analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://193.233.191.81/ESA.exe

Full analysis: https://app.any.run/tasks/ae1a1cb4-ea1d-4459-8125-b7ba58bce843
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 27, 2022, 10:01:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
rat
nanocore
Indicators:
MD5:

1C17E6F48F214EBCF21597833E25AFCC

SHA1:

BB08BBE49C7B393AA3CB0629C40D0FECD59A980E

SHA256:

498B2A18C252D967830BA9683CC268FF84C8080B8852F13997B4299ED3AC90BD

SSDEEP:

3:N1KkWjtFULNzCN:CkWHULNzCN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • iexplore.exe (PID: 964)
      • iexplore.exe (PID: 2848)
      • ESA.exe (PID: 2576)
    • Application was dropped or rewritten from another process

      • ESA.exe (PID: 2996)
      • ESA.exe (PID: 2576)
    • NANOCORE was detected

      • ESA.exe (PID: 2576)
    • Changes the autorun value in the registry

      • ESA.exe (PID: 2576)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3028)
      • schtasks.exe (PID: 1020)
    • Uses Task Scheduler to run other applications

      • ESA.exe (PID: 2576)
    • NANOCORE detected by memory dumps

      • ESA.exe (PID: 2576)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 964)
    • Drops a file with a compile date too recent

      • iexplore.exe (PID: 964)
      • iexplore.exe (PID: 2848)
      • ESA.exe (PID: 2576)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 964)
      • iexplore.exe (PID: 2848)
      • ESA.exe (PID: 2576)
    • Checks supported languages

      • ESA.exe (PID: 2996)
      • ESA.exe (PID: 2576)
    • Reads the computer name

      • ESA.exe (PID: 2996)
      • ESA.exe (PID: 2576)
    • Application launched itself

      • ESA.exe (PID: 2996)
    • Creates a directory in Program Files

      • ESA.exe (PID: 2576)
    • Creates files in the program directory

      • ESA.exe (PID: 2576)
    • Creates files in the user directory

      • ESA.exe (PID: 2576)
    • Cleans NTFS data-stream (Zone Identifier)

      • ESA.exe (PID: 2576)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 964)
      • explorer.exe (PID: 2076)
      • schtasks.exe (PID: 1020)
      • schtasks.exe (PID: 3028)
      • explorer.exe (PID: 4092)
    • Reads the computer name

      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 964)
      • explorer.exe (PID: 2076)
      • schtasks.exe (PID: 1020)
      • schtasks.exe (PID: 3028)
      • explorer.exe (PID: 4092)
    • Changes internet zones settings

      • iexplore.exe (PID: 2848)
    • Application launched itself

      • iexplore.exe (PID: 2848)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2848)
    • Reads internet explorer settings

      • iexplore.exe (PID: 964)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2848)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2848)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 2848)
    • Manual execution by user

      • explorer.exe (PID: 2076)
      • ESA.exe (PID: 2996)
      • explorer.exe (PID: 4092)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2848)
    • Creates files in the user directory

      • iexplore.exe (PID: 2848)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Nanocore

(PID) Process(2576) ESA.exe
BackupDnsServer8.8.4.4
PrimaryDnsServer8.8.8.8
UseCustomDnsServerTrue
GCThreshold10485760
MaxPacketSize10485760
BufferSize65535
WanTimeout8000
LanTimeout2500
MutexTimeout5000
KeepAliveTimeout30000
TimeoutInterval5000
RestartDelay5000
ConnectDelay4000
RunDelay0
EnableDebugModeFalse
ActivateAwayModeFalse
PreventSystemSleepTrue
SetCriticalProcessFalse
ClearAccessControlFalse
ClearZoneIdentifierTrue
BypassUserAccountControlTrue
RequestElevationFalse
RunOnStartupTrue
ConnectionPort2010
BackupConnectionHostcraigjonson99.zapto.org
PrimaryConnectionHost
DefaultGroupDefault
Mutexc0ed5ae2-6aea-454f-992c-400e6f33163e
Version1.2.2.0
BuildTime2022-06-21 00:20:18.352616
KeyboardLoggingTrue
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
8
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe explorer.exe no specs esa.exe #NANOCORE esa.exe schtasks.exe no specs schtasks.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2848"C:\Program Files\Internet Explorer\iexplore.exe" "http://193.233.191.81/ESA.exe"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
964"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2848 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2076"C:\Windows\explorer.exe" C:\Windows\explorer.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2996"C:\Users\admin\Downloads\ESA.exe" C:\Users\admin\Downloads\ESA.exe
Explorer.EXE
User:
admin
Company:
Broker Associate
Integrity Level:
HIGH
Description:
PolicyLevel
Exit code:
0
Version:
4.0.0.0
2576"C:\Users\admin\Downloads\ESA.exe"C:\Users\admin\Downloads\ESA.exe
ESA.exe
User:
admin
Company:
Broker Associate
Integrity Level:
HIGH
Description:
PolicyLevel
Version:
4.0.0.0
Nanocore
(PID) Process(2576) ESA.exe
BackupDnsServer8.8.4.4
PrimaryDnsServer8.8.8.8
UseCustomDnsServerTrue
GCThreshold10485760
MaxPacketSize10485760
BufferSize65535
WanTimeout8000
LanTimeout2500
MutexTimeout5000
KeepAliveTimeout30000
TimeoutInterval5000
RestartDelay5000
ConnectDelay4000
RunDelay0
EnableDebugModeFalse
ActivateAwayModeFalse
PreventSystemSleepTrue
SetCriticalProcessFalse
ClearAccessControlFalse
ClearZoneIdentifierTrue
BypassUserAccountControlTrue
RequestElevationFalse
RunOnStartupTrue
ConnectionPort2010
BackupConnectionHostcraigjonson99.zapto.org
PrimaryConnectionHost
DefaultGroupDefault
Mutexc0ed5ae2-6aea-454f-992c-400e6f33163e
Version1.2.2.0
BuildTime2022-06-21 00:20:18.352616
KeyboardLoggingTrue
1020"schtasks.exe" /create /f /tn "TCP Monitor" /xml "C:\Users\admin\AppData\Local\Temp\tmp5800.tmp"C:\Windows\system32\schtasks.exeESA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3028"schtasks.exe" /create /f /tn "TCP Monitor Task" /xml "C:\Users\admin\AppData\Local\Temp\tmp584F.tmp"C:\Windows\system32\schtasks.exeESA.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
4092"C:\Windows\explorer.exe" C:\Windows\explorer.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
7 613
Read events
7 480
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
9
Text files
19
Unknown types
5

Dropped files

PID
Process
Filename
Type
2848iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{2ED2219E-F600-11EC-8C9F-1203334A04AF}.datbinary
MD5:04E2FDECECE5F206F75777639121B132
SHA256:A48E94F88323E1BB9FC100ECABBEFDD11836C356035C3693E272E4637E0FA797
964iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\ESA[1].exeexecutable
MD5:F3501C9A321F63EA0775D64BCAC3B7E3
SHA256:57021CDDDBD9FF28B441E701F8B838CE4AF2F56600CF6DA9889A59E6B97C0526
2848iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\MU0F9W3K.txttext
MD5:505F0AB64F4C51C938B916D8A76678B0
SHA256:C6E241C28597B83F1C83F986E4536524E7E7DDAD5C55702F39A303B463324D2B
2848iexplore.exeC:\Users\admin\Downloads\ESA.exeexecutable
MD5:456A6EF91770EC404CCD4F46876DB452
SHA256:96F9A412F050CC61F653F072924EE101AE2D5EAEC9B14964C656DE5A843B451C
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:28CC3D4B0DA8A29A9DCD6D4755C84342
SHA256:A4CA2DD1D4545838F7A9102623442BC76BDEB2185E9991A294BCB0B6456DDA0E
964iexplore.exeC:\Users\admin\Downloads\ESA.exe.yu9n2vg.partialexecutable
MD5:456A6EF91770EC404CCD4F46876DB452
SHA256:96F9A412F050CC61F653F072924EE101AE2D5EAEC9B14964C656DE5A843B451C
2848iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF7D2A4A56D63F2C4D.TMPgmc
MD5:5D5315C38727DB42691E60AEC617226A
SHA256:3FA7D1E827029514DB8DBBAB98BD1A4F891BD87DD9EBBAC86851DB46BF2F0E9B
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:991F8D2856E6614BD45C86F69C3A2E27
SHA256:E47DDC6589BA56B04BACBEB100C17F323AEC9CD0D35F482C8A64563B29B27E8E
2848iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{2562F37F-F600-11EC-8C9F-1203334A04AF}.datbinary
MD5:9036EF80698E305B8DB6621D21E8D0D4
SHA256:6AC8243A0C503FEECE864257CBD5B2A3F92BEB9A244922332ABD34DACC254D54
2848iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:790E40386A5478B54787C28956E029D7
SHA256:2A14CA44FA89C53F53111C7CAAE9155A460FA162BD822CCEAF7B7F74B8390557
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
29
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
964
iexplore.exe
GET
200
193.233.191.81:80
http://193.233.191.81/ESA.exe
RU
executable
1.33 Mb
suspicious
2848
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2848
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2848
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
2848
iexplore.exe
GET
200
23.216.77.132:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8b525615f1002530
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
964
iexplore.exe
193.233.191.81:80
OOO FREEnet Group
RU
suspicious
2848
iexplore.exe
204.79.197.200:443
ieonline.microsoft.com
Microsoft Corporation
US
whitelisted
2848
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2848
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
13.107.40.203:443
www.msn.com
Microsoft Corporation
US
whitelisted
2848
iexplore.exe
23.216.77.132:80
ctldl.windowsupdate.com
NTT DOCOMO, INC.
US
unknown
2848
iexplore.exe
131.253.33.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2848
iexplore.exe
96.16.143.41:443
go.microsoft.com
Akamai International B.V.
US
whitelisted
2576
ESA.exe
185.102.170.106:2010
craigjonson99.zapto.org
MOD Mission Critical
ES
malicious
185.102.170.106:2010
craigjonson99.zapto.org
MOD Mission Critical
ES
malicious

DNS requests

Domain
IP
Reputation
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
ctldl.windowsupdate.com
  • 23.216.77.132
  • 23.216.77.146
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
ieonline.microsoft.com
  • 204.79.197.200
whitelisted
go.microsoft.com
  • 96.16.143.41
whitelisted
www.msn.com
  • 13.107.40.203
whitelisted

Threats

PID
Process
Class
Message
964
iexplore.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
964
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
964
iexplore.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
2576
ESA.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.zapto .org
No debug info