analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://onedrive.live.com/download?cid=FD85A84D08E04A01&resid=FD85A84D08E04A01%213870&authkey=AI43anftE_popaU

Full analysis: https://app.any.run/tasks/73c18ca8-9635-48cf-9c27-fff006502173
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: April 23, 2019, 10:02:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
nanocore
trojan
Indicators:
MD5:

D967DE010B144F95AE3F092DDE2746AE

SHA1:

D13C70251D8486FF330B2B41486658CCF9EB8CED

SHA256:

298E5A2AD55A2165A82FAF1179D8286EB11726B38E9C442643049C5F2FED1A00

SSDEEP:

3:N8Ck3CTwKblOL0VWZjVWpoYQLplx3RoZn:2CkST/ZOYVWZjVWpbgphO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Envoy - NEW PO # .exe (PID: 2988)
      • Envoy - NEW PO # .exe (PID: 3360)
    • Changes the autorun value in the registry

      • Envoy - NEW PO # .exe (PID: 3360)
    • NanoCore was detected

      • Envoy - NEW PO # .exe (PID: 3360)
    • Connects to CnC server

      • Envoy - NEW PO # .exe (PID: 3360)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • firefox.exe (PID: 2940)
      • WinRAR.exe (PID: 2476)
      • Envoy - NEW PO # .exe (PID: 3360)
    • Creates files in the user directory

      • Envoy - NEW PO # .exe (PID: 3360)
    • Application launched itself

      • Envoy - NEW PO # .exe (PID: 2988)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 2940)
    • Reads settings of System Certificates

      • firefox.exe (PID: 2940)
    • Reads CPU info

      • firefox.exe (PID: 2940)
    • Creates files in the user directory

      • firefox.exe (PID: 2940)
    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 2940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe winrar.exe envoy - new po # .exe no specs #NANOCORE envoy - new po # .exe

Process information

PID
CMD
Path
Indicators
Parent process
2940"C:\Program Files\Mozilla Firefox\firefox.exe" https://onedrive.live.com/download?cid=FD85A84D08E04A01&resid=FD85A84D08E04A01%213870&authkey=AI43anftE_popaUC:\Program Files\Mozilla Firefox\firefox.exe
explorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
65.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
3848"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.0.2043988810\2020664593" -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - "C:\Users\admin\AppData\LocalLow\Mozilla\Temp-{ce348e4c-7d33-445e-89f9-60108c51bcaf}" 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 1144 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
65.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2792"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.6.181342058\1657285712" -childID 1 -isForBrowser -prefsHandle 1772 -prefMapHandle 1768 -prefsLen 1 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 1620 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
1032"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.13.902693856\1542022406" -childID 2 -isForBrowser -prefsHandle 2604 -prefMapHandle 2608 -prefsLen 216 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 2620 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2520"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2940.20.531869807\1414960890" -childID 3 -isForBrowser -prefsHandle 2976 -prefMapHandle 3292 -prefsLen 5824 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2940 "\\.\pipe\gecko-crash-server-pipe.2940" 3568 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2476"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Envoy - NEW PO # .ace"C:\Program Files\WinRAR\WinRAR.exe
firefox.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2988"C:\Users\admin\AppData\Local\Temp\Rar$EXa2476.26182\Envoy - NEW PO # .exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2476.26182\Envoy - NEW PO # .exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2476.26182\envoy - new po # .exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3360"C:\Users\admin\AppData\Local\Temp\Rar$EXa2476.26182\Envoy - NEW PO # .exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2476.26182\Envoy - NEW PO # .exe
Envoy - NEW PO # .exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2476.26182\envoy - new po # .exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shlwapi.dll
Total events
1 713
Read events
1 674
Write events
39
Delete events
0

Modification events

(PID) Process:(2940) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2940) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2940) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2940) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2940) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ace\OpenWithProgids
Operation:writeName:WinRAR
Value:
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2476) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Envoy - NEW PO # .ace
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
Executable files
3
Suspicious files
48
Text files
31
Unknown types
44

Dropped files

PID
Process
Filename
Type
2940firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\trash13622
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cert9.db-journal
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\test-malware-simple.sbstore
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\test-malware-simple.pset
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\test-phish-simple.sbstore
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\test-phish-simple.pset
MD5:
SHA256:
2940firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\test-unwanted-simple.sbstore
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
32
DNS requests
64
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2940
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2940
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2940
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2940
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
2940
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2940
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
2940
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/GTSGIAG3
US
der
471 b
whitelisted
2940
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2940
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2940
firefox.exe
GET
200
173.223.11.152:80
http://detectportal.firefox.com/success.txt
NL
text
8 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2940
firefox.exe
143.204.205.62:443
snippets.cdn.mozilla.net
US
unknown
2940
firefox.exe
13.107.42.13:443
onedrive.live.com
Microsoft Corporation
US
malicious
2940
firefox.exe
172.217.16.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
2940
firefox.exe
172.217.16.138:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2940
firefox.exe
173.223.11.152:80
detectportal.firefox.com
Akamai International B.V.
NL
whitelisted
2940
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2940
firefox.exe
52.27.229.90:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
2940
firefox.exe
52.42.122.34:443
shavar.services.mozilla.com
Amazon.com, Inc.
US
unknown
2940
firefox.exe
143.204.214.45:443
firefox.settings.services.mozilla.com
US
unknown
2940
firefox.exe
13.107.42.12:443
c9bd2g.dm.files.1drv.com
Microsoft Corporation
US
suspicious

DNS requests

Domain
IP
Reputation
onedrive.live.com
  • 13.107.42.13
shared
detectportal.firefox.com
  • 173.223.11.152
  • 173.223.11.143
  • 173.223.11.159
  • 173.223.11.160
  • 2.16.186.112
  • 2.16.186.50
whitelisted
l-0004.l-msedge.net
  • 13.107.42.13
whitelisted
a1089.dscd.akamai.net
  • 173.223.11.160
  • 173.223.11.159
  • 173.223.11.143
  • 173.223.11.152
  • 2.16.186.50
  • 2.16.186.112
whitelisted
search.services.mozilla.com
  • 52.27.229.90
  • 52.10.42.204
  • 54.200.51.65
whitelisted
search.r53-2.services.mozilla.com
  • 54.200.51.65
  • 52.10.42.204
  • 52.27.229.90
whitelisted
tiles.services.mozilla.com
  • 52.43.91.152
  • 52.10.122.55
  • 52.26.103.165
  • 52.34.132.219
  • 52.35.250.5
  • 52.42.232.148
  • 52.43.40.243
  • 35.165.22.140
whitelisted
tiles.r53-2.services.mozilla.com
  • 35.165.22.140
  • 52.43.40.243
  • 52.42.232.148
  • 52.35.250.5
  • 52.34.132.219
  • 52.26.103.165
  • 52.10.122.55
  • 52.43.91.152
whitelisted
snippets.cdn.mozilla.net
  • 143.204.205.62
whitelisted
drcwo519tnci7.cloudfront.net
  • 143.204.205.62
shared

Threats

PID
Process
Class
Message
2940
firefox.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3360
Envoy - NEW PO # .exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
16 ETPRO signatures available at the full report
No debug info