File name:

Netflix Account Checker 5.0.rar

Full analysis: https://app.any.run/tasks/d98015e4-10a1-4ffa-91b1-b94740f9865c
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: December 18, 2018, 20:44:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
rat
quasar
nanocore
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

3FE35F92135A5E0D88A8037291DDE0DA

SHA1:

F5D29001B472FB50CAA31212813C3CA8DEF48B0D

SHA256:

78A2BB7504392255C36812C4D4A0E8ADECA83BAAA02FDBB2A1ADCB7F7EFFEDAB

SSDEEP:

24576:Ak2N8LW6o5Z+ixZm4/XqsaN/8zhv/nHklQFZnAOupbJfk2Volk0nHZxJ9:YPLZ+14ism/8RfHklWZb6lfNoi0nzJ9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • Regasm.exe (PID: 3080)
    • QUASAR was detected

      • Regasm.exe (PID: 3080)
    • Application was dropped or rewritten from another process

      • Netflix Account Checker 5.0.exe (PID: 3808)
      • AdobeFlash.exe (PID: 3676)
    • Connects to CnC server

      • Regasm.exe (PID: 3080)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1224)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Netflix Account Checker 5.0.exe (PID: 3808)
      • WinRAR.exe (PID: 2880)
    • Starts itself from another location

      • Netflix Account Checker 5.0.exe (PID: 3808)
    • Connects to unusual port

      • Regasm.exe (PID: 3080)
    • Reads Internet Cache Settings

      • Regasm.exe (PID: 3080)
    • Checks for external IP

      • Regasm.exe (PID: 3080)
    • Loads DLL from Mozilla Firefox

      • Regasm.exe (PID: 3080)
    • Creates files in the user directory

      • Regasm.exe (PID: 3080)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
5
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start winrar.exe searchprotocolhost.exe no specs netflix account checker 5.0.exe adobeflash.exe #QUASAR regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
1224"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe6_ Global\UsGthrCtrlFltPipeMssGthrPipe6 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2880"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Netflix Account Checker 5.0.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3080"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regasm.exe
AdobeFlash.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
3676"C:\Users\admin\AppData\Local\Temp\AdobeFlash.exe" C:\Users\admin\AppData\Local\Temp\AdobeFlash.exe
Netflix Account Checker 5.0.exe
User:
admin
Company:
CPUID Hardware Monitor
Integrity Level:
MEDIUM
Description:
HWMonitor.exe
Exit code:
0
Version:
1.3.4.0
Modules
Images
c:\users\admin\appdata\local\temp\adobeflash.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3808"C:\Users\admin\Desktop\Netflix Account Checker 5.0.exe" C:\Users\admin\Desktop\Netflix Account Checker 5.0.exe
explorer.exe
User:
admin
Company:
CPUID Hardware Monitor
Integrity Level:
MEDIUM
Description:
HWMonitor.exe
Exit code:
0
Version:
1.3.4.0
Modules
Images
c:\users\admin\desktop\netflix account checker 5.0.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 216
Read events
1 180
Write events
36
Delete events
0

Modification events

(PID) Process:(2880) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2880) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2880) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2880) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Netflix Account Checker 5.0.rar
(PID) Process:(2880) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2880) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2880) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2880) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3808) Netflix Account Checker 5.0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\Run\CurrentVersion
Operation:writeName:AdobeFlash.exe
Value:
C:\Users\admin\AppData\Local\Temp\AdobeFlash.exe
(PID) Process:(3808) Netflix Account Checker 5.0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
4
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3080Regasm.exeC:\Users\admin\AppData\Roaming\Logs\12-18-2018binary
MD5:
SHA256:
3808Netflix Account Checker 5.0.exeC:\Users\admin\AppData\Local\Temp\AdobeFlash.exeexecutable
MD5:
SHA256:
2880WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2880.42935\Netflix Account Checker 5.0.exeexecutable
MD5:
SHA256:
2880WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2880.42935\Newtonsoft.Json.dllexecutable
MD5:C53737821B861D454D5248034C3C097C
SHA256:575E30F98E4EA42C9E516EDC8BBB29AD8B50B173A3E6B36B5BA39E133CCE9406
2880WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2880.42935\MahApps.Metro.dllexecutable
MD5:FB1E8EEE84791CC015E043AB0CE32BBA
SHA256:0DE72DA4BC2D16D39C30368AF880D754FA0BD9745897652BA50213E589D265C5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3080
Regasm.exe
GET
200
185.194.141.58:80
http://ip-api.com/json/
DE
text
347 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3080
Regasm.exe
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
3080
Regasm.exe
193.56.28.161:4782
repmodz11.duckdns.org
malicious

DNS requests

Domain
IP
Reputation
ip-api.com
  • 185.194.141.58
malicious
repmodz11.duckdns.org
  • 193.56.28.161
malicious

Threats

PID
Process
Class
Message
3080
Regasm.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
3080
Regasm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar 1.3 RAT IP Lookup ip-api.com (HTTP headeer)
1056
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3080
Regasm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar RAT
3080
Regasm.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Injector.DPAH (KOVTER)
3080
Regasm.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
1 ETPRO signatures available at the full report
Process
Message
Netflix Account Checker 5.0.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
Netflix Account Checker 5.0.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
Netflix Account Checker 5.0.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
Netflix Account Checker 5.0.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
Netflix Account Checker 5.0.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
Netflix Account Checker 5.0.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
Netflix Account Checker 5.0.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
Netflix Account Checker 5.0.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
AdobeFlash.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
AdobeFlash.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278