analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Bank-Details,pdf.iso

Full analysis: https://app.any.run/tasks/ac32cc52-e41e-4f33-88e5-194c24d18860
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: May 15, 2019, 10:27:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
nanocore
trojan
Indicators:
MIME: application/x-iso9660-image
File info: ISO 9660 CD-ROM filesystem data 'Bank-Details,pdf'
MD5:

31B2CF5B8C52FC6EC292B5447F3EDE3F

SHA1:

1FDAB5A80FAF4F7B9B794EF0008524633D3D528F

SHA256:

32B93C5F77590E2252FA3D8143DC50C510702AC8AF608127754A4ABF48FC5D8A

SSDEEP:

12288:KquErHF6xC9D6DmR1J98w4oknqO2CyQfSMmgKXISdiepD4DvXhBBv:/rl6kD68JmloLQfliISdiep0vxz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Bank-Details,pdf.exe (PID: 1888)
    • Changes the autorun value in the registry

      • Bank-Details,pdf.exe (PID: 1888)
    • NanoCore was detected

      • RegAsm.exe (PID: 3508)
    • Connects to CnC server

      • RegAsm.exe (PID: 3508)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Bank-Details,pdf.exe (PID: 1888)
      • WinRAR.exe (PID: 3708)
    • Creates files in the user directory

      • Bank-Details,pdf.exe (PID: 1888)
      • RegAsm.exe (PID: 3508)
  • INFO

    • Modifies the open verb of a shell class

      • rundll32.exe (PID: 1372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.gmc | Game Music Creator Music (13.5)
.abr | Adobe PhotoShop Brush (12)

EXIF

Composite

VolumeSize: 636 kB

ISO

VolumeModifyDate: 2019:05:13 23:52:57.00+00:00
VolumeCreateDate: 2019:05:13 23:52:57.00+00:00
Software: PowerISO
RootDirectoryCreateDate: 2019:05:13 23:52:57+00:00
VolumeBlockSize: 2048
VolumeBlockCount: 318
VolumeName: Bank-Details,pdf
System: Win32
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winrar.exe bank-details,pdf.exe #NANOCORE regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
1372"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\Bank-Details,pdf.iso.gmcC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3708"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Bank-Details,pdf.iso.gmc"C:\Program Files\WinRAR\WinRAR.exe
rundll32.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1888"C:\Users\admin\Desktop\Bank-Details,pdf.exe" C:\Users\admin\Desktop\Bank-Details,pdf.exe
explorer.exe
User:
admin
Company:
auditpol
Integrity Level:
MEDIUM
Description:
tcblaunch
Version:
971.71.969.521
Modules
Images
c:\users\admin\desktop\bank-details,pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3508"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
Bank-Details,pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
2.0.50727.5420 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\regasm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
Total events
1 245
Read events
1 080
Write events
163
Delete events
2

Modification events

(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:LangID
Value:
0904
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Value:
Adobe Acrobat Reader DC
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\eHome\ehshell.exe
Value:
Windows Media Center
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Internet Explorer\iexplore.exe
Value:
Internet Explorer
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\system32\mspaint.exe
Value:
Paint
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\system32\NOTEPAD.EXE
Value:
Notepad
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\PROGRA~1\MICROS~1\Office14\OIS.EXE
Value:
Microsoft Office 2010
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Opera\Opera.exe
Value:
Opera Internet Browser
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Windows Photo Viewer\PhotoViewer.dll
Value:
Windows Photo Viewer
(PID) Process:(1372) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\VideoLAN\VLC\vlc.exe
Value:
VLC media player
Executable files
2
Suspicious files
3
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\settings.bak
MD5:
SHA256:
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dattext
MD5:E9FBD602B8CD93D3F15B09A5CE5D67A3
SHA256:6422CC29DDC15BD45AAE9923F9426B1DDB795F7897C56A138F42E66ADB2D0EC9
3708WinRAR.exeC:\Users\admin\Desktop\Bank-Details,pdf.exeexecutable
MD5:DEE7441FE5F431248E69CB64E33D785D
SHA256:3513EE721E00C39B65661A6AF712977E805006D53E265BEE9FCB827E8688078E
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\catalog.datbs
MD5:0A9C5EAE8756D6FC90F59D8D71A79E1E
SHA256:B1921EA14C66927397BAF3FA456C22B93C30C3DE23546087C0B18551CE5001C5
1888Bank-Details,pdf.exeC:\Users\admin\AppData\Roaming\PackageInspector\ie4uinit.exeexecutable
MD5:933F07FF16E4B0C483A163F18B9F2BE6
SHA256:FBF3FD7550B94A4A16D1A29F26259265812EDF3C2AFC21E333E09D052E885F33
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\storage.datbinary
MD5:4D784935677AE26ACDC3FB84FA1E6CF8
SHA256:C77E2D82DB9066E4DBFDE3AE0461A4259505F435EC0DB2CE3BD005BE0E2DE67C
3508RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\settings.binbinary
MD5:ACD3FB4310417DC77FE06F15B0E353E6
SHA256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3508
RegAsm.exe
8.8.8.8:53
Google Inc.
US
whitelisted
3508
RegAsm.exe
41.231.120.14:1986
kaykayblessed1.ddns.net
Tunisia BackBone AS
TN
malicious

DNS requests

Domain
IP
Reputation
kaykayblessed1.ddns.net
  • 41.231.120.14
malicious

Threats

PID
Process
Class
Message
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3508
RegAsm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
52 ETPRO signatures available at the full report
No debug info