File name:

AnyDesk.PIF

Full analysis: https://app.any.run/tasks/fd48de10-7f6c-4897-9e02-a89d4ae3bb12
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: November 29, 2024, 07:35:45
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
remcos
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 9 sections
MD5:

6139238E4742769B6C53D1DC66404A9E

SHA1:

4ED13F501476F0D4DA49B259167C19CC2A449939

SHA256:

E0EE945C690F55A1AE5B9BF3C8376FB8076962B47E5835A65DF05D2C67CC84AC

SSDEEP:

49152:WktJLAdsTBheBgfd+SkjLphJPcTpz93L:jSd00gfdNOrPM7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REMCOS has been detected (SURICATA)

      • svchost.exe (PID: 2192)
      • SndVol.exe (PID: 5888)
    • REMCOS mutex has been found

      • SndVol.exe (PID: 5888)
    • REMCOS has been detected (YARA)

      • SndVol.exe (PID: 5888)
  • SUSPICIOUS

    • Likely accesses (executes) a file from the Public directory

      • cmd.exe (PID: 5028)
      • esentutl.exe (PID: 3564)
      • alpha.pif (PID: 2132)
      • alpha.pif (PID: 2736)
      • xpha.pif (PID: 5268)
      • alpha.pif (PID: 5256)
      • alpha.pif (PID: 2076)
      • alpha.pif (PID: 4384)
      • esentutl.exe (PID: 1224)
      • esentutl.exe (PID: 3876)
      • alpha.pif (PID: 5464)
    • Starts CMD.EXE for commands execution

      • AnyDesk.PIF.exe (PID: 188)
    • Reads security settings of Internet Explorer

      • AnyDesk.PIF.exe (PID: 188)
    • There is functionality for taking screenshot (YARA)

      • AnyDesk.PIF.exe (PID: 188)
      • SndVol.exe (PID: 5888)
    • Starts a Microsoft application from unusual location

      • alpha.pif (PID: 5464)
      • xpha.pif (PID: 5268)
      • alpha.pif (PID: 2076)
      • alpha.pif (PID: 5256)
      • alpha.pif (PID: 4384)
      • alpha.pif (PID: 2736)
      • alpha.pif (PID: 2132)
    • Executing commands from ".cmd" file

      • AnyDesk.PIF.exe (PID: 188)
    • Starts application with an unusual extension

      • alpha.pif (PID: 2736)
      • cmd.exe (PID: 5028)
    • Created directory related to system

      • alpha.pif (PID: 5464)
    • Starts itself from another location

      • cmd.exe (PID: 5028)
    • Executable content was dropped or overwritten

      • esentutl.exe (PID: 1224)
      • esentutl.exe (PID: 3564)
      • esentutl.exe (PID: 3876)
    • Connects to unusual port

      • SndVol.exe (PID: 5888)
    • Contacting a server suspected of hosting an CnC

      • SndVol.exe (PID: 5888)
  • INFO

    • Checks supported languages

      • AnyDesk.PIF.exe (PID: 188)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Remcos

(PID) Process(5888) SndVol.exe
C2 (6)freshmeetre1ms.freeddns.org:2404
freshmysweeterbk.ddns.net:2404
mysweeterbk.ddns.net:2404
bbhmeetre1ms.freeddns.org:2404
myumysmeetr.ddns.net:2404
meetre1ms.freeddns.org:2404
BotnetRemoteHost
Options
Connect_interval1
Install_flagFalse
Install_HKCU\RunTrue
Install_HKLM\RunTrue
Install_HKLM\Explorer\Run1
Install_HKLM\Winlogon\Shell100000
Setup_path%LOCALAPPDATA%
Copy_fileremcos.exe
Startup_valueFalse
Hide_fileFalse
Mutex_nameRmc-B5YX7T
Keylog_flag1
Keylog_path%LOCALAPPDATA%
Keylog_filelogs.dat
Keylog_cryptFalse
Hide_keylogFalse
Screenshot_flagFalse
Screenshot_time5
Take_ScreenshotFalse
Screenshot_path%APPDATA%
Screenshot_fileScreenshots
Screenshot_cryptFalse
Mouse_optionFalse
Delete_fileFalse
Audio_record_time5
Audio_path%ProgramFiles%
Audio_dirMicRecords
Connect_delay0
Copy_dirRemcos
Keylog_dirANYDESKS
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (37.4)
.scr | Windows screen saver (34.5)
.exe | Win32 Executable (generic) (11.9)
.exe | Win16/32 Executable Delphi generic (5.4)
.exe | Generic Win/DOS Executable (5.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 361472
InitializedDataSize: 823296
UninitializedDataSize: -
EntryPoint: 0x59770
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
16
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start anydesk.pif.exe cmd.exe no specs conhost.exe no specs esentutl.exe esentutl.exe alpha.pif no specs alpha.pif no specs alpha.pif no specs xpha.pif no specs alpha.pif no specs alpha.pif no specs alpha.pif no specs esentutl.exe conhost.exe no specs #REMCOS sndvol.exe #REMCOS svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\Users\admin\Desktop\AnyDesk.PIF.exe" C:\Users\admin\Desktop\AnyDesk.PIF.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\anydesk.pif.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
936\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeesentutl.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1224C:\\Windows\\System32\\esentutl.exe /y C:\Users\admin\Desktop\AnyDesk.PIF.exe /d C:\\Users\\Public\\Libraries\\Uchzpskq.PIF /oC:\Windows\SysWOW64\esentutl.exe
AnyDesk.PIF.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extensible Storage Engine Utilities for Microsoft(R) Windows(R)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\esentutl.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2076C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif" C:\Users\Public\alpha.pifcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\public\alpha.pif
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2132C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64" C:\Users\Public\alpha.pifcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\public\alpha.pif
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2736C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10 C:\Users\Public\alpha.pifcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\public\alpha.pif
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3564C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o C:\Windows\SysWOW64\esentutl.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extensible Storage Engine Utilities for Microsoft(R) Windows(R)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\esentutl.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3876C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o C:\Windows\SysWOW64\esentutl.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extensible Storage Engine Utilities for Microsoft(R) Windows(R)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\esentutl.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4384C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \" C:\Users\Public\alpha.pifcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\public\alpha.pif
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
5 065
Read events
5 061
Write events
4
Delete events
0

Modification events

(PID) Process:(188) AnyDesk.PIF.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Uchzpskq
Value:
C:\Users\Public\Uchzpskq.url
(PID) Process:(5888) SndVol.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-B5YX7T
Operation:writeName:exepath
Value:
E4A76EAD53E044C24EC225A0782F309E6FBA5AABD3934227659DA1C3BFEA4DF743B293D73F914A167A9628C310B4887956AEE5F360F5E33F18E330DB5F96
(PID) Process:(5888) SndVol.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-B5YX7T
Operation:writeName:licence
Value:
0BEC11D5085AAEE415988B759476AD9C
(PID) Process:(5888) SndVol.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-B5YX7T
Operation:writeName:time
Value:
Executable files
3
Suspicious files
3
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3876esentutl.exeC:\Users\Public\alpha.pifexecutable
MD5:D3348AC2130C7E754754A6E9CB053B09
SHA256:E9EF013238495BFFCE7459E059BFFE340A0F08B439EC94E7D4436F4E13714ECD
1224esentutl.exeC:\Users\Public\Libraries\Uchzpskq.PIFexecutable
MD5:6139238E4742769B6C53D1DC66404A9E
SHA256:E0EE945C690F55A1AE5B9BF3C8376FB8076962B47E5835A65DF05D2C67CC84AC
3564esentutl.exeC:\Users\Public\xpha.pifexecutable
MD5:B3624DD758CCECF93A1226CEF252CA12
SHA256:4AAA74F294C15AEB37ADA8185D0DEAD58BD87276A01A814ABC0C4B40545BF2EF
188AnyDesk.PIF.exeC:\Users\Public\Libraries\Uchzpskqbinary
MD5:76604B5A3B157336272FAA7065925FC9
SHA256:AC4BA0C4B331AC0AA2896DB1B64790FC695BA6CE358056A87911B476DDAE3D8A
188AnyDesk.PIF.exeC:\Users\Public\Uchzpskq.urlbinary
MD5:573527E999AA527C09A0BA25010F56EC
SHA256:00A6B8623847FC3F61B931A6EB8BC989403FF9F47456760846722B3D3B7A63FE
5888SndVol.exeC:\ProgramData\ANYDESKS\logs.datbinary
MD5:C574DD164F6DE1810236F9398CEA9404
SHA256:7FAFAC662EF100D7A96F36C3BA3E74323046C01DDF8C76F8B8B877B1EDE1B132
188AnyDesk.PIF.exeC:\Users\Public\Libraries\qkspzhcU.cmdtext
MD5:B87F096CBC25570329E2BB59FEE57580
SHA256:D08CCC9B1E3ACC205FE754BAD8416964E9711815E9CEED5E6AF73D8E9035EC9E
188AnyDesk.PIF.exeC:\Users\Public\Libraries\PNOtext
MD5:26EB5C462A98113BC43350C1D1A3A774
SHA256:4593C89B4D60161D78FEF3F48312D7833649B876A0C1D762CB5B9D73ACAA0A20
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
95
DNS requests
113
Threats
314

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.168:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4328
svchost.exe
GET
200
23.48.23.168:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4328
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
216.58.206.33:443
https://drive.usercontent.google.com/download?id=1kxQrvH7v1xZ19CO-h0FLY4IjgZlOZZko&export=download
unknown
text
1.02 Mb
whitelisted
GET
303
142.250.186.46:443
https://drive.google.com/uc?export=download&id=1kxQrvH7v1xZ19CO-h0FLY4IjgZlOZZko
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4328
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.146:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.168:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4328
svchost.exe
23.48.23.168:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4328
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.146
  • 104.126.37.152
  • 104.126.37.155
  • 104.126.37.163
  • 104.126.37.160
  • 104.126.37.162
  • 104.126.37.153
  • 104.126.37.161
  • 104.126.37.145
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 23.48.23.168
  • 23.48.23.193
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
drive.google.com
  • 142.250.184.206
shared
drive.usercontent.google.com
  • 216.58.206.33
whitelisted
freshmeetre1ms.freeddns.org
unknown
freshmysweeterbk.ddns.net
malicious
mysweeterbk.ddns.net
malicious

Threats

PID
Process
Class
Message
2192
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.freeddns .org Domain
2192
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
2192
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
2192
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
2192
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.freeddns .org Domain
2192
svchost.exe
A Network Trojan was detected
ET MALWARE DNS Query to Remcos Related Domain (myumysmeetr .ddns .net)
2192
svchost.exe
A Network Trojan was detected
ET MALWARE DNS Query to Remcos Related Domain (mysweeterbk .ddns .net)
2192
svchost.exe
A Network Trojan was detected
ET MALWARE DNS Query to Remcos Related Domain (bbhmeetre1ms .freeddns .org)
2192
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.freeddns .org Domain
5888
SndVol.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
No debug info