File name:

PROCE-JURIDICO25092024.zip

Full analysis: https://app.any.run/tasks/525e9409-6b1b-4b39-9126-a7e2c9ae6f1d
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: September 25, 2024, 16:26:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
remcos
remote
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

1616D344171C6996439127C071A290AA

SHA1:

47E7E9537B7396DC532D57099F51EF32509B4DED

SHA256:

9337A45D06095B3D5765CB9EB4372631CC36847F00885E6BC25BF4267EE14306

SSDEEP:

98304:avuvsgTprJc8kkSnnWNgaRHY5pXznjEiGBLBVzcemhzWBKE0jqoGlx8yknRQmyVn:ejk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REMCOS has been detected (SURICATA)

      • PROCE-JURIDICO25092024.exe (PID: 1964)
  • SUSPICIOUS

    • Application launched itself

      • PROCE-JURIDICO25092024.exe (PID: 2944)
    • Contacting a server suspected of hosting an CnC

      • PROCE-JURIDICO25092024.exe (PID: 1964)
    • Connects to unusual port

      • PROCE-JURIDICO25092024.exe (PID: 1964)
    • Checks for external IP

      • PROCE-JURIDICO25092024.exe (PID: 1964)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 6792)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6792)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2024:09:25 08:54:58
ZipCRC: 0x848b21de
ZipCompressedSize: 2700914
ZipUncompressedSize: 6089944
ZipFileName: PROCE-JURIDICO25092024.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
123
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe proce-juridico25092024.exe no specs #REMCOS proce-juridico25092024.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1964"C:\Users\admin\AppData\Local\Temp\Rar$EXb6792.40301\PROCE-JURIDICO25092024.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXb6792.40301\PROCE-JURIDICO25092024.exe
PROCE-JURIDICO25092024.exe
User:
admin
Company:
Broadcom Inc
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb6792.40301\proce-juridico25092024.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2944"C:\Users\admin\AppData\Local\Temp\Rar$EXb6792.40301\PROCE-JURIDICO25092024.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb6792.40301\PROCE-JURIDICO25092024.exeWinRAR.exe
User:
admin
Company:
Broadcom Inc
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb6792.40301\proce-juridico25092024.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\comdlg32.dll
c:\windows\syswow64\msvcrt.dll
6792"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\PROCE-JURIDICO25092024.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
2 321
Read events
2 307
Write events
14
Delete events
0

Modification events

(PID) Process:(6792) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6792) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PROCE-JURIDICO25092024.zip
(PID) Process:(6792) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6792) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6792) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6792) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6792) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(1964) PROCE-JURIDICO25092024.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-469YID
Operation:writeName:exepath
Value:
693A2980E02AEBCC8525A1A91C7143747760BF1785A83A49BF7F78161E3EF0703B23D9E6E9CAF05A6C10C52F272FD0A15AB71B4A91E1596FDA1A765314EC35835A97299AEBC58922769185D98086C8A3A742B582C3116A6F2A826F39618418221A1607A4C67EE57E3DA13944633E85621F33429D6B269846818B6B0011AEACC5299497F817A1E1C0E2653905A6B33ADBEE8DCE4FA779DBF6716DC6158E29
(PID) Process:(1964) PROCE-JURIDICO25092024.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-469YID
Operation:writeName:licence
Value:
D60D347B92E1AF41287C54A0914B0C7A
(PID) Process:(1964) PROCE-JURIDICO25092024.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-469YID
Operation:writeName:time
Value:
Executable files
1
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2944PROCE-JURIDICO25092024.exeC:\Users\admin\Music\JudgeUpdater\EyesJudger.exe
MD5:
SHA256:
6792WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6792.40301\PROCE-JURIDICO25092024.exeexecutable
MD5:2E5F8F122F26F109CEAEEF0D703C2D21
SHA256:0FB925B5DB5AF723FC79D103158873DB49EC4BFB26557B1E1745E91893D93FC3
1964PROCE-JURIDICO25092024.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\json[1].jsonbinary
MD5:4658EF2A3AD3710B77AF1979DE04B62C
SHA256:F98E36081A4D527CAE8915203885BD1DC470D603799F60807819329FE0F2C7A3
1964PROCE-JURIDICO25092024.exeC:\ProgramData\remcos\logs.datbinary
MD5:BD4240379E78F51271EAAD085E5ECAB6
SHA256:CF718BEAA266DF00050D68A9FEF0F07BC5F77670C1E9979479370A4C13442DCB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
27
DNS requests
14
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1932
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1964
PROCE-JURIDICO25092024.exe
GET
200
178.237.33.50:80
http://geoplugin.net/json.gp
unknown
whitelisted
5960
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1932
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3180
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
52.182.141.63:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
92.123.104.21:443
Akamai International B.V.
DE
unknown
4
System
192.168.100.255:138
whitelisted
5960
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 216.58.206.78
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.68
  • 20.190.160.20
  • 40.126.32.72
  • 20.190.160.22
  • 40.126.32.138
  • 20.190.160.14
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
098urni4389udn3u4imf8rufue.con-ip.com
  • 179.14.11.136
unknown
geoplugin.net
  • 178.237.33.50
malicious
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Potentially Bad Traffic
ET INFO DNS Redirection Service Domain in DNS Lookup (con-ip .com)
1964
PROCE-JURIDICO25092024.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
1964
PROCE-JURIDICO25092024.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
1 ETPRO signatures available at the full report
No debug info