| File name: | Hiroshima-Stresser.rar |
| Full analysis: | https://app.any.run/tasks/1b699344-046a-4a3f-a79f-a0c5768a716d |
| Verdict: | Malicious activity |
| Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
| Analysis date: | August 26, 2020, 13:42:37 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v4, os: Win32 |
| MD5: | F0A251B88415552E65365CB22552C90B |
| SHA1: | 4EE9D76E8602EA407989C4D1CE735EA8C54AD655 |
| SHA256: | 0C06556CF1CB738640054CCB25D9A3CA0AD9F107B902DC18B422AB669B8737E3 |
| SSDEEP: | 98304:kN78YKC9fy6Pv6Z2SFO79A9yLZkjuKveTupTgqmQrlZWL9KzX6jY/lUADf9WjcL:kzH9fyIwTFu92UZWK6vrlMLM6mK6 |
| .rar | | | RAR compressed archive (v-4.x) (58.3) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (41.6) |
| CompressedSize: | 59 |
|---|---|
| UncompressedSize: | 21 |
| OperatingSystem: | Win32 |
| ModifyDate: | 2018:04:14 20:23:13 |
| PackingMethod: | Stored |
| ArchivedFileName: | Password.txt |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 352 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | — | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1336 | netsh firewall add allowedprogram "C:\Users\admin\AppData\Roaming\windows.exe" "windows.exe" ENABLE | C:\Windows\system32\netsh.exe | — | windows.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1500 | "C:\Windows\system32\taskmgr.exe" /4 | C:\Windows\system32\taskmgr.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Task Manager Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2060 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Hiroshima-Stresser.rar" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 2264 | "C:\Users\admin\Desktop\HiroshimaStresser\Stresser\HiroshimaStresser (64-bit).exe" | C:\Users\admin\Desktop\HiroshimaStresser\Stresser\HiroshimaStresser (64-bit).exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2572 | "C:\Users\admin\Desktop\HiroshimaStresser\HiroshimaStresser (64-bit).exe" | C:\Users\admin\Desktop\HiroshimaStresser\HiroshimaStresser (64-bit).exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2620 | "C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIb2060.24256\Password.txt | C:\Windows\system32\NOTEPAD.EXE | — | WinRAR.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3376 | "C:\Users\admin\AppData\Roaming\windows.exe" | C:\Users\admin\AppData\Roaming\windows.exe | HiroshimaStresser (64-bit).exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3464 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3936 | "C:\Users\admin\Desktop\HiroshimaStresser\Stresser\HiroshimaStresser (64-bit).exe" | C:\Users\admin\Desktop\HiroshimaStresser\Stresser\HiroshimaStresser (64-bit).exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\139\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\139\52C64B7E |
| Operation: | write | Name: | @C:\Windows\system32\NetworkExplorer.dll,-1 |
Value: Network | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Hiroshima-Stresser.rar | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2060) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\139\52C64B7E |
| Operation: | write | Name: | @C:\Windows\system32\notepad.exe,-469 |
Value: Text Document | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\HiroshimaStresser (64-bit).exe | executable | |
MD5:— | SHA256:— | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb2060.24256\Password.txt | text | |
MD5:— | SHA256:— | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\ABY URUCHOMIC TEN PROGRAM OBEJRZ FILM DO KONCA!.txt | text | |
MD5:— | SHA256:— | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\Plugin\Engine\api-ms-win-core-debug-l1-1-0.dll | executable | |
MD5:64978E199A7239D2C911876447A7F05B | SHA256:92B947F1D6236F86ED7E105CFF19E23C13D1968861426511B775905E1D26B47A | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\Plugin\ch.dll | executable | |
MD5:E747FA3339C1F138B6BFCE707B541D03 | SHA256:6E31148CC1B3235B71731C3944A7B06F861E104E978708D12C695EC09B5B3760 | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\Plugin\Engine\api-ms-win-core-datetime-l1-1-0.dll | executable | |
MD5:9F3CF9F22836C32D988D7C7E0A977E1B | SHA256:7D588A5A958E32875D7BD346D1371E6EBFD9D5D2EDE47755942BADFC9C74E207 | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\Plugin\Engine\api-ms-win-core-file-l2-1-0.dll | executable | |
MD5:B9287EB7BCBFDCEC2E8D4198FD266509 | SHA256:096409422ECD1894E4D6289FD2D1C7490BD83DAFF0C1E3D16C36C78BD477B895 | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\Plugin\Engine\api-ms-win-core-file-l1-1-0.dll | executable | |
MD5:D826D27C73D9F2420FB39FBE0745C7F0 | SHA256:C0E5D482BD93BF71A73C01D0C1EC0722EA3260EBA1F4C87E797BAE334B5E9870 | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\Plugin\Engine\api-ms-win-core-errorhandling-l1-1-0.dll | executable | |
MD5:9D74D89F2679C0C5DDB35A1EF30BD182 | SHA256:E207FFC6FEF144E5D393E79DE75F8F20D223F1AC33A011EEB822D30FA2031046 | |||
| 2060 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2060.25020\HiroshimaStresser\HiroshimaStresser.dat | binary | |
MD5:797B96CC417D0CDE72E5C25D0898E95E | SHA256:8A0675001B5BC63D8389FC7ED80B4A7B0F9538C744350F00162533519E106426 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 8.8.8.8:53 | — | Google Inc. | US | malicious |
2572 | HiroshimaStresser (64-bit).exe | 8.8.8.8:53 | — | Google Inc. | US | malicious |
Domain | IP | Reputation |
|---|---|---|
francja.ddns.net |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
1048 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2572 | HiroshimaStresser (64-bit).exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |