File name:

e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5

Full analysis: https://app.any.run/tasks/b8ff55ea-4261-4afc-80a8-3736de9a0b77
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: January 10, 2025, 21:23:07
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
remcos
rat
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

575D16384315352AA0A0B0EAB3A62B6C

SHA1:

2BD99B62A965FEBF54C0E72A1AFEE93C12F135B6

SHA256:

E9077AD335BFE27A3217406B06411F96D66E7AF4BD59E21BA88F1B6C59CD24B5

SSDEEP:

12288:KWIauIoXnpLIaGsMpQbZZmQffD633rc2PcYTIZZZupWVVVVVVVVVVVVVVVVVJ:xoXnhLyQf83lCZZcp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REMCOS has been detected

      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
    • REMCOS mutex has been found

      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
    • REMCOS has been detected (YARA)

      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
    • Connects to unusual port

      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
  • INFO

    • Creates files in the program directory

      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
    • Checks supported languages

      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
    • Reads the computer name

      • e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe (PID: 3848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x33b3a
UninitializedDataSize: -
InitializedDataSize: 139264
CodeSize: 352256
LinkerVersion: 14.16
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2024:11:01 08:29:31+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #REMCOS e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe

Process information

PID
CMD
Path
Indicators
Parent process
3848"C:\Users\admin\AppData\Local\Temp\e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe" C:\Users\admin\AppData\Local\Temp\e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
207
Read events
204
Write events
3
Delete events
0

Modification events

(PID) Process:(3848) e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-MKYDDH
Operation:writeName:exepath
Value:
9B8A190947C78ED6C3D9B7D534B61B849B5787C895EAFE59FDA049BD589C3F6E37AA0FC9E40CA53EFF33DE7F861481C73D6F20D87ACF5CA3A62C55A9BF7A8E2CF672DD1A75DA26CE7EA660546F4AAB5CCC79B2A63C16A12434EE0CCBCDC067EC68F8A7FB5D267453C8B36080E694D1002748F80AA75EC1B19F9093B10E56C88E1E11C55E68A1F195970DDE102A5C9922E02B2A78563460C654A776C4EE1F5FEA11A984DD7BCA47E2F7096860A11A16DFDAF8A6B675BBB8FA69C20069B601F50706D48C3203CBC357E8598C9032A4
(PID) Process:(3848) e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-MKYDDH
Operation:writeName:licence
Value:
0EB06E9879E22DB55E5768653EA77A5C
(PID) Process:(3848) e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-MKYDDH
Operation:writeName:time
Value:
Executable files
0
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3848e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exeC:\ProgramData\remcos\logs.datbinary
MD5:B4EE2AF285BFC563CFF50A5E926F4610
SHA256:50F36603F47CC9B61886A92AAB2A14E19FEE9F1106FF9582A3B3CAC438E04992
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
193
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2956
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6992
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6992
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
372
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
3848
e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe
192.210.150.26:3678
AS-COLOCROSSING
US
malicious
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
1176
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
login.live.com
  • 20.190.159.2
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.73
  • 20.190.159.23
  • 20.190.159.68
  • 20.190.159.64
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
whitelisted

Threats

No threats detected
No debug info