPumnUe" /XML "C:\Users\admin\AppData\Local\Temp\tmp974C.tmp"C:\Windows\SysWOW64\schtasks.exe932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5520"C:\Users\admin\Desktop\932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe" C:\Users\admin\Desktop\932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
AppSistemaGaragem
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5996"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Version:
14.8.9037.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\vbc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Remcos
(PID) Process(5996) vbc.exe
C2 (3)www.c42staging.com:2404
www.vdoclabs.com:2404
www.ozkol-aluminyum.com:2404
BotnetRemoteHost
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_nameRmc-QCH1J0
Keylog_flag1
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirdfghj
Total events
968
Read events
962
Write events
6
Delete events
0

Modification events

(PID) Process:(5996) vbc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-QCH1J0
Operation:writeName:exepath
Value:
AD70E0BFB4000440AEE1BD9BD8C21E9BED050D8EDF56312B3A2DFC3A4C748AA4DF3E33D2FC550C8FD113112F5ED8E8EB6CB238A070BDC08EBCB0E0FEFC5EF0E09CD7CC4E924258401AD68E1239C9EA3C2D4C47B853F8C5B2939F54E54B448C8D259C77A997D17A2E215E7C79
(PID) Process:(5996) vbc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-QCH1J0
Operation:writeName:licence
Value:
CA663EBB53D7A66BDE83ED27BCF6B71D
(PID) Process:(5996) vbc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-QCH1J0
Operation:writeName:time
Value:
(PID) Process:(5996) vbc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5996) vbc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5996) vbc.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5996vbc.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\json[1].jsonbinary
MD5:EC517FF1CDC7B87C0FFB79157A73A93A
SHA256:8DA1D2F65D8EF752E8D8DBF4CF0EC7889FEFF035A7ADD583122974D7AFE269B5
5520932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exeC:\Users\admin\AppData\Roaming\wTTruYPumnUe.exeexecutable
MD5:1D818C67CD7B934A84588A3207B2E50A
SHA256:932C8687387B5FA94EF7B5C11358B0D0DC90EA488729382E09EC126D61457D6D
5520932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d.exeC:\Users\admin\AppData\Local\Temp\tmp974C.tmpxml
MD5:B093D06D35F8CCF7E08B1D4A0CD26313
SHA256:3CC539DA4B50D2EFA524ABAC61968AFB518462C595C7C6D9C4E26028F2223A24
5996vbc.exeC:\ProgramData\dfghj\logs.datbinary
MD5:2D066782F1E35E773B603CEA0F6ED2C8
SHA256:BAA5668F04B4EBD6EA732F41558EBDFB2730818488086DEEA5CFB09F6546688D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
29
DNS requests
6
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6284
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5996
vbc.exe
GET
200
178.237.33.50:80
http://geoplugin.net/json.gp
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6284
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4324
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6284
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5996
vbc.exe
103.198.26.87:2404
www.c42staging.com
GB Network Solutions Sdn. Bhd.
MY
malicious
5996
vbc.exe
178.237.33.50:80
geoplugin.net
Schuberg Philis B.V.
NL
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.142
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
www.c42staging.com
  • 103.198.26.87
malicious
geoplugin.net
  • 178.237.33.50
malicious

Threats

PID
Process
Class
Message
5996
vbc.exe
Malware Command and Control Activity Detected
ET MALWARE Remcos 3.x Unencrypted Checkin
5996
vbc.exe
Malware Command and Control Activity Detected
ET MALWARE Remcos 3.x Unencrypted Server Response
1 ETPRO signatures available at the full report
No debug info