analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe

Full analysis: https://app.any.run/tasks/4f4b53bc-eb26-41ea-8879-663b5a5608aa
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: May 24, 2019, 09:13:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
nanocore
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

9FE4583D6DBCB75BB3A78571CF5F7E23

SHA1:

85841C97BCD738062D9F4D85A20064ED156C21AE

SHA256:

1EA88A8FD950D305AB01B9333B2F5044687B56B4A24B488F72B6E04A9E91EEEF

SSDEEP:

6144:YbplS62q8qANhVD/2m50A9WOfX50ODRWxwGSRc:g8XNHDKiWOfXVnC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs app for hidden code execution

      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 3124)
    • Changes the autorun value in the registry

      • reg.exe (PID: 2796)
      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 2364)
    • Writes to a start menu file

      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 3124)
    • NanoCore was detected

      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 2364)
  • SUSPICIOUS

    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 3320)
    • Starts CMD.EXE for commands execution

      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 3124)
    • Creates files in the user directory

      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 3124)
      • cmd.exe (PID: 3320)
      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 2364)
    • Executable content was dropped or overwritten

      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 3124)
      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 2364)
    • Application launched itself

      • 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe (PID: 3124)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:05:22 05:13:45+02:00
PEType: PE32
LinkerVersion: 8
CodeSize: 244224
InitializedDataSize: 203776
UninitializedDataSize: -
EntryPoint: 0x3d9ae
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 12.0.4518.1014
ProductVersionNumber: 12.0.4518.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileDescription: Microsoft Office Word
FileVersion: 12.0.4518.1014
InternalName: WinWord
LegalCopyright: © 2006 Microsoft Corporation. All rights reserved.
LegalTrademarks1: Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2: Windows® is a registered trademark of Microsoft Corporation.
OriginalFileName: WinWord.exe
ProductName: 2007 Microsoft Office system
ProductVersion: 12.0.4518.1014

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 22-May-2019 03:13:45

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 22-May-2019 03:13:45
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x0003B9B4
0x0003BA00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.87228
.rsrc
0x0003E000
0x0003186E
0x00031A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.17159
.reloc
0x00070000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.43424
1188
Latin 1 / Western European
UNKNOWN
RT_VERSION
2
3.70321
67624
Latin 1 / Western European
UNKNOWN
RT_ICON
3
3.98289
38056
Latin 1 / Western European
UNKNOWN
RT_ICON
4
4.07556
21640
Latin 1 / Western European
UNKNOWN
RT_ICON
5
3.94091
16936
Latin 1 / Western European
UNKNOWN
RT_ICON
6
4.18196
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
7
4.14977
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
8
4.66295
2440
Latin 1 / Western European
UNKNOWN
RT_ICON
9
4.27799
1128
Latin 1 / Western European
UNKNOWN
RT_ICON

Imports

mscoree.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe cmd.exe no specs reg.exe #NANOCORE 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe

Process information

PID
CMD
Path
Indicators
Parent process
3124"C:\Users\admin\AppData\Local\Temp\1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe" C:\Users\admin\AppData\Local\Temp\1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office Word
Version:
12.0.4518.1014
3320"cmd.exe"C:\Windows\system32\cmd.exe1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2796reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\admin\AppData\Roaming\Purchase Order \Purchase Order.exe.lnk" /fC:\Windows\system32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2364"C:\Users\admin\AppData\Local\Temp\1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe"C:\Users\admin\AppData\Local\Temp\1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe
1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office Word
Version:
12.0.4518.1014
Total events
190
Read events
188
Write events
2
Delete events
0

Modification events

(PID) Process:(2796) reg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
Operation:writeName:Load
Value:
C:\Users\admin\AppData\Roaming\Purchase Order \Purchase Order.exe.lnk
(PID) Process:(2364) 1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:TCP Monitor
Value:
C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe
Executable files
2
Suspicious files
0
Text files
3
Unknown types
1

Dropped files

PID
Process
Filename
Type
31241ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Purchase Order.exe.lnklnk
MD5:F193FDB3F9FA5D237A4EAF082D229C7A
SHA256:526E8E322EA5BB2C7E132ABFE5CD5F9A95DC6A87CA22429B8A951C1AEE6FEFFD
23641ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dattext
MD5:37971E1586A2D15B322F301C76326DE2
SHA256:D82F9AF421E6D678A924FC84302F68B69922DE0B66F3F6637B5738B9E37F520D
23641ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exeexecutable
MD5:9FE4583D6DBCB75BB3A78571CF5F7E23
SHA256:1EA88A8FD950D305AB01B9333B2F5044687B56B4A24B488F72B6E04A9E91EEEF
31241ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exeC:\Users\admin\AppData\Roaming\Purchase Order\Purchase Order.exe.battext
MD5:768FA794591B53CA967F5FA7556FEB83
SHA256:288307913B360181241A3FC5EB6107E4E7F5689D952E66F08B9A3D1DCB76B246
3320cmd.exeC:\Users\admin\AppData\Roaming\Purchasetext
MD5:13098DF6145080CD4469F6481DCDEAA5
SHA256:F588F0905992077A3968DC542D97FB84BAA358A1735AD661D27EC981EBA3197F
31241ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exeC:\Users\admin\AppData\Local\Temp\svhost.exeexecutable
MD5:2E5F1CF69F92392F8829FC9C9263AE9B
SHA256:51985A57E085D8B17042F0CDC1F905380B792854733EB3275FD8FCE4E3BB886B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2364
1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe
129.205.113.169:7979
blazemark.hopto.org
NG
unknown
2364
1ea88a8fd950d305ab01b9333b2f5044687b56b4a24b488f72b6e04a9e91eeef.exe
8.8.8.8:53
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
blazemark.hopto.org
  • 129.205.113.169
malicious

Threats

No threats detected
No debug info