File name:

Bank-Details,pdf.iso

Full analysis: https://app.any.run/tasks/ac32cc52-e41e-4f33-88e5-194c24d18860
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: May 15, 2019, 10:27:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
nanocore
trojan
Indicators:
MIME: application/x-iso9660-image
File info: ISO 9660 CD-ROM filesystem data 'Bank-Details,pdf'
MD5:

31B2CF5B8C52FC6EC292B5447F3EDE3F

SHA1:

1FDAB5A80FAF4F7B9B794EF0008524633D3D528F

SHA256:

32B93C5F77590E2252FA3D8143DC50C510702AC8AF608127754A4ABF48FC5D8A

SSDEEP:

12288:KquErHF6xC9D6DmR1J98w4oknqO2CyQfSMmgKXISdiepD4DvXhBBv:/rl6kD68JmloLQfliISdiep0vxz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Bank-Details,pdf.exe (PID: 1888)
    • NanoCore was detected

      • RegAsm.exe (PID: 3508)
    • Changes the autorun value in the registry

      • Bank-Details,pdf.exe (PID: 1888)
    • Connects to CnC server

      • RegAsm.exe (PID: 3508)
  • SUSPICIOUS

    • Creates files in the user directory

      • Bank-Details,pdf.exe (PID: 1888)
      • RegAsm.exe (PID: 3508)
    • Executable content was dropped or overwritten

      • Bank-Details,pdf.exe (PID: 1888)
      • WinRAR.exe (PID: 3708)
  • INFO

    • Modifies the open verb of a shell class

      • rundll32.exe (PID: 1372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.gmc | Game Music Creator Music (13.5)
.abr | Adobe PhotoShop Brush (12)

EXIF

ISO

System: Win32
VolumeName: Bank-Details,pdf
VolumeBlockCount: 318
VolumeBlockSize: 2048
RootDirectoryCreateDate: 2019:05:13 23:52:57+00:00
Software: PowerISO
VolumeCreateDate: 2019:05:13 23:52:57.00+00:00
VolumeModifyDate: 2019:05:13 23:52:57.00+00:00

Composite

VolumeSize: 636 kB
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winrar.exe bank-details,pdf.exe #NANOCORE regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
1372"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\Bank-Details,pdf.iso.gmcC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1888"C:\Users\admin\Desktop\Bank-Details,pdf.exe" C:\Users\admin\Desktop\Bank-Details,pdf.exe
explorer.exe
User:
admin
Company:
auditpol
Integrity Level:
MEDIUM
Description:
tcblaunch
Exit code:
0
Version:
971.71.969.521
Modules
Images
c:\users\admin\desktop\bank-details,pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3508"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
Bank-Details,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
2.0.50727.5420 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\regasm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
3708"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Bank-Details,pdf.iso.gmc"C:\Program Files\WinRAR\WinRAR.exe
rundll32.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
1 245
Read events
1 080
Write events
163
Delete events
2

Modification events

(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:LangID
Value:
0904
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Value:
Adobe Acrobat Reader DC
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\eHome\ehshell.exe
Value:
Windows Media Center
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Internet Explorer\iexplore.exe
Value:
Internet Explorer
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\system32\mspaint.exe
Value:
Paint
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\system32\NOTEPAD.EXE
Value:
Notepad
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\PROGRA~1\MICROS~1\Office14\OIS.EXE
Value:
Microsoft Office 2010
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Opera\Opera.exe
Value:
Opera Internet Browser
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Windows Photo Viewer\PhotoViewer.dll
Value:
Windows Photo Viewer
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\VideoLAN\VLC\vlc.exe
Value:
VLC media player
Executable files
2
Suspicious files
3
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\settings.bak
MD5:
SHA256:
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dattext
MD5:
SHA256:
3708WinRAR.exeC:\Users\admin\Desktop\Bank-Details,pdf.exeexecutable
MD5:
SHA256:
1888Bank-Details,pdf.exeC:\Users\admin\AppData\Roaming\PackageInspector\ie4uinit.exeexecutable
MD5:
SHA256:
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\catalog.datbs
MD5:0A9C5EAE8756D6FC90F59D8D71A79E1E
SHA256:B1921EA14C66927397BAF3FA456C22B93C30C3DE23546087C0B18551CE5001C5
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\storage.datbinary
MD5:4D784935677AE26ACDC3FB84FA1E6CF8
SHA256:C77E2D82DB9066E4DBFDE3AE0461A4259505F435EC0DB2CE3BD005BE0E2DE67C
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\settings.binbinary
MD5:ACD3FB4310417DC77FE06F15B0E353E6
SHA256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
90

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3508
RegAsm.exe
8.8.8.8:53
Google Inc.
US
malicious
3508
RegAsm.exe
41.231.120.14:1986
kaykayblessed1.ddns.net
Tunisia BackBone AS
TN
malicious

DNS requests

Domain
IP
Reputation
kaykayblessed1.ddns.net
  • 41.231.120.14
malicious

Threats

PID
Process
Class
Message
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
52 ETPRO signatures available at the full report
No debug info