analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

CR-02352018huete.exe

Full analysis: https://app.any.run/tasks/3f0b3cc6-06a3-4d58-bf83-7a85488b132d
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: November 08, 2018, 15:34:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
nanocore
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

B96EB1826677BAC09D05A306BE168E42

SHA1:

2DD2408DB2FE41383013D64CB72525F34333E9F1

SHA256:

5FD340D1D7D884F4DB22BF8CEE6F7E0DABD5B14EA28975E0F4C9F9BCB614AB3C

SSDEEP:

12288:CpoX82cpBor8h6qhAsCs5xVaaVXC858OLJmgJKgDzdyYopM+wOGGxFmhicuKM4Xl:IJM8lhrPaa5C8fLLJ1zdyYx+wXLNuK30

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • CR-02352018huete.exe (PID: 2672)
    • NanoCore was detected

      • RegAsm.exe (PID: 1692)
  • SUSPICIOUS

    • Creates files in the user directory

      • RegAsm.exe (PID: 1692)
    • Executable content was dropped or overwritten

      • CR-02352018huete.exe (PID: 2672)
    • Connects to unusual port

      • RegAsm.exe (PID: 1692)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

ProductName: 7cfbf389-4756-4aec-a451-bbebaff9d94c
ProductVersion: 1.0.0.0
FileVersion: 1.0.0.0
OriginalFileName: 53228577-eb64-45c5-b01f-6facc9c4e5e1.exe
LegalCopyright: ea960e05-bd9e-4b9f-aab9-4db678c99500
FileDescription: 1116f6ae-7329-43b9-bcfc-e3e683ddf94
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Unknown (0)
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0xb93ce
UninitializedDataSize: -
InitializedDataSize: 2048
CodeSize: 750592
LinkerVersion: 6
PEType: PE32
TimeStamp: 2018:11:08 09:25:09+01:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cr-02352018huete.exe #NANOCORE regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
2672"C:\Users\admin\AppData\Local\Temp\CR-02352018huete.exe" C:\Users\admin\AppData\Local\Temp\CR-02352018huete.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
1116f6ae-7329-43b9-bcfc-e3e683ddf94
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\cr-02352018huete.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1692"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
CR-02352018huete.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
Total events
21
Read events
20
Write events
1
Delete events
0

Modification events

(PID) Process:(2672) CR-02352018huete.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:uytyuu
Value:
C:\Users\admin\ghjjkhjkhjk.exe
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2672CR-02352018huete.exeC:\Users\admin\ghjjkhjkhjk.exeexecutable
MD5:B96EB1826677BAC09D05A306BE168E42
SHA256:5FD340D1D7D884F4DB22BF8CEE6F7E0DABD5B14EA28975E0F4C9F9BCB614AB3C
1692RegAsm.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.datbinary
MD5:5F0D233CD44F95AFED313130ACD87EFF
SHA256:4B539CDD6DC04E0AC9A0A2B59D9026E553B954BA65886EBAC88D7AF26F63E54B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
55
DNS requests
28
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1692
RegAsm.exe
8.8.8.8:53
Google Inc.
US
whitelisted
1692
RegAsm.exe
185.125.205.68:4769
rwjsock.ddns.net
DE
malicious
8.8.8.8:53
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
rwjsock.ddns.net
  • 185.125.205.68
malicious

Threats

PID
Process
Class
Message
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
1692
RegAsm.exe
A Network Trojan was detected
SC BAD_UNKNOWN DYNAMIC_DNS Query to a Suspicious *.ddns.net Domain
No debug info