File name:

PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.tar

Full analysis: https://app.any.run/tasks/9e3f0ea1-012b-404e-b68f-78890b5bbb7b
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: October 17, 2024, 15:27:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
remcos
remote
evasion
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

19B6FB7056DB0F3C95C941B989372CD1

SHA1:

F2FDBDD574930CAC4483F6FBFB9E1219EFF12680

SHA256:

F5D0907DC16E79590EF8012B3AEF897CE33ABBD9FAD4D6789022CD9D78D0540B

SSDEEP:

49152:xUdoxoRSU/P7aH/LTaUWabujqowImciYnmZrffud0ncEICtDOttbmOl3r0mfVWaE:69X2fLRWpq8diYIrffpdarBlImfVrzlW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REMCOS has been detected (SURICATA)

      • PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe (PID: 4676)
  • SUSPICIOUS

    • Application launched itself

      • PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe (PID: 5624)
      • PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe (PID: 6568)
    • Checks for external IP

      • PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe (PID: 4676)
    • Connects to unusual port

      • PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe (PID: 4676)
    • Contacting a server suspected of hosting an CnC

      • PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe (PID: 4676)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3648)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 1729850
UncompressedSize: 4788224
OperatingSystem: Win32
ModifyDate: 2024:10:17 08:09:20
PackingMethod: Normal
ArchivedFileName: PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
6
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe pdf-3873247 documentacion requerida por demanda municipal.exe no specs #REMCOS pdf-3873247 documentacion requerida por demanda municipal.exe svchost.exe pdf-3873247 documentacion requerida por demanda municipal.exe no specs pdf-3873247 documentacion requerida por demanda municipal.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3648"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.tar.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3832"C:\Users\admin\AppData\Local\Temp\Rar$EXb3648.20354\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXb3648.20354\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exePDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3648.20354\pdf-3873247 documentacion requerida por demanda municipal.exe
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
c:\windows\syswow64\gdi32.dll
c:\windows\syswow64\gdi32full.dll
4676"C:\Users\admin\AppData\Local\Temp\Rar$EXb3648.18165\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXb3648.18165\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe
PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3648.18165\pdf-3873247 documentacion requerida por demanda municipal.exe
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
c:\windows\syswow64\gdi32.dll
c:\windows\syswow64\gdi32full.dll
5624"C:\Users\admin\AppData\Local\Temp\Rar$EXb3648.18165\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3648.18165\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3648.18165\pdf-3873247 documentacion requerida por demanda municipal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6568"C:\Users\admin\AppData\Local\Temp\Rar$EXb3648.20354\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3648.20354\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3648.20354\pdf-3873247 documentacion requerida por demanda municipal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
29 308
Read events
29 282
Write events
26
Delete events
0

Modification events

(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.tar.rar
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:psize
Value:
80
(PID) Process:(3648) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:type
Value:
120
Executable files
2
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5624PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exeC:\Users\admin\Music\MeterDesignerUpdater\MeterConvertVideo.exe
MD5:
SHA256:
3648WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3648.18165\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exeexecutable
MD5:2A84A14745B27324475711BCEC5A2E04
SHA256:E49D7EC32DFB6E23E15A88A5B6DFA7B7AC865979A36271BCA9A39798653498A4
3648WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb3648.20354\PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exeexecutable
MD5:2A84A14745B27324475711BCEC5A2E04
SHA256:E49D7EC32DFB6E23E15A88A5B6DFA7B7AC865979A36271BCA9A39798653498A4
4676PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\json[1].jsonbinary
MD5:1B1D141FE06EBDDD98F0357853473158
SHA256:8B19E63CA93AA80B8D0E7320F0AF15B08ED7E3C05112644B85942DA4B9EB3F5B
4676PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exeC:\ProgramData\remcos\logs.datbinary
MD5:819A6EC79C1BAF48295ED88953C118C4
SHA256:D6D01E0AAD7BE92472A6BB2E87D038969E81B27C879D104FB4D59AF40FF9D66B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
51
DNS requests
21
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
2.19.198.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3788
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2776
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6392
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4676
PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe
GET
200
178.237.33.50:80
http://geoplugin.net/json.gp
unknown
malicious
6392
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
2.19.198.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4360
SearchApp.exe
2.23.209.176:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3788
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.19.198.194
  • 23.32.238.34
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 2.23.209.176
  • 2.23.209.158
  • 2.23.209.148
  • 2.23.209.141
  • 2.23.209.144
  • 2.23.209.160
  • 2.23.209.149
  • 2.23.209.150
  • 2.23.209.177
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.185.206
whitelisted
login.live.com
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.72
  • 40.126.32.138
  • 40.126.32.74
  • 40.126.32.134
  • 20.190.160.14
  • 20.190.160.20
whitelisted
th.bing.com
  • 104.126.37.144
  • 104.126.37.137
  • 104.126.37.155
  • 104.126.37.130
  • 104.126.37.153
  • 104.126.37.152
  • 104.126.37.145
  • 104.126.37.139
  • 104.126.37.154
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Potentially Bad Traffic
ET INFO DNS Redirection Service Domain in DNS Lookup (con-ip .com)
4676
PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4676
PDF-3873247 DOCUMENTACION REQUERIDA POR DEMANDA MUNICIPAL.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
1 ETPRO signatures available at the full report
No debug info