File name: | Rpcnet.exe |
Full analysis: | https://app.any.run/tasks/8cc554a9-941f-4885-ac6c-bc336ff4a8ec |
Verdict: | Malicious activity |
Analysis date: | June 20, 2018, 05:26:05 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | DC908AB53016010462F371BBFD3173F5 |
SHA1: | 010DB906E545D2E3FC1F8A222B17AAF1B826DE8B |
SHA256: | EBA817F382F49FC698AB98415E7552C2ED031FAEEAB55D34EC77E5EF59860649 |
SSDEEP: | 1536:EYdo8lmPmGqnd8lpy2Cp4a8U74+Ga7Z+7AFhqXbxm:u2YfkyeHua8U72aI7AFh5 |
.exe | | | Generic Win/DOS Executable (50) |
---|---|---|
.exe | | | DOS Executable Generic (49.9) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 26-Nov-2014 16:44:18 |
Detected languages: |
|
Debug artifacts: |
|
Comments: | - |
CompanyName: | Absolute Software Corp. |
FileDescription: | rpcnet |
FileVersion: | 8.0.944.0 |
InternalName: | rpcnet |
LegalCopyright: | Copyright (c) 1997-2014 Absolute Software Corporation. All Rights Reserved. |
LegalTrademarks: | - |
OriginalFilename: | rpcnet.dll |
PrivateBuild: | - |
ProductName: | Installation/Management Application |
ProductVersion: | 8.0.944.0 |
SpecialBuild: | - |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0004 |
Pages in file: | 0x0001 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0001 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x6A06 |
Initial SP value: | 0xCB00 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x000000B0 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 5 |
Time date stamp: | 26-Nov-2014 16:44:18 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0000D049 | 0x0000D200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.27669 |
.data | 0x0000F000 | 0x00000300 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.329869 |
.cdata | 0x00010000 | 0x000002D2 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_WRITE | 2.65659 |
.rsrc | 0x00011000 | 0x00000448 | 0x00000600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.54587 |
.reloc | 0x00012000 | 0x00000F74 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.14635 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.4229 | 1000 | UNKNOWN | English - United States | RT_VERSION |
ADVAPI32.dll |
KERNEL32.dll |
NETAPI32.dll |
SHLWAPI.dll |
TAPI32.dll |
USER32.dll |
USERENV.dll |
WSOCK32.dll |
WTSAPI32.dll |
Title | Ordinal | Address |
---|---|---|
ServiceMain | 1 | 0x00005FF7 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1532 | "C:\Users\admin\AppData\Local\Temp\Rpcnet.exe" | C:\Users\admin\AppData\Local\Temp\Rpcnet.exe | — | explorer.exe | |||||||||||
User: admin Company: Absolute Software Corp. Integrity Level: MEDIUM Description: rpcnet Exit code: 3221226540 Version: 8.0.944.0 Modules
| |||||||||||||||
2780 | "C:\Users\admin\AppData\Local\Temp\Rpcnet.exe" | C:\Users\admin\AppData\Local\Temp\Rpcnet.exe | explorer.exe | ||||||||||||
User: admin Company: Absolute Software Corp. Integrity Level: HIGH Description: rpcnet Exit code: 0 Version: 8.0.944.0 Modules
| |||||||||||||||
2992 | C:\Windows\system32\svchost.exe | C:\Windows\system32\svchost.exe | Rpcnet.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3780 | "C:\Program Files\Internet Explorer\iexplore.exe" | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (3780) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | EnableAutodial |
Value: 0 | |||
(PID) Process: | (3780) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
(PID) Process: | (3780) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
Operation: | write | Name: | SavedLegacySettings |
Value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| |||
(PID) Process: | (3780) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (3780) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (2992) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\rpcnet\Parameters |
Operation: | write | Name: | Type |
Value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|
PID | Process | Filename | Type | |
---|---|---|---|---|
2780 | Rpcnet.exe | C:\Users\admin\AppData\Local\Temp\Rpcnet.dll | executable | |
MD5:— | SHA256:— | |||
2992 | svchost.exe | C:\Windows\system32\wceprv.dll | executable | |
MD5:AD73C636BB2EAD416DFA541A74AEA016 | SHA256:9D2C9EAD1F0F8EC320E11B1DF07564C304FA8115F7F52FA82DBA3B862A9698AB |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 19 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 18 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 248 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 29 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 19 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 21 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 21 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | text | 22 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 21 b | suspicious |
3780 | iexplore.exe | POST | 200 | 209.53.113.223:80 | http://search.namequery.com/ | CA | binary | 247 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3780 | iexplore.exe | 209.53.113.223:80 | search.namequery.com | TELUS Communications Inc. | CA | suspicious |
Domain | IP | Reputation |
---|---|---|
search.namequery.com |
| suspicious |