URL:

http://193.233.191.81/ESA.exe

Full analysis: https://app.any.run/tasks/ae1a1cb4-ea1d-4459-8125-b7ba58bce843
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 27, 2022, 10:01:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
rat
nanocore
Indicators:
MD5:

1C17E6F48F214EBCF21597833E25AFCC

SHA1:

BB08BBE49C7B393AA3CB0629C40D0FECD59A980E

SHA256:

498B2A18C252D967830BA9683CC268FF84C8080B8852F13997B4299ED3AC90BD

SSDEEP:

3:N1KkWjtFULNzCN:CkWHULNzCN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ESA.exe (PID: 2996)
      • ESA.exe (PID: 2576)
    • Drops executable file immediately after starts

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 964)
      • ESA.exe (PID: 2576)
    • NANOCORE was detected

      • ESA.exe (PID: 2576)
    • Uses Task Scheduler to run other applications

      • ESA.exe (PID: 2576)
    • Changes the autorun value in the registry

      • ESA.exe (PID: 2576)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 1020)
      • schtasks.exe (PID: 3028)
    • NANOCORE detected by memory dumps

      • ESA.exe (PID: 2576)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 964)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 964)
      • iexplore.exe (PID: 2848)
      • ESA.exe (PID: 2576)
    • Drops a file with a compile date too recent

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 964)
      • ESA.exe (PID: 2576)
    • Checks supported languages

      • ESA.exe (PID: 2996)
      • ESA.exe (PID: 2576)
    • Application launched itself

      • ESA.exe (PID: 2996)
    • Reads the computer name

      • ESA.exe (PID: 2996)
      • ESA.exe (PID: 2576)
    • Creates a directory in Program Files

      • ESA.exe (PID: 2576)
    • Creates files in the program directory

      • ESA.exe (PID: 2576)
    • Creates files in the user directory

      • ESA.exe (PID: 2576)
    • Cleans NTFS data-stream (Zone Identifier)

      • ESA.exe (PID: 2576)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 964)
      • explorer.exe (PID: 2076)
      • schtasks.exe (PID: 1020)
      • schtasks.exe (PID: 3028)
      • explorer.exe (PID: 4092)
    • Reads the computer name

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 964)
      • explorer.exe (PID: 2076)
      • schtasks.exe (PID: 3028)
      • explorer.exe (PID: 4092)
      • schtasks.exe (PID: 1020)
    • Application launched itself

      • iexplore.exe (PID: 2848)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2848)
    • Changes internet zones settings

      • iexplore.exe (PID: 2848)
    • Manual execution by user

      • ESA.exe (PID: 2996)
      • explorer.exe (PID: 2076)
      • explorer.exe (PID: 4092)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 2848)
    • Reads internet explorer settings

      • iexplore.exe (PID: 964)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2848)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2848)
    • Creates files in the user directory

      • iexplore.exe (PID: 2848)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2848)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Nanocore

(PID) Process(2576) ESA.exe
KeyboardLoggingTrue
BuildTime2022-06-21 00:20:18.352616
Version1.2.2.0
Mutexc0ed5ae2-6aea-454f-992c-400e6f33163e
DefaultGroupDefault
PrimaryConnectionHost
BackupConnectionHostcraigjonson99.zapto.org
ConnectionPort2010
RunOnStartupTrue
RequestElevationFalse
BypassUserAccountControlTrue
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
8
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe explorer.exe no specs esa.exe #NANOCORE esa.exe schtasks.exe no specs schtasks.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
964"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2848 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\iertutil.dll
1020"schtasks.exe" /create /f /tn "TCP Monitor" /xml "C:\Users\admin\AppData\Local\Temp\tmp5800.tmp"C:\Windows\system32\schtasks.exeESA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
2076"C:\Windows\explorer.exe" C:\Windows\explorer.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2576"C:\Users\admin\Downloads\ESA.exe"C:\Users\admin\Downloads\ESA.exe
ESA.exe
User:
admin
Company:
Broker Associate
Integrity Level:
HIGH
Description:
PolicyLevel
Exit code:
0
Version:
4.0.0.0
Modules
Images
c:\users\admin\downloads\esa.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Nanocore
(PID) Process(2576) ESA.exe
KeyboardLoggingTrue
BuildTime2022-06-21 00:20:18.352616
Version1.2.2.0
Mutexc0ed5ae2-6aea-454f-992c-400e6f33163e
DefaultGroupDefault
PrimaryConnectionHost
BackupConnectionHostcraigjonson99.zapto.org
ConnectionPort2010
RunOnStartupTrue
RequestElevationFalse
BypassUserAccountControlTrue
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
2848"C:\Program Files\Internet Explorer\iexplore.exe" "http://193.233.191.81/ESA.exe"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2996"C:\Users\admin\Downloads\ESA.exe" C:\Users\admin\Downloads\ESA.exe
Explorer.EXE
User:
admin
Company:
Broker Associate
Integrity Level:
HIGH
Description:
PolicyLevel
Exit code:
0
Version:
4.0.0.0
Modules
Images
c:\users\admin\downloads\esa.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3028"schtasks.exe" /create /f /tn "TCP Monitor Task" /xml "C:\Users\admin\AppData\Local\Temp\tmp584F.tmp"C:\Windows\system32\schtasks.exeESA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
4092"C:\Windows\explorer.exe" C:\Windows\explorer.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
Total events
7 613
Read events
7 480
Write events
131
Delete events
2

Modification events

(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30968332
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30968332
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2848) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
4
Suspicious files
9
Text files
19
Unknown types
5

Dropped files

PID
Process
Filename
Type
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
964iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\ESA[1].exeexecutable
MD5:
SHA256:
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:
SHA256:
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:
SHA256:
2848iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF7D2A4A56D63F2C4D.TMPgmc
MD5:
SHA256:
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:
SHA256:
964iexplore.exeC:\Users\admin\Downloads\ESA.exe.yu9n2vg.partialexecutable
MD5:
SHA256:
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:
SHA256:
2848iexplore.exeC:\Users\admin\Downloads\ESA.exeexecutable
MD5:
SHA256:
2848iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\1XSR4EHX.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
29
DNS requests
18
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
964
iexplore.exe
GET
200
193.233.191.81:80
http://193.233.191.81/ESA.exe
RU
executable
1.33 Mb
suspicious
2848
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2848
iexplore.exe
GET
200
23.216.77.132:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8b525615f1002530
US
compressed
4.70 Kb
whitelisted
2848
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2848
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2848
iexplore.exe
23.216.77.132:80
ctldl.windowsupdate.com
NTT DOCOMO, INC.
US
unknown
2848
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2848
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2848
iexplore.exe
96.16.143.41:443
go.microsoft.com
Akamai International B.V.
US
whitelisted
2848
iexplore.exe
20.25.53.147:443
query.prod.cms.msn.com
US
unknown
13.107.40.203:443
www.msn.com
Microsoft Corporation
US
whitelisted
2848
iexplore.exe
204.79.197.200:443
ieonline.microsoft.com
Microsoft Corporation
US
whitelisted
2576
ESA.exe
185.102.170.106:2010
craigjonson99.zapto.org
MOD Mission Critical
ES
malicious
964
iexplore.exe
193.233.191.81:80
OOO FREEnet Group
RU
suspicious
185.102.170.106:2010
craigjonson99.zapto.org
MOD Mission Critical
ES
malicious

DNS requests

Domain
IP
Reputation
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
ctldl.windowsupdate.com
  • 23.216.77.132
  • 23.216.77.146
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
ieonline.microsoft.com
  • 204.79.197.200
whitelisted
go.microsoft.com
  • 96.16.143.41
whitelisted
www.msn.com
  • 13.107.40.203
whitelisted

Threats

PID
Process
Class
Message
964
iexplore.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
964
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
964
iexplore.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
No debug info