analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

rat 2.exe

Full analysis: https://app.any.run/tasks/e3f9d825-17c3-4675-9ed3-1ded326c43f4
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: September 18, 2019, 19:25:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

8AEABF771BB5896BF93206CD69D735D2

SHA1:

AB08C26805459B8D86D0E1017D2BAA7903682950

SHA256:

F8BF2120BDEC3DA240BF4A56760EE42D045E42EC4AE1D261774FF13FC2CB7CC0

SSDEEP:

12288:c20RmgW1udgl9Ka17xPH8DXm560laPsC1ZwBdCIX:YRbW19l9Ki1H8D+aUC1ZwBdB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • rat 2.exe (PID: 3960)
      • spoolkts.exe (PID: 3524)
      • spoolkts.exe (PID: 3672)
      • spoolkts.exe (PID: 3456)
      • spoolkts.exe (PID: 2644)
    • Loads the Task Scheduler COM API

      • rat 2.exe (PID: 3960)
      • spoolkts.exe (PID: 3524)
      • spoolkts.exe (PID: 3672)
      • spoolkts.exe (PID: 3456)
      • spoolkts.exe (PID: 2644)
    • Changes the autorun value in the registry

      • rat 2.exe (PID: 3960)
      • spoolkts.exe (PID: 3524)
      • spoolkts.exe (PID: 3672)
      • spoolkts.exe (PID: 3456)
      • spoolkts.exe (PID: 2644)
  • SUSPICIOUS

    • Application launched itself

      • rat 2.exe (PID: 3564)
      • spoolkts.exe (PID: 4008)
      • spoolkts.exe (PID: 4084)
      • spoolkts.exe (PID: 4068)
      • spoolkts.exe (PID: 184)
    • Starts CMD.EXE for commands execution

      • rat 2.exe (PID: 3564)
      • spoolkts.exe (PID: 4008)
      • spoolkts.exe (PID: 4084)
      • spoolkts.exe (PID: 4068)
      • spoolkts.exe (PID: 184)
    • Reads internet explorer settings

      • rat 2.exe (PID: 3960)
      • spoolkts.exe (PID: 3524)
      • spoolkts.exe (PID: 3672)
      • spoolkts.exe (PID: 3456)
      • spoolkts.exe (PID: 2644)
    • Creates files in the user directory

      • rat 2.exe (PID: 3960)
      • cmd.exe (PID: 2364)
      • spoolkts.exe (PID: 3524)
    • Executable content was dropped or overwritten

      • rat 2.exe (PID: 3960)
    • Executed via Task Scheduler

      • spoolkts.exe (PID: 4008)
      • spoolkts.exe (PID: 4084)
      • spoolkts.exe (PID: 4068)
      • spoolkts.exe (PID: 184)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1973:11:06 15:29:04+01:00
PEType: PE32
LinkerVersion: 8
CodeSize: 1897472
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x1d120e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.9.12.15
ProductVersionNumber: 6.9.12.15
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: ;B9<46DC65>>@95<B
CompanyName: D2D>:8B9=;C?5845B48
FileDescription: 8B?<2:CD:6=AC83@548A8;
FileVersion: 6.9.12.15
InternalName: pp.exe
LegalCopyright: Copyright © 2007
OriginalFileName: pp.exe
ProductName: 8B?<2:CD:6=AC83@548A8;
ProductVersion: 6.9.12.15
AssemblyVersion: 0.0.0.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 06-Nov-1973 14:29:04
Comments: ;B9<46DC65>>@95<B
CompanyName: D2D>:8B9=;C?5845B48
FileDescription: 8B?<2:CD:6=AC83@548A8;
FileVersion: 6.9.12.15
InternalName: pp.exe
LegalCopyright: Copyright © 2007
OriginalFilename: pp.exe
ProductName: 8B?<2:CD:6=AC83@548A8;
ProductVersion: 6.9.12.15
Assembly Version: 0.0.0.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 06-Nov-1973 14:29:04
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x001CF214
0x001CF400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.85944
.rsrc
0x001D2000
0x000005E8
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.4131
.reloc
0x001D4000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.0980042

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.00112
490
Latin 1 / Western European
UNKNOWN
RT_MANIFEST

Imports

mscoree.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
15
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start rat 2.exe no specs cmd.exe no specs rat 2.exe spoolkts.exe no specs cmd.exe no specs spoolkts.exe spoolkts.exe no specs cmd.exe no specs spoolkts.exe spoolkts.exe no specs cmd.exe no specs spoolkts.exe spoolkts.exe no specs cmd.exe no specs spoolkts.exe

Process information

PID
CMD
Path
Indicators
Parent process
3564"C:\Windows\rat 2.exe" C:\Windows\rat 2.exeexplorer.exe
User:
admin
Company:
D2D>:8B9=;C?5845B48
Integrity Level:
MEDIUM
Description:
8B?<2:CD:6=AC83@548A8;
Exit code:
0
Version:
6.9.12.15
2504"C:\Windows\System32\cmd.exe" /C type nul > "C:\Windows\rat 2.exe:Zone.Identifier"C:\Windows\System32\cmd.exerat 2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3960"C:\Windows\rat 2.exe"C:\Windows\rat 2.exe
rat 2.exe
User:
admin
Company:
D2D>:8B9=;C?5845B48
Integrity Level:
MEDIUM
Description:
8B?<2:CD:6=AC83@548A8;
Exit code:
0
Version:
6.9.12.15
4008C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exe C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exetaskeng.exe
User:
admin
Company:
D2D>:8B9=;C?5845B48
Integrity Level:
MEDIUM
Description:
8B?<2:CD:6=AC83@548A8;
Exit code:
0
Version:
6.9.12.15
2364"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exe:Zone.Identifier"C:\Windows\System32\cmd.exespoolkts.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3524C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exeC:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exe
spoolkts.exe
User:
admin
Company:
D2D>:8B9=;C?5845B48
Integrity Level:
MEDIUM
Description:
8B?<2:CD:6=AC83@548A8;
Version:
6.9.12.15
4084C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exe C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exetaskeng.exe
User:
admin
Company:
D2D>:8B9=;C?5845B48
Integrity Level:
MEDIUM
Description:
8B?<2:CD:6=AC83@548A8;
Exit code:
0
Version:
6.9.12.15
2444"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exe:Zone.Identifier"C:\Windows\System32\cmd.exespoolkts.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3672C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exeC:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exe
spoolkts.exe
User:
admin
Company:
D2D>:8B9=;C?5845B48
Integrity Level:
MEDIUM
Description:
8B?<2:CD:6=AC83@548A8;
Exit code:
0
Version:
6.9.12.15
4068C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exe C:\Users\admin\AppData\Roaming\LocalAdmin\spoolkts.exetaskeng.exe
User:
admin
Company:
D2D>:8B9=;C?5845B48
Integrity Level:
MEDIUM
Description:
8B?<2:CD:6=AC83@548A8;
Exit code:
0
Version:
6.9.12.15
Total events
774
Read events
687
Write events
86
Delete events
1

Modification events

(PID) Process:(3564) rat 2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3564) rat 2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3564) rat 2.exeKey:HKEY_CURRENT_USER
Operation:writeName:
Value:
-boot
(PID) Process:(3960) rat 2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3960) rat 2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3960) rat 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\rat 2_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3960) rat 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\rat 2_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3960) rat 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\rat 2_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3960) rat 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\rat 2_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3960) rat 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\rat 2_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
1
Suspicious files
0
Text files
15
Unknown types
0

Dropped files

PID
Process
Filename
Type
3960rat 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\cookieconsent.min[1].css
MD5:
SHA256:
3960rat 2.exeC:\Users\admin\AppData\Local\Temp\~DFCE4FFDA9FBF382F5.TMP
MD5:
SHA256:
3524spoolkts.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\inbox[1].htm
MD5:
SHA256:
3672spoolkts.exeC:\Users\admin\AppData\Local\Temp\~DF30CEEF93A8FC36ED.TMP
MD5:
SHA256:
3456spoolkts.exeC:\Users\admin\AppData\Local\Temp\~DF05F700C26D286139.TMP
MD5:
SHA256:
2644spoolkts.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\inbox[1].htm
MD5:
SHA256:
2644spoolkts.exeC:\Users\admin\AppData\Local\Temp\~DF4A46A460A2A21980.TMP
MD5:
SHA256:
3524spoolkts.exeC:\Users\admin\AppData\Roaming\LocalAdmin\Conf.initext
MD5:4E90A3EAA354BA9D87532B5B22BB004A
SHA256:5789A40712573B215CFC5C74C1F8BD461AC44DD7653C42EEEE96292435A3EDD9
3524spoolkts.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\inbox[1].pngimage
MD5:332F2009EB042E630F5244884BB71EA6
SHA256:DE279CF69C848309BDABCE483EB968F8EE2AF834986CA140F28BCF8FBFFB1013
3960rat 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\inbox[1].htmhtml
MD5:6380A31EE8923A7919607EF45C6FCC30
SHA256:60639367B07797376D864357F2BD9606AD90ED350F89A117D7540AB44C876ADA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
30
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3960
rat 2.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/style/2.9/style.css
GB
text
4.62 Kb
shared
3672
spoolkts.exe
GET
304
87.98.250.141:80
http://www.yopmail.com/style/pic/inbox.png
GB
shared
2644
spoolkts.exe
GET
87.98.250.141:80
http://www.yopmail.com/style/pic/inbox.png
GB
shared
3456
spoolkts.exe
GET
87.98.250.141:80
http://www.yopmail.com/es/inbox.php?login=nd9ab01sd45qw&p=1&d=&ctrl=&scrl=&spam=true&yf=005&yp=DZwxmAGZkAQR0AmV3AQLkAwp&yj=KZGR4ZmL1BQZ4BQH3ZGLlZmL&v=2.9&r_c=&id=
GB
shared
3960
rat 2.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/es/inbox.php?login=nd9ab01sd45qw&p=1&d=&ctrl=&scrl=&spam=true&yf=005&yp=DZwxmAGZkAQR0AmV3AQLkAwp&yj=KZGR4ZmL1BQZ4BQH3ZGLlZmL&v=2.9&r_c=&id=
GB
html
2.89 Kb
shared
3672
spoolkts.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/es/inbox.php?login=nd9ab01sd45qw&p=1&d=&ctrl=&scrl=&spam=true&yf=005&yp=DZwxmAGZkAQR0AmV3AQLkAwp&yj=KZGR4ZmL1BQZ4BQH3ZGLlZmL&v=2.9&r_c=&id=
GB
html
2.89 Kb
shared
3524
spoolkts.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/style/2.9/style.css
GB
text
4.62 Kb
shared
2644
spoolkts.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/style/2.9/style.css
GB
text
4.62 Kb
shared
3524
spoolkts.exe
GET
200
87.98.250.141:80
http://www.yopmail.com/style/pic/inbox.png
GB
image
3.89 Kb
shared
3960
rat 2.exe
GET
200
104.19.199.151:80
http://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.3/cookieconsent.min.js
US
text
6.38 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3960
rat 2.exe
104.19.199.151:80
cdnjs.cloudflare.com
Cloudflare Inc
US
shared
3524
spoolkts.exe
87.98.250.141:80
www.yopmail.com
OVH SAS
GB
malicious
87.98.250.141:80
www.yopmail.com
OVH SAS
GB
malicious
3960
rat 2.exe
87.98.250.141:80
www.yopmail.com
OVH SAS
GB
malicious
3524
spoolkts.exe
128.90.112.222:7070
medicosta.linkpc.net
Powerhouse Management, Inc.
PA
unknown
2644
spoolkts.exe
87.98.250.141:80
www.yopmail.com
OVH SAS
GB
malicious
3672
spoolkts.exe
87.98.250.141:80
www.yopmail.com
OVH SAS
GB
malicious
3456
spoolkts.exe
87.98.250.141:80
www.yopmail.com
OVH SAS
GB
malicious
128.90.112.222:7070
medicosta.linkpc.net
Powerhouse Management, Inc.
PA
unknown

DNS requests

Domain
IP
Reputation
www.yopmail.com
  • 87.98.250.141
shared
cdnjs.cloudflare.com
  • 104.19.199.151
  • 104.19.195.151
  • 104.19.196.151
  • 104.19.198.151
  • 104.19.197.151
whitelisted
medicosta.linkpc.net
  • 128.90.112.222
malicious

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY Disposable Email Provider Domain in DNS Lookup (www .yopmail .com)
3960
rat 2.exe
A Network Trojan was detected
AV TROJAN Trojan.Win32.Scar CnC Checkin on yopmail.com
3960
rat 2.exe
A Network Trojan was detected
ET TROJAN Proyecto RAT Variant - Yopmail Stage 2 CnC Retrieval
3524
spoolkts.exe
A Network Trojan was detected
AV TROJAN Trojan.Win32.Scar CnC Checkin on yopmail.com
3524
spoolkts.exe
A Network Trojan was detected
ET TROJAN Proyecto RAT Variant - Yopmail Stage 2 CnC Retrieval
3672
spoolkts.exe
A Network Trojan was detected
AV TROJAN Trojan.Win32.Scar CnC Checkin on yopmail.com
3672
spoolkts.exe
A Network Trojan was detected
ET TROJAN Proyecto RAT Variant - Yopmail Stage 2 CnC Retrieval
3456
spoolkts.exe
A Network Trojan was detected
AV TROJAN Trojan.Win32.Scar CnC Checkin on yopmail.com
2644
spoolkts.exe
A Network Trojan was detected
AV TROJAN Trojan.Win32.Scar CnC Checkin on yopmail.com
2644
spoolkts.exe
A Network Trojan was detected
ET TROJAN Proyecto RAT Variant - Yopmail Stage 2 CnC Retrieval
2 ETPRO signatures available at the full report
No debug info