analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Remcos247_8898.zip

Full analysis: https://app.any.run/tasks/d1ebe4bd-6a05-4e69-9dd2-ea70fba12fc2
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: February 22, 2020, 13:22:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
keylogger
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract
MD5:

7049843CADC6A50BD7A463DC094E96A2

SHA1:

026DADB534D3FF21D8DED48BAC5E8519A5FB70C9

SHA256:

C3D7604BA3F4F1D14C7138AEE56671351BE85056A0741611DA6F5B22DD266C43

SSDEEP:

384:LqeG6lI9Ft6uB8gJWJLl+LMSzKyaTFv8nhGyNv2GK2+ydCK/:LdlI7JBNJA+LMSzhapyvK2+hK/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Remcos247_8898.exe (PID: 1780)
      • Remcos247_8898.exe (PID: 3120)
    • REMCOS was detected

      • Remcos247_8898.exe (PID: 3120)
    • Changes settings of System certificates

      • Remcos247_8898.exe (PID: 3120)
  • SUSPICIOUS

    • Application launched itself

      • Remcos247_8898.exe (PID: 1780)
    • Reads Internet Cache Settings

      • Remcos247_8898.exe (PID: 3120)
    • Creates files in the user directory

      • Remcos247_8898.exe (PID: 3120)
    • Writes files like Keylogger logs

      • Remcos247_8898.exe (PID: 3120)
    • Connects to unusual port

      • Remcos247_8898.exe (PID: 3120)
    • Adds / modifies Windows certificates

      • Remcos247_8898.exe (PID: 3120)
  • INFO

    • Manual execution by user

      • Remcos247_8898.exe (PID: 1780)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2020:02:19 19:21:27
ZipCRC: 0x352d6ebb
ZipCompressedSize: 19592
ZipUncompressedSize: 53248
ZipFileName: Remcos247_8898.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs remcos247_8898.exe no specs #REMCOS remcos247_8898.exe

Process information

PID
CMD
Path
Indicators
Parent process
2636"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Remcos247_8898.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1780"C:\Users\admin\Desktop\Remcos247_8898.exe" C:\Users\admin\Desktop\Remcos247_8898.exeexplorer.exe
User:
admin
Company:
Chromogeni
Integrity Level:
MEDIUM
Description:
levera
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\desktop\remcos247_8898.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3120"C:\Users\admin\Desktop\Remcos247_8898.exe" C:\Users\admin\Desktop\Remcos247_8898.exe
Remcos247_8898.exe
User:
admin
Company:
Chromogeni
Integrity Level:
MEDIUM
Description:
levera
Version:
1.00
Modules
Images
c:\windows\system32\msvbvm60.dll
c:\users\admin\desktop\remcos247_8898.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
4 016
Read events
449
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
6
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
2636WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2636.28575\Remcos247_8898.exe
MD5:
SHA256:
3120Remcos247_8898.exeC:\Users\admin\AppData\Local\Temp\Cab42A.tmp
MD5:
SHA256:
3120Remcos247_8898.exeC:\Users\admin\AppData\Local\Temp\Tar42B.tmp
MD5:
SHA256:
3120Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_375B7F179C25C4C237293A604A6DE85Cder
MD5:FE390189A4CF6F11012F41B3EFFFEBEC
SHA256:3FF86D9812DFC9B0799D40AB47FAEB3C6AAA0328A353F2D00A11489E9C3C7234
3120Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bder
MD5:E550DA03AEE5B546B436CD553D3233B9
SHA256:9ABFD4E29B96CCA442502B1DE6071FE0293455DF22B4EFF19FA3E6DF060947E7
3120Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_BB0C5663DC1B03008FBAAE98EFD0C044binary
MD5:792EF520C1B848D8FAEB760C06C8FEF8
SHA256:40AB74A1BE532FD8E29DB6658EC12C2AB08947A460B0C9DAA8DE1FC71BF44AF9
3120Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_375B7F179C25C4C237293A604A6DE85Cbinary
MD5:179B58E4D9D8FC84C9066CA03B779B96
SHA256:482FFEA331582DE6A6E4AF9ADF248E3528AD138E8062EE55077A69372516C43D
3120Remcos247_8898.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:E5F95B4C79A96E9F37E49C712F52DF01
SHA256:FA6A1A3EE78F53B81DFCE496EF3612780CD99D35750C93DAD7B4463FD0FD06CD
3120Remcos247_8898.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\U2815OK4.txttext
MD5:562C73B53E89E1E95CE74D041CB10BBE
SHA256:CB9B9BC9AA865C0B64FDA48F8A6F23FC47C5AD5DED2ABFB3F8D9E6DFA3B24B00
3120Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_BB0C5663DC1B03008FBAAE98EFD0C044der
MD5:AA35018EA1C744AD1AD7906DBAD27A58
SHA256:6A70A8493C47EDD3CD1ED95CA3CF43B8C4885F69CE70EA8351D5B8AAFAAF6984
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
54
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3120
Remcos247_8898.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
3120
Remcos247_8898.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEA%2Fh3wHkYFwrCAAAAAAucVw%3D
US
der
471 b
whitelisted
3120
Remcos247_8898.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDu3mVgzTXArwIAAAAAWXG3
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3120
Remcos247_8898.exe
172.217.23.174:443
drive.google.com
Google Inc.
US
whitelisted
3120
Remcos247_8898.exe
172.217.16.161:443
doc-0s-7s-docs.googleusercontent.com
Google Inc.
US
whitelisted
3120
Remcos247_8898.exe
172.217.16.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3120
Remcos247_8898.exe
185.244.30.16:8484
remcos247.ddns.net
malicious

DNS requests

Domain
IP
Reputation
drive.google.com
  • 172.217.23.174
shared
ocsp.pki.goog
  • 172.217.16.131
whitelisted
doc-0s-7s-docs.googleusercontent.com
  • 172.217.16.161
shared
remcos247.ddns.net
  • 185.244.30.16
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
No debug info