| File name: | ragent.exe |
| Full analysis: | https://app.any.run/tasks/db6811b7-8ad0-45a8-a2f2-c96a65301053 |
| Verdict: | Suspicious activity |
| Analysis date: | July 12, 2019, 19:08:09 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386, for MS Windows |
| MD5: | 021E5BC6237721DD631267A710C6A07B |
| SHA1: | 6BDBE6C23971BFE8AE7DD7CF3848B32277C4FB28 |
| SHA256: | D437E640E98C85F671971A16573D2DA5DA1D7B1FC6D5D176E6DBE2D48CD53964 |
| SSDEEP: | 98304:sQMbhS7W3s2v3CCPl89FZws8sGz5TjQ/VLONcYlCzBHtJMuOh0XCojwVh3225ZYq:3+h3xPl8sQNQc7qZofXlfnfNcZh |
| .ax | | | DirectShow filter (46.4) |
|---|---|---|
| .exe | | | Win32 EXE PECompact compressed (generic) (9.5) |
| .exe | | | Win32 Executable MS Visual C++ (generic) (7.1) |
| .exe | | | Win64 Executable (generic) (6.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:05:17 03:21:34+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 49664 |
| InitializedDataSize: | 16504320 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3209 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows command line |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_CUI |
| Compilation Date: | 17-May-2016 01:21:34 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000D0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 17-May-2016 01:21:34 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0000C148 | 0x0000C200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.45897 |
.rdata | 0x0000E000 | 0x000024F6 | 0x00002600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.76648 |
.data | 0x00011000 | 0x00004034 | 0x00002000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.37704 |
.rsrc | 0x00016000 | 0x00FB7FE8 | 0x00FB8000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.43392 |
.reloc | 0x00FCE000 | 0x00000EAE | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.70597 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
AGENT.CRT | 5.90276 | 1172 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
AGENT.KEY | 6.01757 | 1679 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
AGENTJOB.CRT | 5.91321 | 1155 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
AGENTJOB.KEY | 6.02558 | 1679 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
APP.PY | 5.21834 | 52033 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
BOOTSTRAP.PY | 4.83924 | 2651 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
COBRA.ZIP | 5.15492 | 267807 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
MSGPACK.ZIP | 4.87168 | 119663 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
MSVCR100.DLL | 6.90157 | 773968 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
PERSISTENT_SVC.PY | 4.65473 | 41511 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
KERNEL32.dll |
SHLWAPI.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2244 | C:\Windows\system32\netsh.exe advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=out name="ragent.exe" program="C:\Users\admin\AppData\Local\Temp\ragent.exe" | C:\Windows\system32\netsh.exe | — | ragent.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3120 | C:\Windows\system32\netsh.exe advfirewall firewall delete rule profile=any name="ragent.exe" | C:\Windows\system32\netsh.exe | — | ragent.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3592 | "C:\Users\admin\AppData\Local\Temp\ragent.exe" | C:\Users\admin\AppData\Local\Temp\ragent.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-100 |
Value: DHCP Quarantine Enforcement Client | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-101 |
Value: Provides DHCP based enforcement for NAP | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-103 |
Value: 1.0 | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-102 |
Value: Microsoft Corporation | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-1 |
Value: IPsec Relying Party | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-2 |
Value: Provides IPsec based enforcement for Network Access Protection | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-4 |
Value: 1.0 | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\napipsec.dll,-3 |
Value: Microsoft Corporation | |||
| (PID) Process: | (3120) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\tsgqec.dll,-100 |
Value: RD Gateway Quarantine Enforcement Client | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\PYTHON-3.4.4.ZIP | compressed | |
MD5:987E60BBBBD315BFA46C609D15E3A022 | SHA256:F5DE3C6C470A1508538BBC4272EDF3AC60E762794741F0212BEED815BFD43A34 | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\MSGPACK.ZIP | compressed | |
MD5:67DC57651EFD47CBB613157B8DA002A1 | SHA256:83BCA67DDEDE53F306742976D35B139557171B26D3D8B260C5F1E97135C35501 | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\COBRA.ZIP | compressed | |
MD5:FB22843BD781BA1613321005F7E2375C | SHA256:C8F9B697724D1401851A33D6D3BB87ABD5E42ADE489A2E166FE52DC2F76CCA3D | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\PERSISTENT_SVC.PY | text | |
MD5:8224D68F9932AC1E60909A4454571B55 | SHA256:24DBFC8E91ED1688DE3FE86F81DA2798AC4121909E9ACBB39EAD6D7354904AC2 | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\MSVCR100.DLL | executable | |
MD5:BF38660A9125935658CFA3E53FDC7D65 | SHA256:60C06E0FA4449314DA3A0A87C1A9D9577DF99226F943637E06F61188E5862EFA | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\PYEXPAT.PYD | executable | |
MD5:2612F2179FAEEA2184CF59A1CE11FBF3 | SHA256:08FD8CB71A88B912DC8156A62C5552154E7CCD17547BE0A245701B6EEC581D5A | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\SQLITE3.DLL | executable | |
MD5:05F21195402682826EC45D9636B67911 | SHA256:D3D2E440228DA2F6D02704E059429ADD254EE7B32014293D8CA8984A5CD64097 | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\APP.PY | text | |
MD5:81D9F010B52D3FE070EE8068EEAECFAA | SHA256:0DD79D25918BCFBA169F63B1141E4007A645B04C9B03752AD2C1D0FDD16981C8 | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\PYTHON34.DLL | executable | |
MD5:375205939CFAEC8F30DD2C3637222707 | SHA256:10F88552718636E946E66E290B85259E7F527D987698E2DCC86686EBE82825CA | |||
| 3592 | ragent.exe | C:\Users\admin\AppData\Local\Temp\SVCMAIN64.EXE | executable | |
MD5:550E817D4E0ED525266B504245E62AC3 | SHA256:F612489D95BF881469BB6D91639581558B29B40CF012DC1A3EFD20820BAF5B6B | |||