| File name: | d51b3625115680dc3d6e0f5881f914f0373a277e2ef2ec56c88c3f45de997877 |
| Full analysis: | https://app.any.run/tasks/747bbc74-dc0c-46c8-b24f-c24a7b18b4f0 |
| Verdict: | Malicious activity |
| Threats: | Remcos is a commercially distributed remote administration and surveillance tool that has been widely observed in unauthorized deployments, where threat actors use it to perform remote actions on compromised machines. It is actively maintained by its vendor, with new versions and feature updates released on a frequent, near-monthly basis. |
| Analysis date: | January 11, 2025, 00:34:32 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | 5F38EDF8C588EFD365F6C82C92D5F0F6 |
| SHA1: | 6F8EC411858B7410A22401F6C9D6A2A5C45AAA9B |
| SHA256: | D51B3625115680DC3D6E0F5881F914F0373A277E2EF2EC56C88C3F45DE997877 |
| SSDEEP: | 49152:BHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZ7:OAGQX21RBt7QjTmcaTH/vU4do9Pcjq1f |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:12:16 00:59:40+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 12 |
| CodeSize: | 581120 |
| InitializedDataSize: | 769536 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x27dcd |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (British) |
| CharacterSet: | Unicode |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 6200 | "C:\Users\admin\AppData\Local\Temp\d51b3625115680dc3d6e0f5881f914f0373a277e2ef2ec56c88c3f45de997877.exe" | C:\Users\admin\AppData\Local\Temp\d51b3625115680dc3d6e0f5881f914f0373a277e2ef2ec56c88c3f45de997877.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 6252 | "C:\Users\admin\AppData\Local\Temp\d51b3625115680dc3d6e0f5881f914f0373a277e2ef2ec56c88c3f45de997877.exe" | C:\Users\admin\AppData\Local\miaou\derogates.exe | d51b3625115680dc3d6e0f5881f914f0373a277e2ef2ec56c88c3f45de997877.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 Modules
| |||||||||||||||
| 6280 | "C:\Users\admin\AppData\Local\Temp\d51b3625115680dc3d6e0f5881f914f0373a277e2ef2ec56c88c3f45de997877.exe" | C:\Windows\SysWOW64\svchost.exe | — | derogates.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
| 6464 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6252 -s 764 | C:\Windows\SysWOW64\WerFault.exe | derogates.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6464 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_derogates.exe_568691e79a443fa7a8a6b049068b7cb2d908b_8085ab80_3cb43630-9b56-46ae-8bcf-d24ee9117360\Report.wer | — | |
MD5:— | SHA256:— | |||
| 6464 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER5DD3.tmp.dmp | binary | |
MD5:DE69B2CF4F6B1B25F00E54CDEEE92AAE | SHA256:1AA51F72B08B5FCEBA91507D3F20484E48A8B419202CCD3B96D785950B23EB50 | |||
| 6252 | derogates.exe | C:\Users\admin\AppData\Local\Temp\aut58D1.tmp | binary | |
MD5:7A6DFA9FB95E532AD4BDB953FD850322 | SHA256:20545ED762F57FD5FA696DF46CB11D46407D0E20050A179BA4517E07F5C7F538 | |||
| 6200 | d51b3625115680dc3d6e0f5881f914f0373a277e2ef2ec56c88c3f45de997877.exe | C:\Users\admin\AppData\Local\Temp\cerecloths | binary | |
MD5:1FEEC4959309F93B31ED96BB1C991A90 | SHA256:B9E8C2EE4BEC14965B15F8E28FCE1BA98C3BBD412BCDE16DCE424D1698DF3132 | |||
| 6464 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F3B.tmp.WERInternalMetadata.xml | xml | |
MD5:F6FFF492B09AC90B5A2B9E414F4EF2AA | SHA256:4D0C80CB53968537A552E5E478DE6D8966D6F2C560686635DC4E1F39FA66B0D1 | |||
| 6200 | d51b3625115680dc3d6e0f5881f914f0373a277e2ef2ec56c88c3f45de997877.exe | C:\Users\admin\AppData\Local\miaou\derogates.exe | executable | |
MD5:5F38EDF8C588EFD365F6C82C92D5F0F6 | SHA256:D51B3625115680DC3D6E0F5881F914F0373A277E2EF2EC56C88C3F45DE997877 | |||
| 6252 | derogates.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\derogates.vbs | binary | |
MD5:3705B119DC82A0842E2EED242CED5CDE | SHA256:6EBE3FFEF13FB4672FE3FCEA33495B0790214BA56E7C6014D332BBF8F9EF6ACA | |||
| 6464 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE | der | |
MD5:FA84E4BCC92AA5DB735AB50711040CDE | SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33 | |||
| 6464 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785 | der | |
MD5:F6F53CD09A41E968C363419B279D3112 | SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892 | |||
| 6464 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER5F6B.tmp.xml | xml | |
MD5:A4943D24827B8D9A13DA233A16018979 | SHA256:6169BB212E8826110A7ED54CC0FD6C6180C45F1FF43DC23B864C1CDDECC9BD65 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7040 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6464 | WerFault.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6464 | WerFault.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7040 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4536 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5064 | SearchApp.exe | 2.23.227.208:443 | www.bing.com | Ooredoo Q.S.C. | QA | whitelisted |
— | — | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
1176 | svchost.exe | 40.126.31.67:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |