File name:

SecuriteInfo.com.Win32.PWSX-gen.23527.24330

Full analysis: https://app.any.run/tasks/58b397c7-04bf-4d4d-a001-1b5a6f73cf4d
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: December 14, 2023, 05:19:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
rat
remcos
remote
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

6B88C43C566BE0138CCF70C0D2B31B4B

SHA1:

3D0AAA136151F98960714CBFF25B634405F88A95

SHA256:

9496EA650A182FC8C1B87B205C226D44B7271186B473B156CFB727C2E81DCA0A

SSDEEP:

49152:RNGf0Z+Dt68rGsp7J3q7IHy/4D/nhIpXkyYu9pin1c0KE9+6UlLz5LDhLE:fd+h6Qt3q7I64Dn6kKpiFRUlLz5B

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
    • Uses Task Scheduler to run other applications

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
    • REMCOS has been detected (SURICATA)

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
    • Actions looks like stealing of personal data

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2940)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2520)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2156)
    • Steals credentials from Web Browsers

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2156)
    • Steals credentials

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2156)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2520)
    • REMCOS has been detected (YARA)

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
    • Uses NirSoft utilities to collect credentials

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2156)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2520)
  • SUSPICIOUS

    • Reads the Internet Settings

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
    • Application launched itself

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
    • Connects to unusual port

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
    • Reads browser cookies

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
    • Accesses Microsoft Outlook profiles

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2520)
  • INFO

    • Creates files or folders in the user directory

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
    • Checks supported languages

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2520)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2156)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2940)
    • Reads the computer name

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2520)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2940)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2156)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2940)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2156)
    • Create files in a temporary directory

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 1012)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2940)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2156)
      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2520)
    • Reads Environment values

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
    • Checks proxy server information

      • SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe (PID: 2176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Remcos

(PID) Process(2176) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
C2 (1)94.156.67.170:6657
BotnetHost
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_nameRmc-UH491C
Keylog_flag0
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirremcos
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (72.2)
.scr | Windows screen saver (12.9)
.dll | Win32 Dynamic Link Library (generic) (6.4)
.exe | Win32 Executable (generic) (4.4)
.exe | Generic Win/DOS Executable (1.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:14 02:11:40+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 908800
InitializedDataSize: 8704
UninitializedDataSize: -
EntryPoint: 0xdfd22
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 14.0.4.0
ProductVersionNumber: 14.0.4.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Gaming AI
CompanyName: Spiel
FileDescription: Minesweeper Spiel
FileVersion: 14.0.4.0
InternalName: CPg.exe
LegalCopyright: Spiel (C) 2024
LegalTrademarks: Spiel
OriginalFileName: CPg.exe
ProductName: Minesweeper Spiel
ProductVersion: 14.0.4.0
AssemblyVersion: 5.0.2.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
11
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start securiteinfo.com.win32.pwsx-gen.23527.24330.exe no specs schtasks.exe no specs securiteinfo.com.win32.pwsx-gen.23527.24330.exe no specs securiteinfo.com.win32.pwsx-gen.23527.24330.exe no specs securiteinfo.com.win32.pwsx-gen.23527.24330.exe no specs #REMCOS securiteinfo.com.win32.pwsx-gen.23527.24330.exe securiteinfo.com.win32.pwsx-gen.23527.24330.exe securiteinfo.com.win32.pwsx-gen.23527.24330.exe no specs securiteinfo.com.win32.pwsx-gen.23527.24330.exe securiteinfo.com.win32.pwsx-gen.23527.24330.exe no specs securiteinfo.com.win32.pwsx-gen.23527.24330.exe

Process information

PID
CMD
Path
Indicators
Parent process
272"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeSecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
4294967295
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
712"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeSecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
4294967295
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1012"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeexplorer.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
0
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
2156C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe /stext "C:\Users\admin\AppData\Local\Temp\ziemrobqbvnrufazqphtuaqptqbpv"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
0
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2176"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
0
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Remcos
(PID) Process(2176) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
C2 (1)94.156.67.170:6657
BotnetHost
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_nameRmc-UH491C
Keylog_flag0
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirremcos
2264C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe /stext "C:\Users\admin\AppData\Local\Temp\jksfshljxefwelwlhzuvfnlycwtqojkt"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeSecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
0
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2520C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe /stext "C:\Users\admin\AppData\Local\Temp\jksfshljxefwelwlhzuvfnlycwtqojkt"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
0
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2640C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe /stext "C:\Users\admin\AppData\Local\Temp\jksfshljxefwelwlhzuvfnlycwtqojkt"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeSecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
0
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2688"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\koeswqLU" /XML "C:\Users\admin\AppData\Local\Temp\tmp9281.tmp"C:\Windows\SysWOW64\schtasks.exeSecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2852"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeSecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
User:
admin
Company:
Spiel
Integrity Level:
MEDIUM
Description:
Minesweeper Spiel
Exit code:
4294967295
Version:
14.0.4.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.pwsx-gen.23527.24330.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
706
Read events
686
Write events
20
Delete events
0

Modification events

(PID) Process:(1012) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1012) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1012) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1012) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2176) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2176) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2176) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2176) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2176) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2176) SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
1
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2156SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeC:\Users\admin\AppData\Local\Temp\bhv9A90.tmp
MD5:
SHA256:
1012SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeC:\Users\admin\AppData\Local\Temp\tmp9281.tmpxml
MD5:D967AEF2E701A054C601C177B7CB415A
SHA256:3BFA456E4CACB2B9ACB9D6B8336D65BF3255F7DF492C4998D5099C8E2B953E17
2176SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\json[1].jsonbinary
MD5:29C82D71AD00D582E7248DF0F3C24B4C
SHA256:42F8E82B15FD6BF501FC33EE01410758D967499D6123368F4285A6D2C134ED5A
1012SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeC:\Users\admin\AppData\Roaming\koeswqLU.exeexecutable
MD5:6B88C43C566BE0138CCF70C0D2B31B4B
SHA256:9496EA650A182FC8C1B87B205C226D44B7271186B473B156CFB727C2E81DCA0A
2520SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeC:\Users\admin\AppData\Local\Temp\jksfshljxefwelwlhzuvfnlycwtqojkttext
MD5:7FB9A9AD0FD9B1E0108ED71FBB276048
SHA256:7D63C301317E144B0133A72250AE2D8E09AF65A92E6A807EC58A71939FE530A9
2156SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exeC:\Users\admin\AppData\Local\Temp\ziemrobqbvnrufazqphtuaqptqbpvtext
MD5:2D9139D0CBF8301AE9DAD9173A0A6357
SHA256:2AFE12053A281037E21B2C83109E366E151B4848E9D5357E7B5AE6100CC1C481
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
9
DNS requests
1
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
GET
200
178.237.33.50:80
http://geoplugin.net/json.gp
unknown
binary
949 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
94.156.67.170:6657
Terasyst Ltd
BG
malicious
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
178.237.33.50:80
geoplugin.net
Schuberg Philis B.V.
NL
malicious

DNS requests

Domain
IP
Reputation
geoplugin.net
  • 178.237.33.50
malicious

Threats

PID
Process
Class
Message
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x TLS Connection
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS JA3 Hash
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x TLS Connection
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS JA3 Hash
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x TLS Connection
2176
SecuriteInfo.com.Win32.PWSX-gen.23527.24330.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS JA3 Hash
1 ETPRO signatures available at the full report
No debug info