File name:

Mapper.exe

Full analysis: https://app.any.run/tasks/e6c98157-55ac-4da5-a6e6-c808522c07ce
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: May 12, 2020, 11:54:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
quasar
nanocore
trojan
revenge
evasion
njrat
bladabindi
Indicators:
MIME: application/x-dosexec
File info: MS-DOS executable, MZ for MS-DOS
MD5:

98AC460A2B3FC533B8B79578A7FDBC25

SHA1:

CB28A131ED822403102327C29666E00E8BEFBD09

SHA256:

3923F959AE515F42F63A35B42424F03178ACDF93B11AA658016FDAF1F58EE9DA

SSDEEP:

24576:PFOa4ApfB6WaQuQ60aGqGJ7R9yQgAp7LE3CKL4aN5QTUD:tsAf6KNNOfk2CKc8QTU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • mapper.exe  (PID: 3624)
      • ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE (PID: 1400)
      • 4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE (PID: 2484)
      • YU52DNMOTGN5ZNYX3JATRTORSTIKBUWB..EXE (PID: 3580)
      • IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE (PID: 3336)
      • WinUp.exe (PID: 1548)
      • WinSaro.exe (PID: 4004)
    • Drops/Copies Quasar RAT executable

      • mapper.exe  (PID: 3624)
      • IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE (PID: 3336)
    • Changes the autorun value in the registry

      • 4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE (PID: 2484)
      • explorer.exe (PID: 1340)
      • svchost.exe (PID: 1156)
    • NANOCORE was detected

      • 4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE (PID: 2484)
    • Disables Windows Defender

      • reg.exe (PID: 2876)
      • reg.exe (PID: 3036)
      • reg.exe (PID: 3128)
      • reg.exe (PID: 2804)
      • reg.exe (PID: 988)
    • Uses Task Scheduler to run other applications

      • svchost.exe (PID: 1156)
      • cmd.exe (PID: 3384)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3876)
      • schtasks.exe (PID: 312)
      • schtasks.exe (PID: 3864)
      • schtasks.exe (PID: 3040)
      • schtasks.exe (PID: 2720)
      • schtasks.exe (PID: 3500)
      • schtasks.exe (PID: 1452)
      • schtasks.exe (PID: 2316)
    • Connects to CnC server

      • 4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE (PID: 2484)
      • ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE (PID: 1400)
    • Modifies Windows Defender service settings

      • reg.exe (PID: 956)
    • Uses Task Scheduler to autorun other applications

      • IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE (PID: 3336)
      • WinUp.exe (PID: 1548)
    • REVENGE was detected

      • ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE (PID: 1400)
    • QUASAR was detected

      • IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE (PID: 3336)
      • WinUp.exe (PID: 1548)
    • NJRAT was detected

      • ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE (PID: 1400)
  • SUSPICIOUS

    • Creates files in the Windows directory

      • Mapper.exe (PID: 2068)
      • icsys.icn.exe (PID: 4000)
      • explorer.exe (PID: 1340)
      • spoolsv.exe (PID: 3100)
    • Executable content was dropped or overwritten

      • Mapper.exe (PID: 2068)
      • mapper.exe  (PID: 3624)
      • 4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE (PID: 2484)
      • icsys.icn.exe (PID: 4000)
      • explorer.exe (PID: 1340)
      • spoolsv.exe (PID: 3100)
      • IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE (PID: 3336)
      • ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE (PID: 1400)
    • Starts application with an unusual extension

      • Mapper.exe (PID: 2068)
    • Creates files in the program directory

      • 4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE (PID: 2484)
      • firefox.exe (PID: 3616)
    • Starts itself from another location

      • Mapper.exe (PID: 2068)
      • explorer.exe (PID: 1340)
      • spoolsv.exe (PID: 3100)
      • IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE (PID: 3336)
      • ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE (PID: 1400)
    • Creates files in the user directory

      • 4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE (PID: 2484)
      • IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE (PID: 3336)
      • ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE (PID: 1400)
    • Starts CMD.EXE for commands execution

      • YU52DNMOTGN5ZNYX3JATRTORSTIKBUWB..EXE (PID: 3580)
    • Removes files from Windows directory

      • icsys.icn.exe (PID: 4000)
      • explorer.exe (PID: 1340)
      • spoolsv.exe (PID: 3100)
    • Creates executable files which already exist in Windows

      • icsys.icn.exe (PID: 4000)
      • spoolsv.exe (PID: 3100)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 3384)
    • Creates or modifies windows services

      • reg.exe (PID: 3840)
      • reg.exe (PID: 4072)
      • reg.exe (PID: 3968)
      • reg.exe (PID: 660)
    • Checks for external IP

      • IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE (PID: 3336)
      • WinUp.exe (PID: 1548)
  • INFO

    • Manual execution by user

      • firefox.exe (PID: 1504)
    • Application launched itself

      • firefox.exe (PID: 1504)
      • firefox.exe (PID: 3616)
    • Reads Internet Cache Settings

      • firefox.exe (PID: 3616)
      • pingsender.exe (PID: 3200)
    • Creates files in the user directory

      • firefox.exe (PID: 3616)
    • Reads CPU info

      • firefox.exe (PID: 3616)
    • Adds / modifies Windows certificates

      • pingsender.exe (PID: 3200)
    • Changes settings of System certificates

      • pingsender.exe (PID: 3200)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:04:01 09:08:22+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 106496
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x290c
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
ProductName: Project1
FileVersion: 1
ProductVersion: 1
InternalName: TJprojMain
OriginalFileName: TJprojMain.exe

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 01-Apr-2013 07:08:22
Detected languages:
  • English - United States
ProductName: Project1
FileVersion: 1.00
ProductVersion: 1.00
InternalName: TJprojMain
OriginalFilename: TJprojMain.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000B8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 01-Apr-2013 07:08:22
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000191D4
0x0001A000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.7348
.data
0x0001B000
0x0000180C
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0001D000
0x000013F0
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.08232

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.71018
999
UNKNOWN
English - United States
RT_MANIFEST
30001
3.33035
3280
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

MSVBVM60.DLL
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
102
Monitored processes
55
Malicious processes
12
Suspicious processes
7

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start mapper.exe mapper.exe  #NANOCORE 4oe2zzkxte9thibwcirpmcf5ah9lpc5b..exe #QUASAR imimoiaxjzqye5vbzedxoxzpiryyh1qn..exe #REVENGE ornehj7wkotlqepxqsxvmntlcbvxlmq4..exe yu52dnmotgn5znyx3jatrtorstikbuwb..exe no specs icsys.icn.exe cmd.exe no specs explorer.exe reg.exe no specs reg.exe no specs spoolsv.exe reg.exe no specs svchost.exe reg.exe no specs reg.exe no specs spoolsv.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs schtasks.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs schtasks.exe no specs reg.exe no specs #QUASAR winup.exe firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe pingsender.exe schtasks.exe no specs winsaro.exe no specs mapper.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
312schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /DisableC:\Windows\system32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
620reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /fC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
660reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /fC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
744reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /fC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
956reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /fC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
988reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /fC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1156c:\windows\resources\svchost.exec:\windows\resources\svchost.exe
spoolsv.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\resources\svchost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1340c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe
icsys.icn.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\resources\themes\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1356reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /fC:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1400"C:\Users\admin\AppData\Local\Temp\ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE" C:\Users\admin\AppData\Local\Temp\ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE
mapper.exe 
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ornehj7wkotlqepxqsxvmntlcbvxlmq4..exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
2 761
Read events
1 129
Write events
1 118
Delete events
514

Modification events

(PID) Process:(2068) Mapper.exeKey:HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(3624) mapper.exe Key:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3624) mapper.exe Key:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2484) 4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:TCP Monitor
Value:
C:\Program Files\TCP Monitor\tcpmon.exe
(PID) Process:(4000) icsys.icn.exeKey:HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(1356) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
Operation:writeName:DisableAntiVirus
Value:
1
(PID) Process:(3056) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine
Operation:writeName:MpEnablePus
Value:
0
(PID) Process:(3096) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection
Operation:delete keyName:
Value:
(PID) Process:(3096) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
Operation:delete keyName:
Value:
(PID) Process:(3036) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
Operation:writeName:DisableAntiSpyware
Value:
1
Executable files
12
Suspicious files
32
Text files
18
Unknown types
22

Dropped files

PID
Process
Filename
Type
3720spoolsv.exeC:\Users\admin\AppData\Local\Temp\~DF891B65E7A24BA82B.TMP
MD5:
SHA256:
3100spoolsv.exeC:\Users\admin\AppData\Local\Temp\~DFF6B42E097C40FAD2.TMP
MD5:
SHA256:
4000icsys.icn.exeC:\Users\admin\AppData\Local\Temp\~DF3290596AF93CB474.TMP
MD5:
SHA256:
2068Mapper.exeC:\Users\admin\AppData\Local\Temp\~DF96CE729CC7AC1677.TMP
MD5:
SHA256:
3616firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3616firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
2068Mapper.exeC:\Windows\Resources\Themes\icsys.icn.exeexecutable
MD5:
SHA256:
3616firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
2068Mapper.exeC:\users\admin\appdata\local\temp\mapper.exe executable
MD5:
SHA256:
3624mapper.exe C:\Users\admin\AppData\Local\Temp\4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXEexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
21
DNS requests
53
Threats
130

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1548
WinUp.exe
GET
301
104.26.15.73:80
http://freegeoip.net/xml/
US
malicious
1548
WinUp.exe
GET
200
104.26.15.73:80
http://freegeoip.net/shutdown
US
html
1.51 Kb
malicious
3336
IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE
GET
200
208.95.112.1:80
http://ip-api.com/json/
unknown
text
295 b
malicious
1548
WinUp.exe
GET
200
54.225.178.192:80
http://api.ipify.org/
US
text
14 b
shared
1548
WinUp.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/
unknown
text
295 b
malicious
3616
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3616
firefox.exe
POST
200
216.58.207.67:80
http://ocsp.pki.goog/gts1o1
US
der
472 b
whitelisted
3616
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3616
firefox.exe
GET
200
23.14.92.66:80
http://detectportal.firefox.com/success.txt
NL
text
8 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1400
ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE
81.198.244.198:333
jideyes.ddns.net
SIA Lattelecom
LV
malicious
2484
4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE
81.198.244.198:54984
jideyes.ddns.net
SIA Lattelecom
LV
malicious
2484
4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE
8.8.8.8:53
Google Inc.
US
malicious
3336
IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE
208.95.112.1:80
ip-api.com
IBURST
malicious
1548
WinUp.exe
208.95.112.1:80
ip-api.com
IBURST
malicious
3616
firefox.exe
23.14.92.66:80
detectportal.firefox.com
Akamai International B.V.
NL
unknown
3616
firefox.exe
54.200.189.211:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
3616
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3616
firefox.exe
52.222.167.82:443
snippets.cdn.mozilla.net
Amazon.com, Inc.
US
whitelisted
3616
firefox.exe
52.33.116.145:443
push.services.mozilla.com
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
jideyes.ddns.net
  • 81.198.244.198
malicious
ip-api.com
  • 208.95.112.1
malicious
detectportal.firefox.com
  • 23.14.92.66
  • 23.14.92.17
whitelisted
a1089.dscd.akamai.net
  • 23.14.92.17
  • 23.14.92.66
whitelisted
search.services.mozilla.com
  • 54.200.189.211
  • 52.41.191.52
  • 34.211.106.52
whitelisted
search.r53-2.services.mozilla.com
  • 34.211.106.52
  • 52.41.191.52
  • 54.200.189.211
whitelisted
push.services.mozilla.com
  • 52.33.116.145
whitelisted
tiles.services.mozilla.com
whitelisted
snippets.cdn.mozilla.net
  • 52.222.167.82
  • 52.222.167.71
  • 52.222.167.93
  • 52.222.167.239
whitelisted
d228z91au11ukj.cloudfront.net
  • 52.222.167.239
  • 52.222.167.93
  • 52.222.167.71
  • 52.222.167.82
whitelisted

Threats

PID
Process
Class
Message
1052
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
2484
4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
2484
4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
2484
4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
2484
4OE2ZZKXTE9THIBWCIRPMCF5AH9LPC5B..EXE
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
1400
ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Revenge-RAT CnC Checkin
1400
ORNEHJ7WKOTLQEPXQSXVMNTLCBVXLMQ4..EXE
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
3336
IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
3336
IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
3336
IMIMOIAXJZQYE5VBZEDXOXZPIRYYH1QN..EXE
A Network Trojan was detected
REMOTE [PTsecurity] Quasar.RAT IP Lookup
69 ETPRO signatures available at the full report
No debug info