analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Remcos247_8898.exe

Full analysis: https://app.any.run/tasks/3babd74f-2345-4f17-9aa7-bc9688921692
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: February 22, 2020, 11:16:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
keylogger
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

1B7179820861410C084C1617145ECF04

SHA1:

8DD1B23C5F1A56DFDC2F6C9698DBD81A0E06776D

SHA256:

FA799B35ED2ED8048F8285036A58139DBA1CCBD3FCF9D2FAD3BA85361702B732

SSDEEP:

768:34Fcl91t1QSio0n8zBklQIEnR4abfHrXhZIj47FVFlZ:3Gk0KnacvVOqVXZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REMCOS was detected

      • Remcos247_8898.exe (PID: 3432)
    • Changes settings of System certificates

      • Remcos247_8898.exe (PID: 3432)
  • SUSPICIOUS

    • Application launched itself

      • Remcos247_8898.exe (PID: 3976)
    • Reads Internet Cache Settings

      • Remcos247_8898.exe (PID: 3432)
    • Writes files like Keylogger logs

      • Remcos247_8898.exe (PID: 3432)
    • Connects to unusual port

      • Remcos247_8898.exe (PID: 3432)
    • Creates files in the user directory

      • Remcos247_8898.exe (PID: 3432)
    • Adds / modifies Windows certificates

      • Remcos247_8898.exe (PID: 3432)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (90.6)
.exe | Win32 Executable (generic) (4.9)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

OriginalFileName: Selvhe.exe
InternalName: Selvhe
ProductVersion: 1
FileVersion: 1
ProductName: antivoli
FileDescription: levera
CompanyName: Chromogeni
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 1
OSVersion: 4
EntryPoint: 0x13b4
UninitializedDataSize: -
InitializedDataSize: 8192
CodeSize: 40960
LinkerVersion: 6
PEType: PE32
TimeStamp: 2016:07:04 23:51:19+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 04-Jul-2016 21:51:19
Detected languages:
  • English - United States
CompanyName: Chromogeni
FileDescription: levera
ProductName: antivoli
FileVersion: 1.00
ProductVersion: 1.00
InternalName: Selvhe
OriginalFilename: Selvhe.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 04-Jul-2016 21:51:19
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0000989C
0x0000A000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.53326
.data
0x0000B000
0x00000A50
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0000C000
0x0000090C
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.94534

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.1187
588
Unicode (UTF 16LE)
English - United States
RT_VERSION
30001
2.57965
304
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30002
1.76987
744
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30003
2.07177
296
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

MSVBVM60.DLL
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start remcos247_8898.exe no specs #REMCOS remcos247_8898.exe

Process information

PID
CMD
Path
Indicators
Parent process
3976"C:\Users\admin\AppData\Local\Temp\Remcos247_8898.exe" C:\Users\admin\AppData\Local\Temp\Remcos247_8898.exeexplorer.exe
User:
admin
Company:
Chromogeni
Integrity Level:
MEDIUM
Description:
levera
Exit code:
0
Version:
1.00
Modules
Images
c:\users\admin\appdata\local\temp\remcos247_8898.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3432"C:\Users\admin\AppData\Local\Temp\Remcos247_8898.exe" C:\Users\admin\AppData\Local\Temp\Remcos247_8898.exe
Remcos247_8898.exe
User:
admin
Company:
Chromogeni
Integrity Level:
MEDIUM
Description:
levera
Version:
1.00
Modules
Images
c:\windows\system32\msvbvm60.dll
c:\users\admin\appdata\local\temp\remcos247_8898.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
3 589
Read events
31
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
6
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
3432Remcos247_8898.exeC:\Users\admin\AppData\Local\Temp\Cab8C69.tmp
MD5:
SHA256:
3432Remcos247_8898.exeC:\Users\admin\AppData\Local\Temp\Tar8C6A.tmp
MD5:
SHA256:
3432Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bder
MD5:E550DA03AEE5B546B436CD553D3233B9
SHA256:9ABFD4E29B96CCA442502B1DE6071FE0293455DF22B4EFF19FA3E6DF060947E7
3432Remcos247_8898.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\XT6LR0C7.txttext
MD5:0CBCC5070AC8FA337D890A6137830D8E
SHA256:47861CB320E59C2070166DE8B78C03B8A3B87386D8BA67E97ED6DFEF28B43AA2
3432Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_375B7F179C25C4C237293A604A6DE85Cbinary
MD5:CBA06A11BD63638BDDCAEEF158F27CDF
SHA256:BB855F87E71028C38B0950FCE37AC06C16D20CC75820344993A7FDB25B83D795
3432Remcos247_8898.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:015D76DB82C538134A5245FAFCF19052
SHA256:3486AD21939513F12199CCE1531BD1ED6CA12C5AE6647DD470779B18B303EEE1
3432Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:41862E3C5F40FB163E2F6C410329628D
SHA256:556D4E6517AFA66FBF50DA3DE3B683322C00EE0637F7696F7B09BA8158907D29
3432Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_375B7F179C25C4C237293A604A6DE85Cder
MD5:FE390189A4CF6F11012F41B3EFFFEBEC
SHA256:3FF86D9812DFC9B0799D40AB47FAEB3C6AAA0328A353F2D00A11489E9C3C7234
3432Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_BB0C5663DC1B03008FBAAE98EFD0C044binary
MD5:0A7D796DABF4451D2131F26E9C80B9EC
SHA256:01A3FA70AA6C25DDB92FB7DF31168332003A38B9E231B89C25CC809DBCDFD481
3432Remcos247_8898.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_BB0C5663DC1B03008FBAAE98EFD0C044der
MD5:AA35018EA1C744AD1AD7906DBAD27A58
SHA256:6A70A8493C47EDD3CD1ED95CA3CF43B8C4885F69CE70EA8351D5B8AAFAAF6984
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
26
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3432
Remcos247_8898.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEA%2Fh3wHkYFwrCAAAAAAucVw%3D
US
der
471 b
whitelisted
3432
Remcos247_8898.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
3432
Remcos247_8898.exe
GET
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDu3mVgzTXArwIAAAAAWXG3
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3432
Remcos247_8898.exe
172.217.23.97:443
doc-0s-7s-docs.googleusercontent.com
Google Inc.
US
whitelisted
3432
Remcos247_8898.exe
172.217.23.174:443
drive.google.com
Google Inc.
US
whitelisted
3432
Remcos247_8898.exe
172.217.16.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3432
Remcos247_8898.exe
185.244.30.16:8484
remcos247.ddns.net
malicious

DNS requests

Domain
IP
Reputation
drive.google.com
  • 172.217.23.174
shared
ocsp.pki.goog
  • 172.217.16.131
whitelisted
doc-0s-7s-docs.googleusercontent.com
  • 172.217.23.97
shared
remcos247.ddns.net
  • 185.244.30.16
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
No debug info