| File name: | PI7812367813.doc |
| Full analysis: | https://app.any.run/tasks/aaaf20d9-8389-40e0-afbc-87479073d4b3 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | November 30, 2023, 00:07:20 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | Non-ISO extended-ASCII text, with very long lines, with CRLF, CR, LF line terminators |
| MD5: | A2E15A15841102AAA128F682EC572B41 |
| SHA1: | F40DFC3F94ABAD4F63010239D7A55F164D74D073 |
| SHA256: | 7A2F9E411B75BD3FFF4DE3ECCADE17A7C72C810CD786145239AB21950E761AAE |
| SSDEEP: | 768:iwARU+obMX9gRWjuBvyJKbSkdjMuuIagPFEbZLIQATaj17nQ:iwAK33yrCguuIa0FuZmuj17nQ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 292 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 944 | "C:\Users\admin\AppData\Roaming\plugman75907.exe" | C:\Users\admin\AppData\Roaming\plugman75907.exe | plugman75907.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: OPOS Service Exit code: 0 Version: 1.0.0.0 Modules
Nanocore(PID) Process(944) plugman75907.exe BuildTime2023-11-27 17:18:32.835816 Version1.2.2.0 Mutex3f30b298-001f-4f08-b22c-606b0d3632bd DefaultGrouprn728 PrimaryConnectionHostrn72836.sytes.net BackupConnectionHost127.0.0.1 ConnectionPort6696 RunOnStartupTrue RequestElevationFalse BypassUserAccountControlTrue ClearZoneIdentifierTrue ClearAccessControlFalse SetCriticalProcessFalse PreventSystemSleepTrue ActivateAwayModeFalse EnableDebugModeFalse RunDelay0 ConnectDelay4000 RestartDelay5000 TimeoutInterval5000 KeepAliveTimeout30000 MutexTimeout5000 LanTimeout2500 WanTimeout8000 BufferSize65535 MaxPacketSize10485760 GCThreshold10485760 UseCustomDnsServerTrue PrimaryDnsServer8.8.8.8 BackupDnsServer8.8.4.4 | |||||||||||||||
| 1900 | "C:\Users\admin\AppData\Roaming\plugman75907.exe" | C:\Users\admin\AppData\Roaming\plugman75907.exe | — | EQNEDT32.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: OPOS Service Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 2708 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\PI7812367813.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 3104 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | ||||||||||||
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 Modules
| |||||||||||||||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: On | |||
| (PID) Process: | (2708) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1055 |
Value: On | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2708 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRE55B.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2708 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | binary | |
MD5:0505E2722A298142460286B8A1E399E6 | SHA256:56C5CE25540E7A1D2E8D73650F4BFB27E62A94F3F9C51B37EC30A34CA90BCA61 | |||
| 2708 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$7812367813.doc | binary | |
MD5:FDC0AEB3651B54C6EA7691B2B5FD9AC8 | SHA256:1ECB80A13405465A81324D73BD98111DD87461E68FEFED196D28AF8501233FF9 | |||
| 3104 | EQNEDT32.EXE | C:\Users\admin\AppData\Roaming\plugman75907.exe | executable | |
MD5:D0CC28FDDECCA60C208AE56D78014E95 | SHA256:E3F6A75A8004412643549E095AF1150D8329A3C46A06AEF839842B90D54933A5 | |||
| 3104 | EQNEDT32.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\plugmanzx[1].exe | executable | |
MD5:D0CC28FDDECCA60C208AE56D78014E95 | SHA256:E3F6A75A8004412643549E095AF1150D8329A3C46A06AEF839842B90D54933A5 | |||
| 944 | plugman75907.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\storage.dat | binary | |
MD5:7E8F4A764B981D5B82D1CC49D341E9C6 | SHA256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480 | |||
| 944 | plugman75907.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\catalog.dat | binary | |
MD5:32D0AAE13696FF7F8AF33B2D22451028 | SHA256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29 | |||
| 944 | plugman75907.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\settings.bin | binary | |
MD5:AE0F5E6CE7122AF264EC533C6B15A27B | SHA256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26 | |||
| 944 | plugman75907.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe | executable | |
MD5:D0CC28FDDECCA60C208AE56D78014E95 | SHA256:E3F6A75A8004412643549E095AF1150D8329A3C46A06AEF839842B90D54933A5 | |||
| 944 | plugman75907.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dat | text | |
MD5:5B69D7D5440CA857333F5D8AFFDEC35F | SHA256:026C70189B143A40560ADA4D79A99D93493A8A6EF0594B3FEEB95442C9AE91E1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3104 | EQNEDT32.EXE | GET | 200 | 104.21.70.74:80 | http://zang1.almashreaq.top/_errorpages/plugmanzx.exe | unknown | executable | 654 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3104 | EQNEDT32.EXE | 104.21.70.74:80 | zang1.almashreaq.top | CLOUDFLARENET | — | unknown |
868 | svchost.exe | 95.101.148.135:80 | — | Akamai International B.V. | NL | unknown |
868 | svchost.exe | 184.30.20.134:80 | armmf.adobe.com | AKAMAI-AS | DE | unknown |
944 | plugman75907.exe | 103.114.106.29:6696 | rn72836.sytes.net | VIETNAM POSTS AND TELECOMMUNICATIONS GROUP | VN | unknown |
Domain | IP | Reputation |
|---|---|---|
zang1.almashreaq.top |
| malicious |
armmf.adobe.com |
| whitelisted |
rn72836.sytes.net |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
3104 | EQNEDT32.EXE | A Network Trojan was detected | ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 |
3104 | EQNEDT32.EXE | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
3104 | EQNEDT32.EXE | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3104 | EQNEDT32.EXE | Misc activity | ET HUNTING Possible EXE Download From Suspicious TLD |
944 | plugman75907.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS Query to a *.sytes.net Domain |
944 | plugman75907.exe | Malware Command and Control Activity Detected | ET MALWARE NanoCore RAT CnC 7 |
944 | plugman75907.exe | Malware Command and Control Activity Detected | ET MALWARE NanoCore RAT Keep-Alive Beacon (Inbound) |
944 | plugman75907.exe | Malware Command and Control Activity Detected | ET MALWARE NanoCore RAT Keep-Alive Beacon (Inbound) |
944 | plugman75907.exe | Malware Command and Control Activity Detected | ET MALWARE NanoCore RAT CnC 7 |