| File name: | Steam Wallet Hack 2019.rar |
| Full analysis: | https://app.any.run/tasks/e6347ea0-ce59-46b3-a4f5-b5299c8c1f01 |
| Verdict: | Malicious activity |
| Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
| Analysis date: | June 02, 2019, 13:50:45 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | B5FE71445503AAD8446FAF14199C224B |
| SHA1: | 2DA16D85A705545CB1AED71AFEFC73AB965020CA |
| SHA256: | 24C43A041F1EB7D7B0E8C047CE327C5234139DE2FFE7EBDF0016C380F9B288AD |
| SSDEEP: | 12288:5lN53Ex5/h5gwIw/mcHcQxyQ3BOwn9fa6Ac4HxEcyqfYsuXDO:fvUz/h5fIw1HVyU8846ADEcyqCDO |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 344 | cmd /c ""C:\Users\admin\AppData\Local\Temp\RarSFX0\joke.bat" " | C:\Windows\system32\cmd.exe | — | Steam Wallet Hack 2019.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1156 | "C:\Users\admin\AppData\Local\Temp\SVCHOST.EXE" | C:\Users\admin\AppData\Local\Temp\SVCHOST.EXE | svchost.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1460 | "schtasks.exe" /create /f /tn "TCP Monitor" /xml "C:\Users\admin\AppData\Local\Temp\tmp9185.tmp" | C:\Windows\system32\schtasks.exe | — | SVCHOST.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1716 | "C:\Users\admin\Desktop\Steam Wallet Hack 2019.exe" | C:\Users\admin\Desktop\Steam Wallet Hack 2019.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2072 | C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503} | C:\Windows\system32\DllHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2292 | "C:\Users\admin\AppData\Local\Temp\RarSFX1\svchost.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX1\svchost.exe | svchost.sfx.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 2460 | "C:\Users\admin\AppData\Local\Temp\3582-490\SVCHOST.EXE" | C:\Users\admin\AppData\Local\Temp\3582-490\SVCHOST.EXE | SVCHOST.EXE | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3240 | "schtasks.exe" /create /f /tn "TCP Monitor Task" /xml "C:\Users\admin\AppData\Local\Temp\tmp934B.tmp" | C:\Windows\system32\schtasks.exe | — | SVCHOST.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3272 | svchost.sfx.exe -p123 -dC:\Users\admin\AppData\Local\Temp | C:\Users\admin\AppData\Local\Temp\RarSFX0\svchost.sfx.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3932 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Steam Wallet Hack 2019.rar" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Steam Wallet Hack 2019.rar | |||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3932) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (1716) Steam Wallet Hack 2019.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR SFX |
| Operation: | write | Name: | C%%Users%admin%AppData%Local%Temp |
Value: C:\Users\admin\AppData\Local\Temp\RarSFX0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb3932.47191\Lang\EN.ini | — | |
MD5:— | SHA256:— | |||
| 3932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb3932.47191\Lang\FR.ini | — | |
MD5:— | SHA256:— | |||
| 3932 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb3932.47191\Steam Wallet Hack 2019.exe | — | |
MD5:— | SHA256:— | |||
| 2460 | SVCHOST.EXE | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dat | binary | |
MD5:— | SHA256:— | |||
| 1156 | SVCHOST.EXE | C:\ProgramData\Package Cache\{7e9fae12-5bbf-47fb-b944-09c49e75c061}\VC_redist.x86.exe | executable | |
MD5:— | SHA256:— | |||
| 2460 | SVCHOST.EXE | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\task.dat | text | |
MD5:— | SHA256:— | |||
| 2460 | SVCHOST.EXE | C:\Program Files\TCP Monitor\tcpmon.exe | executable | |
MD5:— | SHA256:— | |||
| 2460 | SVCHOST.EXE | C:\Users\admin\AppData\Local\Temp\tmp9185.tmp | xml | |
MD5:— | SHA256:— | |||
| 1156 | SVCHOST.EXE | C:\Users\admin\AppData\Local\Temp\tmp5023.tmp | binary | |
MD5:— | SHA256:— | |||
| 1156 | SVCHOST.EXE | C:\MSOCache\All Users\{90140000-003D-0000-0000-0000000FF1CE}-C\setup.exe | executable | |
MD5:566ED4F62FDC96F175AFEDD811FA0370 | SHA256:E17CD94C08FC0E001A49F43A0801CEA4625FB9AEE211B6DFEBEBEC446C21F460 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2460 | SVCHOST.EXE | 8.8.8.8:53 | — | Google Inc. | US | malicious |
2460 | SVCHOST.EXE | 8.8.4.4:53 | — | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
laruelavrai.ddns.net |
| unknown |
Process | Message |
|---|---|
svchost.exe | C:\Users\admin\AppData\Local\Temp\DEPOSITPHOTOS_160937332-STOCK-VIDEO-WHITE-WATER-VAPOUR-ON-BLACK.JPG |
svchost.exe | C:\Users\admin\AppData\Local\Temp\SVCHOST.EXE |