Attempts to repeatedly call a single API many times in order to delay analysis time
- Spam:
- fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe (2596) called API SetUnhandledExceptionFilter 65535 times
- Spam:
- fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe (2596) called API __exception__ 65536 times
- Spam:
- fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe (2596) called API IsDebuggerPresent 65535 times
A process attempted to delay the analysis task.
- Description:
- LMI_Rescue.exe tried to sleep 124 seconds, actually delayed analysis time by 124 seconds
Queries for the computername
PID |
API |
Arguments |
2568 |
GetComputerNameW |
- computer_name:
- VIRTUAL-PC
|
2568 |
GetComputerNameW |
- computer_name:
- VIRTUAL-PC
|
2568 |
GetComputerNameW |
- computer_name:
- VIRTUAL-PC
|
2752 |
GetComputerNameW |
- computer_name:
- VIRTUAL-PC
|
2860 |
GetComputerNameW |
- computer_name:
- VIRTUAL-PC
|
2964 |
GetComputerNameW |
- computer_name:
- VIRTUAL-PC
|
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available
PID |
API |
Arguments |
2568 |
GlobalMemoryStatusEx |
N/A |
2568 |
GlobalMemoryStatusEx |
N/A |
2568 |
GlobalMemoryStatusEx |
N/A |
2752 |
GlobalMemoryStatusEx |
N/A |
2860 |
GlobalMemoryStatusEx |
N/A |
2964 |
GlobalMemoryStatusEx |
N/A |
Checks adapter addresses which can be used to detect virtual network interfaces
PID |
API |
Arguments |
2568 |
GetAdaptersAddresses |
- flags:
- 0
- family:
- 0
|
2568 |
GetAdaptersAddresses |
- flags:
- 0
- family:
- 0
|
2568 |
GetAdaptersAddresses |
- flags:
- 0
- family:
- 0
|
2568 |
GetAdaptersAddresses |
- flags:
- 0
- family:
- 0
|
Attempts to modify proxy settings
Drops a binary and executes it
- File:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
This executable has a PDB path
- Pdb Path:
- C:\build.tc\agent\work\14d10ba45c29ec39\-\rescue\Applet\native\bin\x86\LMIRescue.pdb
Creates executable files on the filesystem
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10527001.tmp\LMI_RescueRC.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\ra64app.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10528001.tmp\rahook.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\LMI_Rescue.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10525001.tmp\ra64app.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10525001.tmp\RescueWinRTLib.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10527001.tmp\LMI_Rescue.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR1051E001.tmp\ra64app.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR1051E001.tmp\LMI_Rescue.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10525001.tmp\LMI_RescueRC.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\LMI_RescueRC.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10525001.tmp\rahook.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10528001.tmp\ra64app.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR1051E001.tmp\rahook.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10527001.tmp\ra64app.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10527001.tmp\rahook.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10528001.tmp\LMI_RescueRC.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10528001.tmp\LMI_Rescue.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10527001.tmp\RescueWinRTLib.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR1051E001.tmp\RescueWinRTLib.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\rahook.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\RescueWinRTLib.dll
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10525001.tmp\LMI_Rescue.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR1051E001.tmp\LMI_RescueRC.exe
- File:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10528001.tmp\RescueWinRTLib.dll
Sample writes a large amount of files (Over 100)
Repeatedly searches for a not-found process, you may want to run a web browser during analysis
PID |
API |
Arguments |
2400 |
Process32NextW |
- snapshot_handle:
- 0x00000228
- process_name:
- process_identifier:
- 2448
|
Reads data out of its own binary image
- Self Read:
- process: LMI_Rescue.exe, pid: 2432, offset: 0x00000000, length: 0x00000800
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Installs an hook procedure to monitor for mouse events
PID |
API |
Arguments |
2568 |
SetWindowsHookExW |
- thread_identifier:
- 2572
- callback_function:
- 0x229676be
- hook_identifier:
- 7
- module_address:
- 0x22900000
|
Performs some HTTP requests
- Request:
- GET http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
- Request:
- GET http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
Performs some DNS requests
- Dns :
- Request: www.download.windowsupdate.com IP: 8.253.154.120
- Dns :
- Request: secure.logmeinrescue.com IP: 69.25.20.195
- Dns :
- Request: www.microsoft.com IP: 23.74.10.28
The executable has PE anomalies (could be a false positive)
The binary likely contains encrypted or compressed data.
- Section:
- .rsrc, at virtual address 0x0001f000
- Entropy:
- 7.99004514235
- Description:
- A section with a high entropy has been found
- Entropy:
- 0.947380675204
- Description:
- Overall entropy of this PE file is high
Allocates read-write-execute memory (usually to unpack itself)
PID |
API |
Arguments |
2568 |
NtAllocateVirtualMemory |
- process_identifier:
- 2568
- region_size:
- 4096
- stack_dep_bypass:
- 0
- stack_pivoted:
- 0
- heap_dep_bypass:
- 0
- protection:
- 64
- base_address:
- 0x02c50000
- allocation_type:
- 4096
- process_handle:
- 0xffffffff
|
Installs itself for autorun at Windows startup
- Registry:
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\*LogMeInRescue_3575089468
This sample modifies many files through suspicious ways, likely a polymorphic virus or a ransomware
PID |
API |
Arguments |
2468 |
MoveFileWithProgressW |
- newfilepath_r:
- flags:
- 4
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
- newfilepath:
- oldfilepath:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
|
2520 |
MoveFileWithProgressW |
- newfilepath_r:
- flags:
- 4
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
- newfilepath:
- oldfilepath:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\LMI_Rescue.exe
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\LMI_Rescue.exe
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\LMI_Rescue.exe
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\LMI_Rescue.exe
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\LMI_Rescue_srv.exe
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\LMI_Rescue_srv.exe
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\LMI_Rescue_srv.exe
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\LMI_Rescue_srv.exe
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\LMI_RescueRC.exe
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\LMI_RescueRC.exe
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\LMI_RescueRC.exe
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\LMI_RescueRC.exe
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\rahook.dll
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\rahook.dll
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\rahook.dll
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\rahook.dll
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\RescueWinRTLib.dll
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\RescueWinRTLib.dll
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\RescueWinRTLib.dll
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\RescueWinRTLib.dll
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\ra64app.exe
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\ra64app.exe
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\ra64app.exe
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\ra64app.exe
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\rarcc.dll
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\rarcc.dll
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\rarcc.dll
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\rarcc.dll
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\unattended.exe
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\unattended.exe
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\unattended.exe
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\unattended.exe
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\unlock.dll
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\unlock.dll
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\unlock.dll
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\unlock.dll
|
2568 |
MoveFileWithProgressW |
- newfilepath_r:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\unlock64.dll
- flags:
- 2
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\unlock64.dll
- newfilepath:
- C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR10529001.tmp\unlock64.dll
- oldfilepath:
- C:\Users\Virtual\AppData\Local\LogMeIn Rescue Applet\LMIR10522001.tmp\unlock64.dll
|
2680 |
MoveFileWithProgressW |
- newfilepath_r:
- flags:
- 4
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
- newfilepath:
- oldfilepath:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
|
2808 |
MoveFileWithProgressW |
- newfilepath_r:
- flags:
- 4
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
- newfilepath:
- oldfilepath:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
|
2912 |
MoveFileWithProgressW |
- newfilepath_r:
- flags:
- 4
- oldfilepath_r:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
- newfilepath:
- oldfilepath:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe
|
PID |
API |
Arguments |
2400 |
CreateServiceW |
- service_start_name:
- start_type:
- 2
- password:
- display_name:
- LogMeIn Rescue Applet Pack ()
- filepath:
- C:\Users\Virtual\AppData\Local\Temp\"C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe" -service -sid "" -wd "C:\Users\Virtual\AppData\Local\Temp"
- service_name:
- LMIRescueAppletPack_
- filepath_r:
- "C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe" -service -sid "" -wd "C:\Users\Virtual\AppData\Local\Temp"
- desired_access:
- 983551
- service_handle:
- 0x007b7268
- error_control:
- 1
- service_type:
- 16
- service_manager_handle:
- 0x007b7308
|
This sample contains high entropy sections
- Section:
- .rsrc, at virtual address 0x0001f000
- Entropy:
- 7.99004514235
Deletes its original binary from disk
- File:
- C:\Users\Virtual\AppData\Local\Temp\fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94.exe