File name:

Pegasus.exe

Full analysis: https://app.any.run/tasks/46929ea1-7d7e-4054-98af-31554e893cc1
Verdict: Malicious activity
Threats:

Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.

Analysis date: December 02, 2023, 05:49:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ramnit
trojan
ransomware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

1FCE09E3A00F05743C8DF2A198FEF3E4

SHA1:

C39475C64560870C64182C50EF40E3F6D358A6B3

SHA256:

AD71B10395D14143396A634F54D8E1066C674B91EB8926952261802972F49093

SSDEEP:

24576:/QrtStGIg0nq5M/eEEPqf1934J2NaoJxHv5xr51xbPojJtddPRjiV2cA:qtStGIg0nq5M/FESf1934J2NaqHv5xre

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Pegasus.exe (PID: 564)
      • TempexplorerSrv.exe (PID: 3028)
      • Tempexplorer.exe (PID: 3592)
      • DesktopLayer.exe (PID: 1352)
      • Tempexplorer.exe (PID: 1864)
    • Signature: RAMNIT has been detected

      • TempexplorerSrv.exe (PID: 3028)
      • TempexplorerSrvSrv.exe (PID: 1116)
      • Tempexplorer.exe (PID: 3592)
      • DesktopLayerSrv.exe (PID: 2424)
      • iexplore.exe (PID: 2908)
      • iexplore.exe (PID: 2532)
      • DesktopLayer.exe (PID: 1352)
      • DesktopLayer.exe (PID: 3892)
    • Changes the login/logoff helper path in the registry

      • iexplore.exe (PID: 2908)
    • RAMNIT has been detected (SURICATA)

      • iexplore.exe (PID: 2908)
    • Connects to the CnC server

      • iexplore.exe (PID: 2908)
    • Renames files like ransomware

      • Pegasus.exe (PID: 564)
    • Actions looks like stealing of personal data

      • Tempexplorer.exe (PID: 1864)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • Tempexplorer.exe (PID: 1864)
      • Pegasus.exe (PID: 564)
      • wscript.exe (PID: 1840)
    • Reads the Internet Settings

      • Pegasus.exe (PID: 564)
      • Tempexplorer.exe (PID: 1864)
      • Tempexplorer.exe (PID: 3592)
      • Tempspwak.exe (PID: 1556)
    • The process checks if it is being run in the virtual environment

      • Pegasus.exe (PID: 564)
    • The process executes VB scripts

      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 3592)
    • Starts itself from another location

      • DesktopLayerSrv.exe (PID: 2424)
      • TempexplorerSrv.exe (PID: 3028)
    • Gets the drive type (SCRIPT)

      • wscript.exe (PID: 1840)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 1840)
    • Gets a collection of all available drive names (SCRIPT)

      • wscript.exe (PID: 1840)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 1840)
  • INFO

    • Reads the computer name

      • Pegasus.exe (PID: 564)
      • Tempexplorer.exe (PID: 1864)
      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 3592)
      • wmpnscfg.exe (PID: 3276)
    • Checks supported languages

      • Pegasus.exe (PID: 564)
      • Tempexplorer.exe (PID: 1864)
      • TempexplorerSrv.exe (PID: 3028)
      • TempexplorerSrvSrv.exe (PID: 1116)
      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 3592)
      • DesktopLayerSrv.exe (PID: 2424)
      • DesktopLayer.exe (PID: 3892)
      • DesktopLayer.exe (PID: 1352)
      • wmpnscfg.exe (PID: 3276)
    • Reads the machine GUID from the registry

      • Pegasus.exe (PID: 564)
    • Creates files or folders in the user directory

      • Pegasus.exe (PID: 564)
    • Create files in a temporary directory

      • Tempexplorer.exe (PID: 1864)
      • Tempspwak.exe (PID: 1556)
      • Tempexplorer.exe (PID: 3592)
      • TempexplorerSrv.exe (PID: 3028)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3276)
      • explorer.exe (PID: 3972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (55.8)
.exe | Win64 Executable (generic) (21)
.scr | Windows screen saver (9.9)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:10:28 04:49:33+01:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 697856
InitializedDataSize: 18432
UninitializedDataSize: -
EntryPoint: 0xac3fe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.0.0.1
ProductVersionNumber: 2.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Host Process for Windows Services
FileDescription: Host Process for Windows Services
FileVersion: 2.0.0.1
InternalName: Stubctborgfinrrrrrrrrrrrrrrr.exe
LegalCopyright:
OriginalFileName: Stubctborgfinrrrrrrrrrrrrrrr.exe
ProductName: Host Process for Windows Services
ProductVersion: 2.0.0.1
AssemblyVersion: 2.0.0.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
54
Monitored processes
15
Malicious processes
11
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pegasus.exe no specs tempexplorer.exe tempspwak.exe no specs tempexplorer.exe no specs tempexplorersrv.exe no specs tempexplorersrvsrv.exe no specs wscript.exe no specs #RAMNIT iexplore.exe desktoplayer.exe no specs wscript.exe no specs desktoplayersrv.exe no specs iexplore.exe no specs desktoplayer.exe no specs wmpnscfg.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
564"C:\Users\admin\Desktop\Pegasus.exe" C:\Users\admin\Desktop\Pegasus.exeexplorer.exe
User:
admin
Company:
Host Process for Windows Services
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
2.0.0.1
Modules
Images
c:\users\admin\desktop\pegasus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1116C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrvSrv.exeC:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrvSrv.exeTempexplorerSrv.exe
User:
admin
Company:
SOFTWIN S.R.L.
Integrity Level:
MEDIUM
Description:
BitDefender Management Console
Exit code:
0
Version:
106.42.73.61
Modules
Images
c:\users\admin\appdata\local\temp\3582-490\tempexplorersrvsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1352C:\Users\admin\Microsoft\DesktopLayer.exeC:\Users\admin\Microsoft\DesktopLayer.exeTempexplorerSrv.exe
User:
admin
Company:
SOFTWIN S.R.L.
Integrity Level:
MEDIUM
Description:
BitDefender Management Console
Exit code:
0
Version:
106.42.73.61
Modules
Images
c:\users\admin\microsoft\desktoplayer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1556"C:\Users\admin\AppData\Local\Tempspwak.exe" C:\Users\admin\AppData\Local\Tempspwak.exePegasus.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\tempspwak.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1840"C:\Windows\System32\wscript.exe" C:\Users\admin\AppData\Local\Temp\75A1.tmp\splitterrypted.vbs C:\Windows\System32\wscript.exeTempexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1864"C:\Users\admin\AppData\Local\Tempexplorer.exe" C:\Users\admin\AppData\Local\Tempexplorer.exe
Pegasus.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\tempexplorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2424C:\Users\admin\Microsoft\DesktopLayerSrv.exeC:\Users\admin\Microsoft\DesktopLayerSrv.exeDesktopLayer.exe
User:
admin
Company:
SOFTWIN S.R.L.
Integrity Level:
MEDIUM
Description:
BitDefender Management Console
Exit code:
0
Version:
106.42.73.61
Modules
Images
c:\users\admin\microsoft\desktoplayersrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2532"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exeDesktopLayer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
4294967295
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2908"C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe
TempexplorerSrvSrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
4294967295
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3028C:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exeC:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exeTempexplorer.exe
User:
admin
Company:
SOFTWIN S.R.L.
Integrity Level:
MEDIUM
Description:
BitDefender Management Console
Exit code:
0
Version:
106.42.73.61
Modules
Images
c:\users\admin\appdata\local\temp\3582-490\tempexplorersrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
2 633
Read events
2 557
Write events
76
Delete events
0

Modification events

(PID) Process:(564) Pegasus.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(564) Pegasus.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(564) Pegasus.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(564) Pegasus.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1864) Tempexplorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1864) Tempexplorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1864) Tempexplorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1864) Tempexplorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1556) Tempspwak.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1556) Tempspwak.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
50
Suspicious files
87
Text files
2 054
Unknown types
0

Dropped files

PID
Process
Filename
Type
564Pegasus.exeC:\Users\admin\Desktop\SpLiTTer.Exeexecutable
MD5:1FCE09E3A00F05743C8DF2A198FEF3E4
SHA256:AD71B10395D14143396A634F54D8E1066C674B91EB8926952261802972F49093
1556Tempspwak.exeC:\Users\admin\AppData\Local\Temp\7563.tmp\spwak.vbstext
MD5:E9FFD9F618CBF36AD6C910C161BB8080
SHA256:020CA4B4574A40418B8AA4C2D74B0488E9D150E8D3F5E56E5C6DCCA6F7DFAAAC
3028TempexplorerSrv.exeC:\Users\admin\Microsoft\DesktopLayer.exeexecutable
MD5:47826F2614F1FA90601DC51E40D5C29E
SHA256:947D28E57A71AB35C91B6C3EFC01734191AC2A488985F2554AA5B980EE53F8BE
564Pegasus.exeC:\Users\admin\AppData\Local\Tempexplorer.exeexecutable
MD5:17C1C348B518991C9335218BAB4C18D1
SHA256:BD2CFDC89AF135110E4CAAD2D40359F167FF7D77695C9BDB847F0BF2249EB7A1
3592Tempexplorer.exeC:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrv.exeexecutable
MD5:47826F2614F1FA90601DC51E40D5C29E
SHA256:947D28E57A71AB35C91B6C3EFC01734191AC2A488985F2554AA5B980EE53F8BE
3592Tempexplorer.exeC:\Users\admin\AppData\Local\Temp\75A1.tmp\splitterrypted.vbsbinary
MD5:95101AC14DF74FA38272D4E32BA938D4
SHA256:B7CE475D2191BE4C4CF75936D3BF3FDC6F973D4C948F86F92A854DEE52DB103B
1840wscript.exeC:\MSOCache\All Users.Cyborg Builder Ransomwaretext
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF
SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542
3028TempexplorerSrv.exeC:\Users\admin\AppData\Local\Temp\3582-490\TempexplorerSrvSrv.exeexecutable
MD5:FF5E1F27193CE51EEC318714EF038BEF
SHA256:FD6C69C345F1E32924F0A5BB7393E191B393A78D58E2C6413B03CED7482F2320
1840wscript.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccessMUI.msi.Cyborg Builder Ransomwaretext
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF
SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542
1840wscript.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccessMUI.xml.Cyborg Builder Ransomwaretext
MD5:5E7F31B8864DAF89BE5CE3EA61ED72DF
SHA256:EDC8D36C2DEDF83DA5CA164C40B22D0299C2407133F5024C759B36E7F06DC542
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
1
Threats
3

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
2908
iexplore.exe
142.250.186.46:80
GOOGLE
US
whitelisted
2908
iexplore.exe
34.175.230.209:443
fget-career.com
GOOGLE-CLOUD-PLATFORM
ES
unknown

DNS requests

Domain
IP
Reputation
fget-career.com
  • 34.175.230.209
unknown

Threats

PID
Process
Class
Message
2908
iexplore.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
2908
iexplore.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/Ramnit Checkin
1 ETPRO signatures available at the full report
No debug info