| File name: | Pegasus.exe |
| Full analysis: | https://app.any.run/tasks/46929ea1-7d7e-4054-98af-31554e893cc1 |
| Verdict: | Malicious activity |
| Threats: | Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud. |
| Analysis date: | December 02, 2023, 05:49:14 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 1FCE09E3A00F05743C8DF2A198FEF3E4 |
| SHA1: | C39475C64560870C64182C50EF40E3F6D358A6B3 |
| SHA256: | AD71B10395D14143396A634F54D8E1066C674B91EB8926952261802972F49093 |
| SSDEEP: | 24576:/QrtStGIg0nq5M/eEEPqf1934J2NaoJxHv5xr51xbPojJtddPRjiV2cA:qtStGIg0nq5M/FESf1934J2NaqHv5xre |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (55.8) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (21) |
| .scr | | | Windows screen saver (9.9) |
| .dll | | | Win32 Dynamic Link Library (generic) (5) |
| .exe | | | Win32 Executable (generic) (3.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:10:28 04:49:33+01:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 697856 |
| InitializedDataSize: | 18432 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xac3fe |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.0.0.1 |
| ProductVersionNumber: | 2.0.0.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | Host Process for Windows Services |
| FileDescription: | Host Process for Windows Services |
| FileVersion: | 2.0.0.1 |
| InternalName: | Stubctborgfinrrrrrrrrrrrrrrr.exe |
| LegalCopyright: | |
| OriginalFileName: | Stubctborgfinrrrrrrrrrrrrrrr.exe |
| ProductName: | Host Process for Windows Services |
| ProductVersion: | 2.0.0.1 |
| AssemblyVersion: | 2.0.0.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 564 | "C:\Users\admin\Desktop\Pegasus.exe" | C:\Users\admin\Desktop\Pegasus.exe | — | explorer.exe | |||||||||||
User: admin Company: Host Process for Windows Services Integrity Level: MEDIUM Description: Host Process for Windows Services Exit code: 0 Version: 2.0.0.1 Modules
| |||||||||||||||
| 1116 | C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrvSrv.exe | C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrvSrv.exe | — | TempexplorerSrv.exe | |||||||||||
User: admin Company: SOFTWIN S.R.L. Integrity Level: MEDIUM Description: BitDefender Management Console Exit code: 0 Version: 106.42.73.61 Modules
| |||||||||||||||
| 1352 | C:\Users\admin\Microsoft\DesktopLayer.exe | C:\Users\admin\Microsoft\DesktopLayer.exe | — | TempexplorerSrv.exe | |||||||||||
User: admin Company: SOFTWIN S.R.L. Integrity Level: MEDIUM Description: BitDefender Management Console Exit code: 0 Version: 106.42.73.61 Modules
| |||||||||||||||
| 1556 | "C:\Users\admin\AppData\Local\Tempspwak.exe" | C:\Users\admin\AppData\Local\Tempspwak.exe | — | Pegasus.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1840 | "C:\Windows\System32\wscript.exe" C:\Users\admin\AppData\Local\Temp\75A1.tmp\splitterrypted.vbs | C:\Windows\System32\wscript.exe | — | Tempexplorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 1864 | "C:\Users\admin\AppData\Local\Tempexplorer.exe" | C:\Users\admin\AppData\Local\Tempexplorer.exe | Pegasus.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2424 | C:\Users\admin\Microsoft\DesktopLayerSrv.exe | C:\Users\admin\Microsoft\DesktopLayerSrv.exe | — | DesktopLayer.exe | |||||||||||
User: admin Company: SOFTWIN S.R.L. Integrity Level: MEDIUM Description: BitDefender Management Console Exit code: 0 Version: 106.42.73.61 Modules
| |||||||||||||||
| 2532 | "C:\Program Files\Internet Explorer\iexplore.exe" | C:\Program Files\Internet Explorer\iexplore.exe | — | DesktopLayer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 4294967295 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 2908 | "C:\Program Files\Internet Explorer\iexplore.exe" | C:\Program Files\Internet Explorer\iexplore.exe | TempexplorerSrvSrv.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 4294967295 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 3028 | C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exe | C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exe | — | Tempexplorer.exe | |||||||||||
User: admin Company: SOFTWIN S.R.L. Integrity Level: MEDIUM Description: BitDefender Management Console Exit code: 0 Version: 106.42.73.61 Modules
| |||||||||||||||
| (PID) Process: | (564) Pegasus.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (564) Pegasus.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (564) Pegasus.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (564) Pegasus.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1864) Tempexplorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1864) Tempexplorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1864) Tempexplorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1864) Tempexplorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1556) Tempspwak.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1556) Tempspwak.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 564 | Pegasus.exe | C:\Users\admin\AppData\Local\Tempspwak.exe | executable | |
MD5:D459AC27CDA1076AF5B93BA8A573B992 | SHA256:C458B39EE9DACFECE49933E4CEAAEAB376448D8D56EB503EA519A8DF8323BCCB | |||
| 1840 | wscript.exe | C:\Users\admin\AppData\Local\VirtualStore\MSOCache.Cyborg Builder Ransomware | text | |
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF | SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542 | |||
| 1840 | wscript.exe | C:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C.Cyborg Builder Ransomware | text | |
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF | SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542 | |||
| 564 | Pegasus.exe | C:\Users\admin\AppData\Local\Tempexplorer.exe | executable | |
MD5:17C1C348B518991C9335218BAB4C18D1 | SHA256:BD2CFDC89AF135110E4CAAD2D40359F167FF7D77695C9BDB847F0BF2249EB7A1 | |||
| 1864 | Tempexplorer.exe | C:\Users\admin\AppData\Local\Temp\3582-490\Tempexplorer.exe | executable | |
MD5:A4D60B143B5FCC68F86B929D73D1880D | SHA256:7A55183D372C4645E8A31389D2813FA12C127389254B7412C225EC413C404044 | |||
| 3592 | Tempexplorer.exe | C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exe | executable | |
MD5:47826F2614F1FA90601DC51E40D5C29E | SHA256:947D28E57A71AB35C91B6C3EFC01734191AC2A488985F2554AA5B980EE53F8BE | |||
| 564 | Pegasus.exe | C:\Users\admin\Desktop\SpLiTTer.Exe | executable | |
MD5:1FCE09E3A00F05743C8DF2A198FEF3E4 | SHA256:AD71B10395D14143396A634F54D8E1066C674B91EB8926952261802972F49093 | |||
| 1840 | wscript.exe | C:\Users\admin\AppData\Local\VirtualStore\Documents and Settings.Cyborg Builder Ransomware | text | |
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF | SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542 | |||
| 1840 | wscript.exe | C:\MSOCache\All Users.Cyborg Builder Ransomware | text | |
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF | SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542 | |||
| 1840 | wscript.exe | C:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\branding.xml.Cyborg Builder Ransomware | text | |
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF | SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2908 | iexplore.exe | 142.250.186.46:80 | — | GOOGLE | US | whitelisted |
2908 | iexplore.exe | 34.175.230.209:443 | fget-career.com | GOOGLE-CLOUD-PLATFORM | ES | unknown |
Domain | IP | Reputation |
|---|---|---|
fget-career.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2908 | iexplore.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Ramnit Checkin |
2908 | iexplore.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/Ramnit Checkin |