analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://onedrive.live.com/download?cid=914146BA02B70D25&resid=914146BA02B70D25%21150&authkey=ADOa3G8wVgQnyH8

Full analysis: https://app.any.run/tasks/136021be-b7ca-427a-a334-b7acd9a83dac
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: July 12, 2020, 10:01:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
nanocore
trojan
Indicators:
MD5:

5FE00999458174AE785BF373765DB6EE

SHA1:

D8E0CB4D8391F4BC60E04A0933F922CA5416D3E9

SHA256:

7A65AD3D4DC6F95643A1CFE7DF3886B42696A011A4C5AF7A0BFAE27C5DF1B835

SSDEEP:

3:N8Ck3CTwKbl3dLXVWAxUydLX9UUmPxpoP0Ls:2CkST/ZNjeYj9NmppoKs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1896)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2380)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2200)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 4084)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2600)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2612)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 316)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2676)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3932)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3520)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2188)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2232)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2892)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1680)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2708)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1768)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1876)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3024)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3352)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3260)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3568)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3740)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2184)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1056)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2416)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3508)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2376)
    • Writes to a start menu file

      • notepad.exe (PID: 3964)
      • notepad.exe (PID: 3180)
      • notepad.exe (PID: 2296)
      • notepad.exe (PID: 1876)
      • notepad.exe (PID: 2068)
      • notepad.exe (PID: 2488)
      • notepad.exe (PID: 1892)
      • notepad.exe (PID: 1528)
      • notepad.exe (PID: 2748)
    • Changes the autorun value in the registry

      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1896)
    • Connects to CnC server

      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1896)
    • NANOCORE was detected

      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1896)
    • Actions looks like stealing of personal data

      • vbc.exe (PID: 3584)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2660)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1896)
    • Application launched itself

      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2380)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3932)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2612)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2188)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2232)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1768)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1876)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2184)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 3568)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1056)
    • Creates files in the user directory

      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1896)
      • notepad.exe (PID: 3964)
      • notepad.exe (PID: 3180)
      • notepad.exe (PID: 2296)
      • notepad.exe (PID: 1876)
      • notepad.exe (PID: 2068)
      • notepad.exe (PID: 2488)
      • notepad.exe (PID: 1892)
      • notepad.exe (PID: 1528)
      • notepad.exe (PID: 2748)
    • Executes scripts

      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 1896)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2140)
      • chrome.exe (PID: 3996)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2140)
    • Manual execution by user

      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 2380)
      • PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe (PID: 4084)
    • Application launched itself

      • chrome.exe (PID: 2140)
    • Reads settings of System Certificates

      • chrome.exe (PID: 3996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
85
Monitored processes
49
Malicious processes
15
Suspicious processes
3

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe chrome.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe #NANOCORE proforma invoice scan order copy 1121-pdf01.exe proforma invoice scan order copy 1121-pdf01.exe no specs chrome.exe no specs chrome.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs notepad.exe proforma invoice scan order copy 1121-pdf01.exe no specs proforma invoice scan order copy 1121-pdf01.exe no specs vbc.exe

Process information

PID
CMD
Path
Indicators
Parent process
2140"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://onedrive.live.com/download?cid=914146BA02B70D25&resid=914146BA02B70D25%21150&authkey=ADOa3G8wVgQnyH8"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2820"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6f58a9d0,0x6f58a9e0,0x6f58a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
440"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1492 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3792"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1040,10233868235883514812,1713025288236457964,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=7725068358913140507 --mojo-platform-channel-handle=1064 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3996"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1040,10233868235883514812,1713025288236457964,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=18322434226066506025 --mojo-platform-channel-handle=1584 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3592"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1040,10233868235883514812,1713025288236457964,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12777574974960971145 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
684"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1040,10233868235883514812,1713025288236457964,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2304773832404582230 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2260 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2220"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1040,10233868235883514812,1713025288236457964,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=11388161173609548331 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2524 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2660"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.ace"C:\Program Files\WinRAR\WinRAR.exe
chrome.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3968"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1040,10233868235883514812,1713025288236457964,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=6216926709144567351 --mojo-platform-channel-handle=3788 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
1 695
Read events
1 616
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
17
Text files
83
Unknown types
1

Dropped files

PID
Process
Filename
Type
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5F0ADF94-85C.pma
MD5:
SHA256:
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\9dfb211e-e29c-4519-87e5-64275e76e77c.tmp
MD5:
SHA256:
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000028.dbtmp
MD5:
SHA256:
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:AC43135B8C9FED46A92448C4E711F45C
SHA256:D840BA7CEBACF86DDBAD75BFB61A53449AA7AE3DE6B8ADC97FE45624626A6F09
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:DA692BE42E4EF2668AE7499A7D5DA720
SHA256:EB865CAF59002C092F5FDBE22D01935866BC1277108B29E897052CB2439630ED
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:33B05E8AC9C178C58ED3321F496588C0
SHA256:2CDF6A09638A0B563EA2672D6926210771902E0A9203FE15D2857FC4EB954CDE
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:FC9FFE77348619CC285333DFF5E1D5D1
SHA256:7CB9B3575330B3D776A21EB7A7407E34F013A0975B7418DA11B5C85DEC91D1F3
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF15d441.TMPtext
MD5:AC43135B8C9FED46A92448C4E711F45C
SHA256:D840BA7CEBACF86DDBAD75BFB61A53449AA7AE3DE6B8ADC97FE45624626A6F09
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RF15d48f.TMPtext
MD5:FC9FFE77348619CC285333DFF5E1D5D1
SHA256:7CB9B3575330B3D776A21EB7A7407E34F013A0975B7418DA11B5C85DEC91D1F3
2140chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF15d412.TMPtext
MD5:F69C20D5B552B8D973FB1CBA5FDD7D87
SHA256:48799968D50E2D74E625A0AB18E93C6792AF20010334C6BB4E935C8D26F7026A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
13
DNS requests
10
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3996
chrome.exe
172.217.21.238:443
sb-ssl.google.com
Google Inc.
US
whitelisted
3996
chrome.exe
13.107.42.12:443
zcq0vq.dm.files.1drv.com
Microsoft Corporation
US
suspicious
3996
chrome.exe
172.217.23.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3996
chrome.exe
172.217.16.164:443
www.google.com
Google Inc.
US
whitelisted
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
37.235.1.174:53
ANEXIA Internetdienstleistungs GmbH
AT
suspicious
3996
chrome.exe
216.58.212.131:443
ssl.gstatic.com
Google Inc.
US
whitelisted
3996
chrome.exe
13.107.42.13:443
onedrive.live.com
Microsoft Corporation
US
malicious
3996
chrome.exe
216.58.212.141:443
accounts.google.com
Google Inc.
US
whitelisted
3996
chrome.exe
172.217.23.163:443
www.gstatic.com
Google Inc.
US
whitelisted
3996
chrome.exe
216.58.207.46:443
clients1.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.23.131
whitelisted
onedrive.live.com
  • 13.107.42.13
shared
accounts.google.com
  • 216.58.212.141
shared
zcq0vq.dm.files.1drv.com
  • 13.107.42.12
whitelisted
sb-ssl.google.com
  • 172.217.21.238
whitelisted
www.google.com
  • 172.217.16.164
whitelisted
ssl.gstatic.com
  • 216.58.212.131
whitelisted
judge2020.ddns.net
  • 194.5.97.18
unknown
www.gstatic.com
  • 172.217.23.163
whitelisted
clients1.google.com
  • 216.58.207.46
whitelisted

Threats

PID
Process
Class
Message
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
1896
PROFORMA INVOICE SCAN ORDER COPY 1121-PDF01.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
40 ETPRO signatures available at the full report
No debug info