File name:

7a16174f3941e1a878573a3e9f500256016831464ce78b54b615d4b480e35ee7

Full analysis: https://app.any.run/tasks/b7424c91-5085-46dd-b505-593d036f347a
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: January 11, 2019, 03:50:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
trojan
nanocore
rat
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

28FEE939DD858727FAC790C9F29F5826

SHA1:

4865EBCBC9AE592BED1845FFFC2D67EE4F4F5D84

SHA256:

7A16174F3941E1A878573A3E9F500256016831464CE78B54B615D4B480E35EE7

SSDEEP:

24576:puxoZCH8Szb2xr1lQ7Q2Pe6xUgH1eOqbZSIEMea:7ZY2xx27zniSI5P

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • hqc.exe (PID: 4076)
      • REVISED TELEX RELEASE 0509896_igs50595.exe (PID: 4056)
      • hqc.exe (PID: 2904)
    • Changes the autorun value in the registry

      • hqc.exe (PID: 2904)
    • Connects to CnC server

      • RegSvcs.exe (PID: 4068)
    • NanoCore was detected

      • RegSvcs.exe (PID: 4068)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2984)
      • REVISED TELEX RELEASE 0509896_igs50595.exe (PID: 4056)
    • Application launched itself

      • hqc.exe (PID: 4076)
    • Drop AutoIt3 executable file

      • REVISED TELEX RELEASE 0509896_igs50595.exe (PID: 4056)
    • Creates files in the user directory

      • RegSvcs.exe (PID: 4068)
    • Connects to unusual port

      • RegSvcs.exe (PID: 4068)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • REVISED TELEX RELEASE 0509896_igs50595.exe (PID: 4056)
      • hqc.exe (PID: 4076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe revised telex release 0509896_igs50595.exe hqc.exe no specs hqc.exe #NANOCORE regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
2904C:\Users\admin\AppData\Local\Temp\30954511\hqc.exe C:\Users\admin\AppData\Local\Temp\30954511\IFEGSC:\Users\admin\AppData\Local\Temp\30954511\hqc.exe
hqc.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\30954511\hqc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2984"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\7a16174f3941e1a878573a3e9f500256016831464ce78b54b615d4b480e35ee7.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
4056"C:\Users\admin\Desktop\REVISED TELEX RELEASE 0509896_igs50595.exe" C:\Users\admin\Desktop\REVISED TELEX RELEASE 0509896_igs50595.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\revised telex release 0509896_igs50595.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
4068"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
hqc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
4076"C:\Users\admin\AppData\Local\Temp\30954511\hqc.exe" klc=jts C:\Users\admin\AppData\Local\Temp\30954511\hqc.exeREVISED TELEX RELEASE 0509896_igs50595.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\30954511\hqc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
Total events
830
Read events
797
Write events
33
Delete events
0

Modification events

(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2984) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\7a16174f3941e1a878573a3e9f500256016831464ce78b54b615d4b480e35ee7.rar
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
2
Suspicious files
0
Text files
52
Unknown types
0

Dropped files

PID
Process
Filename
Type
2984WinRAR.exeC:\Users\admin\Desktop\REVISED TELEX RELEASE 0509896_igs50595.exeexecutable
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\gnv.ppttext
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\xui.pdftext
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\klc=jtstext
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\pne.ppttext
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\bae.mp3text
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\dku.xltext
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\set.mp4text
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\krf.mp4text
MD5:
SHA256:
4056REVISED TELEX RELEASE 0509896_igs50595.exeC:\Users\admin\AppData\Local\Temp\30954511\rjb.xltext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
107

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4068
RegSvcs.exe
185.62.189.194:1336
moneymen.ddns.net
Dotsi, Unipessoal Lda.
NL
suspicious
4068
RegSvcs.exe
8.8.8.8:53
Google Inc.
US
malicious

DNS requests

Domain
IP
Reputation
moneymen.ddns.net
  • 185.62.189.194
malicious

Threats

PID
Process
Class
Message
4068
RegSvcs.exe
A Network Trojan was detected
SC BAD_UNKNOWN Query to a Suspicious *.ddns.net Domain
4068
RegSvcs.exe
A Network Trojan was detected
SC BAD_UNKNOWN Generic dynamic DNS detection
4068
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
4068
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
4068
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
4068
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
4068
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
4068
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
4068
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
4068
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
63 ETPRO signatures available at the full report
No debug info