analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1.exe

Full analysis: https://app.any.run/tasks/7d53a62f-bae1-47e4-9bb9-e1ae1c83fd5c
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: November 15, 2018, 01:31:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
keylogger
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C62B6FEFDC9BD1DBEF797C3DCE9B5AB9

SHA1:

5C9E208B23C09DE3FB90435291FBD658458C4AB8

SHA256:

9D0F3D8DB4F15C2A517EF38022C7729FED5A1AE48E0F16CDCBF7C9EFADF1D2DF

SSDEEP:

6144:uPvscHm8kc1+ZBdt274heW4IRqfY2ADtxJiZ7g413/6wkx/vf1ocvCihXA68I+gR:IAs+hMWpsfJAD8VihQ6VgK5HZkQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • WScript.exe (PID: 896)
    • Detected logs from REMCOS RAT

      • lachy.exe (PID: 3120)
    • REMCOS RAT was detected

      • lachy.exe (PID: 3120)
  • SUSPICIOUS

    • Starts itself from another location

      • 1.exe (PID: 2296)
    • Executes scripts

      • 1.exe (PID: 2296)
    • Executable content was dropped or overwritten

      • 1.exe (PID: 2296)
    • Application launched itself

      • lachy.exe (PID: 3172)
    • Writes files like Keylogger logs

      • lachy.exe (PID: 3120)
    • Creates files in the user directory

      • lachy.exe (PID: 3120)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (90.6)
.exe | Win32 Executable (generic) (4.9)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2006:08:16 19:10:30+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 548864
InitializedDataSize: 16384
UninitializedDataSize: -
EntryPoint: 0x1368
OSVersion: 4
ImageVersion: 7.7
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 7.7.0.0
ProductVersionNumber: 7.7.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: MANCEAU8
LegalCopyright: perrier5
LegalTrademarks: tribometer0
ProductName: Fumarates9
FileVersion: 7.07
ProductVersion: 7.07
InternalName: warlike
OriginalFileName: warlike.exe

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 16-Aug-2006 17:10:30
Detected languages:
  • English - United States
Comments: MANCEAU8
LegalCopyright: perrier5
LegalTrademarks: tribometer0
ProductName: Fumarates9
FileVersion: 7.07
ProductVersion: 7.07
InternalName: warlike
OriginalFilename: warlike.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 16-Aug-2006 17:10:30
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00085CFC
0x00086000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.02014
.data
0x00087000
0x00000C2C
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00088000
0x00002DAA
0x00003000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.73444

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.27051
644
Unicode (UTF 16LE)
English - United States
RT_VERSION
30001
4.92115
304
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30002
3.74725
744
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30003
4.18661
2216
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30004
4.8205
7336
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

MSVBVM60.DLL
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start 1.exe wscript.exe lachy.exe no specs #REMCOS lachy.exe

Process information

PID
CMD
Path
Indicators
Parent process
2296"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
7.07
896"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\updated\lachy.vbs" C:\Windows\System32\WScript.exe
1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3172"C:\Users\admin\AppData\Local\Temp\updated\lachy.exe" C:\Users\admin\AppData\Local\Temp\updated\lachy.exe1.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
7.07
3120C:\Users\admin\AppData\Local\Temp\updated\lachy.exe" C:\Users\admin\AppData\Local\Temp\updated\lachy.exe
lachy.exe
User:
admin
Integrity Level:
MEDIUM
Version:
7.07
Total events
365
Read events
358
Write events
7
Delete events
0

Modification events

(PID) Process:(2296) 1.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2296) 1.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(896) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:L$@!*CH5
Value:
C:\Users\admin\AppData\Local\Temp\updated\lachy.vbs -cc
(PID) Process:(3120) lachy.exeKey:HKEY_CURRENT_USER\Software\Uchu-KK3I0K
Operation:writeName:exepath
Value:
43B5118C60B1806513764108EBB9C4E3703ABC89BCB695D82B307197B3CB7528E658A207F5B6AF0232388A046DEA70FB954B5D76E001988D2D258B2753ED20AD002EF7C22C0E2B531EBA6A4463D558D4B47337D292FF2D8EC72F2E1A9350E21D38568BEA821057E4
(PID) Process:(3120) lachy.exeKey:HKEY_CURRENT_USER\Software\Uchu-KK3I0K
Operation:writeName:licence
Value:
50388BBC233CDB2C7CD6EB08ECF63FF9
Executable files
1
Suspicious files
2
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
22961.exeC:\Users\admin\AppData\Local\Temp\updated\lachy.vbstext
MD5:C6FAB65980699A948690EC33700D474E
SHA256:FEEBB5481BD89F79E46BC518EF19778E9142F70D61836D66229BB6ECAF940C41
22961.exeC:\Users\admin\AppData\Local\Temp\~DF46F3EDB080C5CD52.TMPbinary
MD5:D59DB61E93186CAA9BF031FAD483F929
SHA256:7366CB60F0DAA9075D3DD0F737252F049C20028BE1072121E4CE99BBE65CBBAE
22961.exeC:\Users\admin\AppData\Local\Temp\updated\lachy.exeexecutable
MD5:C62B6FEFDC9BD1DBEF797C3DCE9B5AB9
SHA256:9D0F3D8DB4F15C2A517EF38022C7729FED5A1AE48E0F16CDCBF7C9EFADF1D2DF
3172lachy.exeC:\Users\admin\AppData\Local\Temp\~DF72A1A94A243BE1A7.TMPbinary
MD5:D59DB61E93186CAA9BF031FAD483F929
SHA256:7366CB60F0DAA9075D3DD0F737252F049C20028BE1072121E4CE99BBE65CBBAE
3120lachy.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:06FC2B547AA3CAD7C65E66E576FB4B48
SHA256:3424982013E82FF71C8019A79D72E4A8EC81D563CBBC08C35DE84CA3CB3672E6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
nkume666.ddns.net
  • 0.0.0.0
malicious

Threats

No threats detected
No debug info