analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://realdealhouse.eu/Old/GID.exe

Full analysis: https://app.any.run/tasks/648080fa-9ce0-4ccd-976e-52f70ada453f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 17, 2019, 14:34:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
rat
nanocore
trojan
Indicators:
MD5:

1A9EE59D817E5BC4BE2048B1ED56E985

SHA1:

8BA2F98B9EBD011215B3F87CE1500A43EE64EC49

SHA256:

30D52E4D8B777DEF724574C896AC95FF4753FBDCAEA0368A5446DE0E99514A27

SSDEEP:

3:N1KMfBsiB5sh0dAn:CMqMsCC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • GID[1].exe (PID: 2672)
      • GID[1].exe (PID: 2828)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3244)
    • Changes the autorun value in the registry

      • GID[1].exe (PID: 2828)
    • NanoCore was detected

      • GID[1].exe (PID: 2828)
    • Connects to CnC server

      • GID[1].exe (PID: 2828)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2972)
      • iexplore.exe (PID: 3244)
      • GID[1].exe (PID: 2828)
    • Application launched itself

      • GID[1].exe (PID: 2672)
    • Cleans NTFS data-stream (Zone Identifier)

      • GID[1].exe (PID: 2828)
    • Connects to unusual port

      • GID[1].exe (PID: 2828)
    • Creates files in the user directory

      • GID[1].exe (PID: 2828)
  • INFO

    • Creates files in the user directory

      • iexplore.exe (PID: 3244)
      • iexplore.exe (PID: 2972)
    • Changes internet zones settings

      • iexplore.exe (PID: 2972)
    • Application launched itself

      • iexplore.exe (PID: 2972)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start iexplore.exe iexplore.exe gid[1].exe no specs #NANOCORE gid[1].exe

Process information

PID
CMD
Path
Indicators
Parent process
2972"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3244"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2972 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2672"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\GID[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\GID[1].exeiexplore.exe
User:
admin
Company:
zoomed
Integrity Level:
MEDIUM
Description:
Uzaron
Exit code:
0
Version:
6.07.0009
2828C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\GID[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\GID[1].exe
GID[1].exe
User:
admin
Company:
zoomed
Integrity Level:
MEDIUM
Description:
Uzaron
Version:
6.07.0009
Total events
643
Read events
590
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
5
Text files
4
Unknown types
5

Dropped files

PID
Process
Filename
Type
2972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
2972iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2972iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF266E3716C9147FDB.TMP
MD5:
SHA256:
2972iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFC7402FC00AE79A88.TMP
MD5:
SHA256:
2972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{182EA061-1A65-11E9-AA93-5254004A04AF}.dat
MD5:
SHA256:
2828GID[1].exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe\:Zone.Identifier:$DATA
MD5:
SHA256:
3244iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\JavaDeployReg.logtext
MD5:1F5EF9CC9BDADDD024AC35ED178541E2
SHA256:642623EDF3505419C5DD53F3E4F5416E7FDBCE223608B64B81077F4B2AFD967F
3244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019011720190118\index.datdat
MD5:E4C70CF95903935A21708B8D6FF67B05
SHA256:099DB1DA8A32717B520976BD633C558BA7583FDC0E05BC8BACA328D50DC30D44
2972iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\GID[1].exeexecutable
MD5:75C97ED6174903D8193B29A0B9EBF18F
SHA256:62E3F710874C774200473A6DF0AA6A2408B7A77C211F7B2CA9A82FEA1FA9C365
2828GID[1].exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exeexecutable
MD5:75C97ED6174903D8193B29A0B9EBF18F
SHA256:62E3F710874C774200473A6DF0AA6A2408B7A77C211F7B2CA9A82FEA1FA9C365
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
6
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3244
iexplore.exe
GET
200
92.62.131.38:80
http://realdealhouse.eu/Old/GID.exe
LT
executable
506 Kb
suspicious
2972
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3244
iexplore.exe
92.62.131.38:80
realdealhouse.eu
UAB Baltnetos komunikacijos
LT
suspicious
2828
GID[1].exe
192.152.0.51:2017
Choopa, LLC
US
malicious
2972
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2828
GID[1].exe
8.8.8.8:53
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
realdealhouse.eu
  • 92.62.131.38
suspicious
godsblessing.gotdns.ch
  • 0.0.0.0
unknown

Threats

PID
Process
Class
Message
3244
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2828
GID[1].exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
2828
GID[1].exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
2828
GID[1].exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
2828
GID[1].exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
2828
GID[1].exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
2828
GID[1].exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
2828
GID[1].exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
2828
GID[1].exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
2828
GID[1].exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
16 ETPRO signatures available at the full report
No debug info