analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Poinex_Protector_Crack.rar

Full analysis: https://app.any.run/tasks/85ee4ef2-43dd-46e1-a348-9ecd35ed2b66
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: February 10, 2019, 17:10:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
nanocore
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

1D69ADDD20435255C22F4C4C326ED6AD

SHA1:

63CC9D0B7ED24D80454DA3E1BFE46AE2934FEFB9

SHA256:

50F452009FAAA3EF443A201B17C2ACB7739F42B787BB26C050546D0748DA9D77

SSDEEP:

98304:wOvigXND3AijcFsVMiU2VoWARfHIPSzMpq:x6ulpcFsVMi1A1HsCQq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Poinex Protector Crack.exe (PID: 3144)
      • dotNET_Reactor.exe (PID: 3712)
      • mpress.exe (PID: 2504)
    • NanoCore was detected

      • RegAsm.exe (PID: 2428)
    • Changes the autorun value in the registry

      • Poinex Protector Crack.exe (PID: 3144)
    • Loads dropped or rewritten executable

      • dotNET_Reactor.exe (PID: 3712)
  • SUSPICIOUS

    • Application launched itself

      • RegAsm.exe (PID: 2428)
    • Creates files in the user directory

      • RegAsm.exe (PID: 2428)
      • Poinex Protector Crack.exe (PID: 3144)
      • dotNET_Reactor.exe (PID: 3712)
    • Executable content was dropped or overwritten

      • Poinex Protector Crack.exe (PID: 3144)
      • WinRAR.exe (PID: 3072)
      • dotNET_Reactor.exe (PID: 3712)
    • Creates files in the program directory

      • dotNET_Reactor.exe (PID: 3712)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
6
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start winrar.exe poinex protector crack.exe #NANOCORE regasm.exe no specs regasm.exe dotnet_reactor.exe mpress.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3072"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Poinex_Protector_Crack.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3144"C:\Users\admin\AppData\Local\Temp\Rar$EXa3072.18558\Poinex Protector Crack.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3072.18558\Poinex Protector Crack.exe
WinRAR.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Update Setup
Exit code:
0
Version:
1.3.33.23
2428"{path}"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
Poinex Protector Crack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
2700"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
RegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
3712"C:\Users\admin\Desktop\dotNET_Reactor.exe" C:\Users\admin\Desktop\dotNET_Reactor.exe
explorer.exe
User:
admin
Company:
EZIRIZ
Integrity Level:
MEDIUM
Description:
.NET Reactor
Exit code:
0
Version:
4.4.7.5
2504"C:\Users\admin\Desktop\mpress.exe" C:\Users\admin\Desktop\mpress.exeexplorer.exe
User:
admin
Company:
MATCODE Software
Integrity Level:
MEDIUM
Description:
Matcode comPRESSor
Exit code:
1
Version:
2.19
Total events
521
Read events
483
Write events
38
Delete events
0

Modification events

(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3072) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Poinex_Protector_Crack.rar
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3072) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
6
Suspicious files
4
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
3072WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3072.24482\Extensions\dotNET_Reactor.exe
MD5:
SHA256:
3072WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3072.24482\Extensions\mpress.exe
MD5:
SHA256:
3712dotNET_Reactor.exeC:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\be0d863bc6a6168bd3d445f568518309_90059c37-1320-41a4-b58d-2b75a9850d2f
MD5:
SHA256:
3712dotNET_Reactor.exeC:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\f64079fec74e82c3b76586e364ff0fba_90059c37-1320-41a4-b58d-2b75a9850d2fbinary
MD5:BF95402EFCE459A02487214F8F2000D5
SHA256:117328171304ADD9F56678F052570AC4EC3AE4626684CCCEB131F67BED92272E
3072WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3072.18558\Poinex Protector Crack.exeexecutable
MD5:4EA3911D3FE1E62D7A0560AC24BC5891
SHA256:AD0CCBD9479C6B83BC8F587FBB72C2342C2ECEA371BE8936A747CD0B6DB26AA4
3144Poinex Protector Crack.exeC:\Users\admin\AppData\Roaming\Google Update\Google Update.exeexecutable
MD5:4EA3911D3FE1E62D7A0560AC24BC5891
SHA256:AD0CCBD9479C6B83BC8F587FBB72C2342C2ECEA371BE8936A747CD0B6DB26AA4
3712dotNET_Reactor.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\d27d17407ceee51793eb01d84bec195a_90059c37-1320-41a4-b58d-2b75a9850d2fbinary
MD5:65E3232646FFCBBF0D2E977BD57A48DD
SHA256:01781AB65E8A2EFD7389E3E7DA6ABEBE855714BE551D14D04E8A7E3299B9E4E6
3712dotNET_Reactor.exeC:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\ffa9c41a4eda3ab4abc009acdcc3bcaa_90059c37-1320-41a4-b58d-2b75a9850d2fdbf
MD5:AABA8058CF556C59DCDA03FA7F822127
SHA256:92BBDDEF6DB7CD3759A967839892F17E72505291B504D6D2D709A196FAE131C1
2428RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dattext
MD5:3098B14D53AC8439B76A0DF372C839A8
SHA256:2A43B75861D6082C15241584DA4449BB4701FCBE9B613BED7EF0D4A88E5CCDF3
3072WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3072.18558\Extensions\mpress.exeexecutable
MD5:8B632BFC3FE653A510CBA277C2D699D1
SHA256:2852680C94A9D68CDAB285012D9328A1CECA290DB60C9E35155C2BB3E46A41B4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info