| File name: | ragent.exe |
| Full analysis: | https://app.any.run/tasks/db6811b7-8ad0-45a8-a2f2-c96a65301053 |
| Verdict: | Suspicious activity |
| Analysis date: | July 12, 2019, 19:08:09 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386, for MS Windows |
| MD5: | 021E5BC6237721DD631267A710C6A07B |
| SHA1: | 6BDBE6C23971BFE8AE7DD7CF3848B32277C4FB28 |
| SHA256: | D437E640E98C85F671971A16573D2DA5DA1D7B1FC6D5D176E6DBE2D48CD53964 |
| SSDEEP: | 98304:sQMbhS7W3s2v3CCPl89FZws8sGz5TjQ/VLONcYlCzBHtJMuOh0XCojwVh3225ZYq:3+h3xPl8sQNQc7qZofXlfnfNcZh |
| .ax | | | DirectShow filter (46.4) |
|---|---|---|
| .exe | | | Win32 EXE PECompact compressed (generic) (9.5) |
| .exe | | | Win32 Executable MS Visual C++ (generic) (7.1) |
| .exe | | | Win64 Executable (generic) (6.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:05:17 03:21:34+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 49664 |
| InitializedDataSize: | 16504320 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3209 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows command line |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_CUI |
| Compilation Date: | 17-May-2016 01:21:34 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000D0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 17-May-2016 01:21:34 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0000C148 | 0x0000C200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.45897 |
.rdata | 0x0000E000 | 0x000024F6 | 0x00002600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.76648 |
.data | 0x00011000 | 0x00004034 | 0x00002000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.37704 |
.rsrc | 0x00016000 | 0x00FB7FE8 | 0x00FB8000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.43392 |
.reloc | 0x00FCE000 | 0x00000EAE | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.70597 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
AGENT.CRT | 5.90276 | 1172 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
AGENT.KEY | 6.01757 | 1679 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
AGENTJOB.CRT | 5.91321 | 1155 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
AGENTJOB.KEY | 6.02558 | 1679 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
APP.PY | 5.21834 | 52033 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
BOOTSTRAP.PY | 4.83924 | 2651 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
COBRA.ZIP | 5.15492 | 267807 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
MSGPACK.ZIP | 4.87168 | 119663 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
MSVCR100.DLL | 6.90157 | 773968 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
PERSISTENT_SVC.PY | 4.65473 | 41511 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
KERNEL32.dll |
SHLWAPI.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2244 | C:\Windows\system32\netsh.exe advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=out name="ragent.exe" program="C:\Users\admin\AppData\Local\Temp\ragent.exe" | C:\Windows\system32\netsh.exe | — | ragent.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3120 | C:\Windows\system32\netsh.exe advfirewall firewall delete rule profile=any name="ragent.exe" | C:\Windows\system32\netsh.exe | — | ragent.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3592 | "C:\Users\admin\AppData\Local\Temp\ragent.exe" | C:\Users\admin\AppData\Local\Temp\ragent.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-100 |
Value: DHCP Quarantine Enforcement Client | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-101 |
Value: Provides DHCP based enforcement for NAP | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-103 |
Value: 1.0 | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-102 |
Value: Microsoft Corporation | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-1 |
Value: IPsec Relying Party | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-2 |
Value: Provides IPsec based enforcement for Network Access Protection | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-4 |
Value: 1.0 | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-3 |
Value: Microsoft Corporation | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\tsgqec.dll,-100 |
Value: RD Gateway Quarantine Enforcement Client | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\AGENTJOB.KEY | text | |
MD5:10D715FA46E69A6C13300CAADFD09C91 | SHA256:1C8E063AADE2B4B559123A59942BA4B5A60953A415DAE7AF0ABA043454C49CEB | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\AGENTJOB.CRT | text | |
MD5:5537087DBD25FD511EB7EF9D6E0A013C | SHA256:E7E148394465D184CA847876158F236C5436A9FB56377BA6A4BB97E62DD3DFC7 | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\COBRA.ZIP | compressed | |
MD5:FB22843BD781BA1613321005F7E2375C | SHA256:C8F9B697724D1401851A33D6D3BB87ABD5E42ADE489A2E166FE52DC2F76CCA3D | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\MSVCR100.DLL | executable | |
MD5:BF38660A9125935658CFA3E53FDC7D65 | SHA256:60C06E0FA4449314DA3A0A87C1A9D9577DF99226F943637E06F61188E5862EFA | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\BOOTSTRAP.PY | text | |
MD5:6CF214E5FFD35E95E791832FA10D3A6D | SHA256:CC40D53EF812E593A403541E628E55C72FAEDB341128622712D73E0B1B4D6AA4 | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\SELECT.PYD | executable | |
MD5:852DBEC2F37803A15A6D4181F6CEC1A2 | SHA256:FB1028C9EA5EBF6B134AE24EF63E0462F7082B2D7E196DD27C59DC01DB6ECBEE | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\AGENT.KEY | text | |
MD5:E49E8848D77D6987DC9220ADC333B007 | SHA256:256E92A626117B2AC0A3968048357920BEC6F73568196E3A44E8E34AD992B0CA | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\PYTHON3.DLL | executable | |
MD5:3C5E46FEA528BD0D71C8AFEF48F46EA1 | SHA256:EBAAF8E81823924A696BB67BFE5F8D8E91FA5D5729F49847010E47B68BE734AC | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\SVCMAIN64.EXE | executable | |
MD5:550E817D4E0ED525266B504245E62AC3 | SHA256:F612489D95BF881469BB6D91639581558B29B40CF012DC1A3EFD20820BAF5B6B | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\PYEXPAT.PYD | executable | |
MD5:2612F2179FAEEA2184CF59A1CE11FBF3 | SHA256:08FD8CB71A88B912DC8156A62C5552154E7CCD17547BE0A245701B6EEC581D5A | |||