File name: | navo injector.exe |
Full analysis: | https://app.any.run/tasks/e174c66f-9d90-44cd-bbfc-8102410490ce |
Verdict: | Malicious activity |
Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
Analysis date: | December 05, 2022, 20:26:37 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
MD5: | 0F9BDF2FC233C87E902837B604EAD227 |
SHA1: | 4EDF7509CA41BD1F3987E78121D49754A45A4012 |
SHA256: | 52CC04A4BFADDB79CC9EF0CA2230FB34FB587D10850A4F42E2693A57FA395183 |
SSDEEP: | 6144:ULV6Bta6dtJmakIM5oimbbwWIBj45KJl97Q6:ULV6BtpmkA/WIBjzTQ6 |
.exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
.exe | | | Win64 Executable (generic) (23.8) |
.dll | | | Win32 Dynamic Link Library (generic) (5.6) |
.exe | | | Win32 Executable (generic) (3.8) |
.exe | | | Generic Win/DOS Executable (1.7) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 2015-Feb-22 00:49:37 |
e_magic: | MZ |
e_cblp: | 144 |
e_cp: | 3 |
e_crlc: | 0 |
e_cparhdr: | 4 |
e_minalloc: | 0 |
e_maxalloc: | 65535 |
e_ss: | 0 |
e_sp: | 184 |
e_csum: | 0 |
e_ip: | 0 |
e_cs: | 0 |
e_ovno: | 0 |
e_oemid: | 0 |
e_oeminfo: | 0 |
e_lfanew: | 128 |
Signature: | PE |
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 3 |
TimeDateStamp: | 2015-Feb-22 00:49:37 |
PointerToSymbolTable: | 0 |
NumberOfSymbols: | 0 |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 8192 | 116632 | 116736 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.59806 |
.reloc | 131072 | 12 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.10191 |
.rsrc | 139264 | 90136 | 90624 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.99677 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 7.99785 | 90048 | Latin 1 / Western European | UNKNOWN | RT_RCDATA |
mscoree.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2436 | "C:\Users\admin\AppData\Local\Temp\navo injector.exe" | C:\Users\admin\AppData\Local\Temp\navo injector.exe | Explorer.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3308 | "C:\Users\admin\AppData\Local\Temp\navo injector.exe" | C:\Users\admin\AppData\Local\Temp\navo injector.exe | navo injector.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
3664 | "schtasks.exe" /create /f /tn "TCP Monitor" /xml "C:\Users\admin\AppData\Local\Temp\tmpFCC4.tmp" | C:\Windows\system32\schtasks.exe | — | navo injector.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3816 | "schtasks.exe" /create /f /tn "TCP Monitor Task" /xml "C:\Users\admin\AppData\Local\Temp\tmpFD23.tmp" | C:\Windows\system32\schtasks.exe | — | navo injector.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (2436) navo injector.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | TCP Monitor |
Value: C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe | |||
(PID) Process: | (2436) navo injector.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (2436) navo injector.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (2436) navo injector.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (2436) navo injector.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (3308) navo injector.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | TCP Monitor |
Value: C:\Program Files\TCP Monitor\tcpmon.exe | |||
(PID) Process: | (3308) navo injector.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
Operation: | delete value | Name: | TCP Monitor |
Value: C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe |
PID | Process | Filename | Type | |
---|---|---|---|---|
2436 | navo injector.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dat | binary | |
MD5:A78DAB804C6C97C50902EE4837EEF282 | SHA256:01B9B5B8298DA4293EC906901CB8130028107D61B21FB5132A81D9C01380EE61 | |||
3308 | navo injector.exe | C:\Program Files\TCP Monitor\tcpmon.exe | executable | |
MD5:0F9BDF2FC233C87E902837B604EAD227 | SHA256:52CC04A4BFADDB79CC9EF0CA2230FB34FB587D10850A4F42E2693A57FA395183 | |||
3308 | navo injector.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\task.dat | text | |
MD5:9DD90EC4898B37F58CF6BEFF5B2064A8 | SHA256:28DEA2AB272073F7827A5681AC18F5EA7652BA8F1CBAC14B5AF704535E55F909 | |||
3308 | navo injector.exe | C:\Users\admin\AppData\Local\Temp\tmpFD23.tmp | xml | |
MD5:E4118E3EC98934AA1D4235C87B44AA31 | SHA256:EFC475D73603DF6A26978D7BCAC27004830137E97FDD1656140B4A08C07470D9 | |||
3308 | navo injector.exe | C:\Users\admin\AppData\Local\Temp\tmpFCC4.tmp | xml | |
MD5:CA71DE771F1AE20A8E568E6AED83B02E | SHA256:265207025D25F4FF82641DC81B1EDD3FFFB08D2A4F70141A2CB004F57F4CFF88 | |||
2436 | navo injector.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe | executable | |
MD5:0F9BDF2FC233C87E902837B604EAD227 | SHA256:52CC04A4BFADDB79CC9EF0CA2230FB34FB587D10850A4F42E2693A57FA395183 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3308 | navo injector.exe | 172.17.240.1:54984 | baitpl.ddns.net | — | — | unknown |
— | — | 192.168.100.19:57624 | — | — | — | malicious |
— | — | 192.168.100.19:57705 | — | — | — | malicious |
— | — | 192.168.100.19:57665 | — | — | — | malicious |
Domain | IP | Reputation |
---|---|---|
baitpl.ddns.net |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
3308 | navo injector.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3308 | navo injector.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3308 | navo injector.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3308 | navo injector.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3308 | navo injector.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
3308 | navo injector.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |