File name:

pcimon.exe

Full analysis: https://app.any.run/tasks/db73318b-d6ee-445f-ace0-043ec2ead2ff
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: September 13, 2024, 21:33:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
nanocore
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

28B21CA8E6BF97455E1BE842AFAFFF60

SHA1:

E9866A7F0DE640F0823241B9925B55FA4566C6B7

SHA256:

82AC72591CB359A1B7AE589ECAE978AB6885D0D00F478B8BAE516AF611BF0036

SSDEEP:

6144:6NFfUMuzkIM5C2D38KJ5uN1AxtJn5PUm2y8P:6NFaXWtuN+55PP2lP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • pcimon.exe (PID: 4680)
    • NANOCORE has been detected (YARA)

      • pcimon.exe (PID: 4680)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • pcimon.exe (PID: 4680)
    • Executable content was dropped or overwritten

      • pcimon.exe (PID: 4680)
    • Connects to unusual port

      • pcimon.exe (PID: 4680)
  • INFO

    • Process checks whether UAC notifications are on

      • pcimon.exe (PID: 4680)
    • Creates files or folders in the user directory

      • pcimon.exe (PID: 4680)
    • Checks supported languages

      • pcimon.exe (PID: 4680)
    • Reads the machine GUID from the registry

      • pcimon.exe (PID: 4680)
    • The process uses the downloaded file

      • pcimon.exe (PID: 4680)
    • Reads the computer name

      • pcimon.exe (PID: 4680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Nanocore

(PID) Process(4680) pcimon.exe
KeyboardLoggingTrue
BuildTime2021-03-14 01:41:15.771608
Version1.2.2.0
Mutex868611c4-0b93-44e3-8b3a-bfe782fa2555
DefaultGroupDefault
PrimaryConnectionHostxspeed.freemyip.com
BackupConnectionHost127.0.0.1
ConnectionPort56766
RunOnStartupTrue
RequestElevationFalse
BypassUserAccountControlFalse
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:02:22 00:49:37+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 116736
InitializedDataSize: 90112
UninitializedDataSize: -
EntryPoint: 0x1e792
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
124
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #NANOCORE pcimon.exe

Process information

PID
CMD
Path
Indicators
Parent process
4680"C:\Users\admin\AppData\Local\Temp\pcimon.exe" C:\Users\admin\AppData\Local\Temp\pcimon.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\pcimon.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Nanocore
(PID) Process(4680) pcimon.exe
KeyboardLoggingTrue
BuildTime2021-03-14 01:41:15.771608
Version1.2.2.0
Mutex868611c4-0b93-44e3-8b3a-bfe782fa2555
DefaultGroupDefault
PrimaryConnectionHostxspeed.freemyip.com
BackupConnectionHost127.0.0.1
ConnectionPort56766
RunOnStartupTrue
RequestElevationFalse
BypassUserAccountControlFalse
ClearZoneIdentifierTrue
ClearAccessControlFalse
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
Total events
453
Read events
452
Write events
1
Delete events
0

Modification events

(PID) Process:(4680) pcimon.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:LAN Host
Value:
C:\Users\admin\AppData\Roaming\BB926E54-E3CA-40FD-AE90-2764341E7792\LAN Host\lanhost.exe
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4680pcimon.exeC:\Users\admin\AppData\Roaming\BB926E54-E3CA-40FD-AE90-2764341E7792\LAN Host\lanhost.exeexecutable
MD5:28B21CA8E6BF97455E1BE842AFAFFF60
SHA256:82AC72591CB359A1B7AE589ECAE978AB6885D0D00F478B8BAE516AF611BF0036
4680pcimon.exeC:\Users\admin\AppData\Roaming\BB926E54-E3CA-40FD-AE90-2764341E7792\run.dattext
MD5:2B989BD1F5441C76D5C2242FDCCD4C2E
SHA256:A00505F7A0FE3C839BDF7ED39124EA6AA5E7BCD86CDE9FD12040B02284AE2F23
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
26
DNS requests
15
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1712
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1184
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1184
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6288
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
448
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4680
pcimon.exe
87.249.134.70:56766
xspeed.freemyip.com
Datacamp Limited
US
malicious
1712
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1712
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 142.250.185.142
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
xspeed.freemyip.com
  • 87.249.134.70
malicious
login.live.com
  • 20.190.160.20
  • 40.126.32.76
  • 40.126.32.133
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.72
  • 20.190.160.17
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

PID
Process
Class
Message
4680
pcimon.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to freemyip .com Domain
4680
pcimon.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to freemyip .com Domain
4680
pcimon.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to freemyip .com Domain
No debug info