File name:

Pegasus.exe

Full analysis: https://app.any.run/tasks/46929ea1-7d7e-4054-98af-31554e893cc1
Verdict: Malicious activity
Threats:

Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.

Analysis date: December 02, 2023, 05:49:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ramnit
trojan
ransomware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

1FCE09E3A00F05743C8DF2A198FEF3E4

SHA1:

C39475C64560870C64182C50EF40E3F6D358A6B3

SHA256:

AD71B10395D14143396A634F54D8E1066C674B91EB8926952261802972F49093

SSDEEP:

24576:/QrtStGIg0nq5M/eEEPqf1934J2NaoJxHv5xr51xbPojJtddPRjiV2cA:qtStGIg0nq5M/FESf1934J2NaqHv5xre

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Pegasus.exe (PID: 564)
      • TempexplorerSrv.exe (PID: 3028)
      • DesktopLayer.exe (PID: 1352)
      • Tempexplorer.exe (PID: 3592)
      • Tempexplorer.exe (PID: 1864)
    • Signature: RAMNIT has been detected

      • Tempexplorer.exe (PID: 3592)
      • TempexplorerSrv.exe (PID: 3028)
      • TempexplorerSrvSrv.exe (PID: 1116)
      • DesktopLayer.exe (PID: 1352)
      • iexplore.exe (PID: 2532)
      • DesktopLayer.exe (PID: 3892)
      • DesktopLayerSrv.exe (PID: 2424)
      • iexplore.exe (PID: 2908)
    • Renames files like ransomware

      • Pegasus.exe (PID: 564)
    • Changes the login/logoff helper path in the registry

      • iexplore.exe (PID: 2908)
    • RAMNIT has been detected (SURICATA)

      • iexplore.exe (PID: 2908)
    • Connects to the CnC server

      • iexplore.exe (PID: 2908)
    • Actions looks like stealing of personal data

      • Tempexplorer.exe (PID: 1864)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • Pegasus.exe (PID: 564)
      • Tempexplorer.exe (PID: 1864)
      • wscript.exe (PID: 1840)
    • The process checks if it is being run in the virtual environment

      • Pegasus.exe (PID: 564)
    • Reads the Internet Settings

      • Pegasus.exe (PID: 564)
      • Tempexplorer.exe (PID: 1864)
      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 3592)
    • Starts itself from another location

      • TempexplorerSrv.exe (PID: 3028)
      • DesktopLayerSrv.exe (PID: 2424)
    • The process executes VB scripts

      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 3592)
    • Gets the drive type (SCRIPT)

      • wscript.exe (PID: 1840)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 1840)
    • Gets a collection of all available drive names (SCRIPT)

      • wscript.exe (PID: 1840)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 1840)
  • INFO

    • Reads the computer name

      • Pegasus.exe (PID: 564)
      • Tempexplorer.exe (PID: 1864)
      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 3592)
      • wmpnscfg.exe (PID: 3276)
    • Checks supported languages

      • Pegasus.exe (PID: 564)
      • Tempexplorer.exe (PID: 1864)
      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 3592)
      • TempexplorerSrv.exe (PID: 3028)
      • TempexplorerSrvSrv.exe (PID: 1116)
      • DesktopLayer.exe (PID: 1352)
      • DesktopLayer.exe (PID: 3892)
      • wmpnscfg.exe (PID: 3276)
      • DesktopLayerSrv.exe (PID: 2424)
    • Reads the machine GUID from the registry

      • Pegasus.exe (PID: 564)
    • Creates files or folders in the user directory

      • Pegasus.exe (PID: 564)
    • Create files in a temporary directory

      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 1864)
      • Tempexplorer.exe (PID: 3592)
      • TempexplorerSrv.exe (PID: 3028)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3276)
      • explorer.exe (PID: 3972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (55.8)
.exe | Win64 Executable (generic) (21)
.scr | Windows screen saver (9.9)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:10:28 04:49:33+01:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 697856
InitializedDataSize: 18432
UninitializedDataSize: -
EntryPoint: 0xac3fe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.0.0.1
ProductVersionNumber: 2.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Host Process for Windows Services
FileDescription: Host Process for Windows Services
FileVersion: 2.0.0.1
InternalName: Stubctborgfinrrrrrrrrrrrrrrr.exe
LegalCopyright:
OriginalFileName: Stubctborgfinrrrrrrrrrrrrrrr.exe
ProductName: Host Process for Windows Services
ProductVersion: 2.0.0.1
AssemblyVersion: 2.0.0.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
15
Malicious processes
11
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pegasus.exe no specs tempexplorer.exe tempspwak.exe no specs tempexplorer.exe no specs tempexplorersrv.exe no specs tempexplorersrvsrv.exe no specs wscript.exe no specs #RAMNIT iexplore.exe desktoplayer.exe no specs wscript.exe no specs desktoplayersrv.exe no specs iexplore.exe no specs desktoplayer.exe no specs wmpnscfg.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
564"C:\Users\admin\Desktop\Pegasus.exe" C:\Users\admin\Desktop\Pegasus.exeexplorer.exe
User:
admin
Company:
Host Process for Windows Services
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
2.0.0.1
Modules
Images
c:\users\admin\desktop\pegasus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1116C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrvSrv.exeC:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrvSrv.exeTempexplorerSrv.exe
User:
admin
Company:
SOFTWIN S.R.L.
Integrity Level:
MEDIUM
Description:
BitDefender Management Console
Exit code:
0
Version:
106.42.73.61
Modules
Images
c:\users\admin\appdata\local\temp\3582-490\tempexplorersrvsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1352C:\Users\admin\Microsoft\DesktopLayer.exeC:\Users\admin\Microsoft\DesktopLayer.exeTempexplorerSrv.exe
User:
admin
Company:
SOFTWIN S.R.L.
Integrity Level:
MEDIUM
Description:
BitDefender Management Console
Exit code:
0
Version:
106.42.73.61
Modules
Images
c:\users\admin\microsoft\desktoplayer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1556"C:\Users\admin\AppData\Local\Tempspwak.exe" C:\Users\admin\AppData\Local\Tempspwak.exePegasus.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\tempspwak.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1840"C:\Windows\System32\wscript.exe" C:\Users\admin\AppData\Local\Temp\75A1.tmp\splitterrypted.vbs C:\Windows\System32\wscript.exeTempexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1864"C:\Users\admin\AppData\Local\Tempexplorer.exe" C:\Users\admin\AppData\Local\Tempexplorer.exe
Pegasus.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\tempexplorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2424C:\Users\admin\Microsoft\DesktopLayerSrv.exeC:\Users\admin\Microsoft\DesktopLayerSrv.exeDesktopLayer.exe
User:
admin
Company:
SOFTWIN S.R.L.
Integrity Level:
MEDIUM
Description:
BitDefender Management Console
Exit code:
0
Version:
106.42.73.61
Modules
Images
c:\users\admin\microsoft\desktoplayersrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2532"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exeDesktopLayer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
4294967295
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2908"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe
TempexplorerSrvSrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
4294967295
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3028C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exeC:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exeTempexplorer.exe
User:
admin
Company:
SOFTWIN S.R.L.
Integrity Level:
MEDIUM
Description:
BitDefender Management Console
Exit code:
0
Version:
106.42.73.61
Modules
Images
c:\users\admin\appdata\local\temp\3582-490\tempexplorersrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
2 633
Read events
2 557
Write events
76
Delete events
0

Modification events

(PID) Process:(564) Pegasus.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(564) Pegasus.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(564) Pegasus.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(564) Pegasus.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1864) Tempexplorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1864) Tempexplorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1864) Tempexplorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1864) Tempexplorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1556) Tempspwak.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1556) Tempspwak.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
50
Suspicious files
87
Text files
2 054
Unknown types
0

Dropped files

PID
Process
Filename
Type
564Pegasus.exeC:\Users\admin\AppData\Local\Tempspwak.exeexecutable
MD5:D459AC27CDA1076AF5B93BA8A573B992
SHA256:C458B39EE9DACFECE49933E4CEAAEAB376448D8D56EB503EA519A8DF8323BCCB
1840wscript.exeC:\Users\admin\AppData\Local\VirtualStore\MSOCache.Cyborg Builder Ransomwaretext
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF
SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542
1840wscript.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C.Cyborg Builder Ransomwaretext
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF
SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542
564Pegasus.exeC:\Users\admin\AppData\Local\Tempexplorer.exeexecutable
MD5:17C1C348B518991C9335218BAB4C18D1
SHA256:BD2CFDC89AF135110E4CAAD2D40359F167FF7D77695C9BDB847F0BF2249EB7A1
1864Tempexplorer.exeC:\Users\admin\AppData\Local\Temp\3582-490\Tempexplorer.exeexecutable
MD5:A4D60B143B5FCC68F86B929D73D1880D
SHA256:7A55183D372C4645E8A31389D2813FA12C127389254B7412C225EC413C404044
3592Tempexplorer.exeC:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exeexecutable
MD5:47826F2614F1FA90601DC51E40D5C29E
SHA256:947D28E57A71AB35C91B6C3EFC01734191AC2A488985F2554AA5B980EE53F8BE
564Pegasus.exeC:\Users\admin\Desktop\SpLiTTer.Exeexecutable
MD5:1FCE09E3A00F05743C8DF2A198FEF3E4
SHA256:AD71B10395D14143396A634F54D8E1066C674B91EB8926952261802972F49093
1840wscript.exeC:\Users\admin\AppData\Local\VirtualStore\Documents and Settings.Cyborg Builder Ransomwaretext
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF
SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542
1840wscript.exeC:\MSOCache\All Users.Cyborg Builder Ransomwaretext
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF
SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542
1840wscript.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\branding.xml.Cyborg Builder Ransomwaretext
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF
SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
1
Threats
3

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
2908
iexplore.exe
142.250.186.46:80
GOOGLE
US
whitelisted
2908
iexplore.exe
34.175.230.209:443
fget-career.com
GOOGLE-CLOUD-PLATFORM
ES
unknown

DNS requests

Domain
IP
Reputation
fget-career.com
  • 34.175.230.209
unknown

Threats

PID
Process
Class
Message
2908
iexplore.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
2908
iexplore.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
1 ETPRO signatures available at the full report
No debug info