| File name: | DOX-TOOL-V2.exe |
| Full analysis: | https://app.any.run/tasks/5a65dcbe-16b8-4dbe-94e8-0202dc770a36 |
| Verdict: | Malicious activity |
| Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
| Analysis date: | February 03, 2021, 15:50:40 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | E629DAF5CAF98A8F43C77ED984D26DE1 |
| SHA1: | F4C168C8E5E3CC778C14931341AAE8470A9CE256 |
| SHA256: | 0F38476DDB790B131788E795DBA0054509E2317630079C28FAF7C52D708123C0 |
| SSDEEP: | 6144:LSncRl4cUVhsGKFaDTz6TOyo652RLV6Bta6dtJmakIM5ex79PEQ8QVP:O4WZs3FaD36ayo7LV6BtpmkeQJ |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2011:07:03 11:05:04+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 31232 |
| InitializedDataSize: | 413696 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3248 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 03-Jul-2011 09:05:04 |
| Debug artifacts: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000E8 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 03-Jul-2011 09:05:04 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00007842 | 0x00007A00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.48777 |
.rdata | 0x00009000 | 0x0000319E | 0x00003200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.92389 |
.data | 0x0000D000 | 0x00001A84 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.57332 |
.rsrc | 0x0000F000 | 0x0005FB78 | 0x0005FC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.64388 |
.reloc | 0x0006F000 | 0x000013AA | 0x00001400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.12103 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
DOX TOOL V2.EXE | 5.43592 | 184320 | Latin 1 / Western European | UNKNOWN | RBIND |
DRIZZY DOX TOOL.EXE | 7.44769 | 207360 | Latin 1 / Western European | UNKNOWN | RBIND |
DROPIN | 2.25163 | 6 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
EXEC | 0 | 1 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
KERNEL32.dll |
SHELL32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1388 | "C:\Users\admin\AppData\Local\Temp\DOX-TOOL-V2.exe" | C:\Users\admin\AppData\Local\Temp\DOX-TOOL-V2.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
| 2300 | "C:\Users\admin\AppData\Local\Temp\DRIZZY DOX TOOL.EXE" | C:\Users\admin\AppData\Local\Temp\DRIZZY DOX TOOL.EXE | DOX-TOOL-V2.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3996 | "C:\Users\admin\AppData\Local\Temp\DOX TOOL V2.EXE" | C:\Users\admin\AppData\Local\Temp\DOX TOOL V2.EXE | DOX-TOOL-V2.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Dox Tool V2 Exit code: 0 Version: 2.0.0.1 Modules
| |||||||||||||||
| (PID) Process: | (1388) DOX-TOOL-V2.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1388) DOX-TOOL-V2.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2300) DRIZZY DOX TOOL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | TCP Monitor |
Value: C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe | |||
| (PID) Process: | (3996) DOX TOOL V2.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOX TOOL V2_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3996) DOX TOOL V2.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOX TOOL V2_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3996) DOX TOOL V2.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOX TOOL V2_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3996) DOX TOOL V2.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOX TOOL V2_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3996) DOX TOOL V2.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOX TOOL V2_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3996) DOX TOOL V2.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOX TOOL V2_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3996) DOX TOOL V2.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DOX TOOL V2_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2300 | DRIZZY DOX TOOL.EXE | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dat | text | |
MD5:— | SHA256:— | |||
| 1388 | DOX-TOOL-V2.exe | C:\Users\admin\AppData\Local\Temp\DRIZZY DOX TOOL.EXE | executable | |
MD5:— | SHA256:— | |||
| 2300 | DRIZZY DOX TOOL.EXE | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe | executable | |
MD5:— | SHA256:— | |||
| 1388 | DOX-TOOL-V2.exe | C:\Users\admin\AppData\Local\Temp\DOX TOOL V2.EXE | executable | |
MD5:3075FC835B4F3B7B20DFEE9ECC5DFAA0 | SHA256:81FDAF72BC2DE5CDEF33F74D867092172C40A5C1FE86C3313F9FCD0A0C22EAC8 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3996 | DOX TOOL V2.EXE | GET | 404 | 172.67.205.204:80 | http://drizzybot.com/releases/Newtonsoft.Json.dll | US | html | 707 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2300 | DRIZZY DOX TOOL.EXE | 8.8.8.8:53 | — | Google Inc. | US | malicious |
2300 | DRIZZY DOX TOOL.EXE | 176.191.132.201:1212 | zeus444.sytes.net | Bouygues Telecom SA | FR | malicious |
3996 | DOX TOOL V2.EXE | 172.67.205.204:80 | drizzybot.com | — | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
zeus444.sytes.net |
| malicious |
drizzybot.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3996 | DOX TOOL V2.EXE | Potential Corporate Privacy Violation | AV POLICY HTTP request for .dll file with no User-Agent |
Process | Message |
|---|---|
DOX-TOOL-V2.exe | C:\Users\admin\AppData\Local\Temp\DOX TOOL V2.EXE |
DOX-TOOL-V2.exe | C:\Users\admin\AppData\Local\Temp\DRIZZY DOX TOOL.EXE |