File name:

b84f19c1345d696ae9d920b0365bba38.zip

Full analysis: https://app.any.run/tasks/0c7f1bd0-7eca-4aa1-9501-d204aa4f716b
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: April 25, 2019, 06:36:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
rat
nanocore
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

1CCB1F750A64715A7C862A62288BBF3F

SHA1:

86359809C18EEC1388E68F520E190264422B8C8E

SHA256:

931BAA6746442C5AB644191084C5AA3A8449780CF3D1213DCAA8108380F8986B

SSDEEP:

24576:iJLn+cayL23J54N4AHneJvxA21bFD8qc6GxN1Ex:4Lbayi3J62AHwS21bpJc6Uq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • jrg.exe (PID: 3416)
    • Application was dropped or rewritten from another process

      • jrg.exe (PID: 3100)
      • jrg.exe (PID: 3416)
      • Swift Copy.scr (PID: 4072)
      • RegSvcs.exe (PID: 3928)
    • NanoCore was detected

      • RegSvcs.exe (PID: 3928)
    • Connects to CnC server

      • RegSvcs.exe (PID: 3928)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1388)
      • Swift Copy.scr (PID: 4072)
      • jrg.exe (PID: 3416)
    • Drop AutoIt3 executable file

      • Swift Copy.scr (PID: 4072)
    • Starts application with an unusual extension

      • WinRAR.exe (PID: 1388)
    • Creates files in the user directory

      • RegSvcs.exe (PID: 3928)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • Swift Copy.scr (PID: 4072)
      • jrg.exe (PID: 3100)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2019:04:25 09:36:19
ZipCRC: 0x3443a9a4
ZipCompressedSize: 873354
ZipUncompressedSize: 873207
ZipFileName: b84f19c1345d696ae9d920b0365bba38
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe no specs winrar.exe swift copy.scr jrg.exe no specs jrg.exe #NANOCORE regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
1388"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\b84f19c1345d696ae9d920b0365bba38.xz"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3100"C:\Users\admin\AppData\Local\Temp\08610125\jrg.exe" cnq=ifv C:\Users\admin\AppData\Local\Temp\08610125\jrg.exeSwift Copy.scr
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\08610125\jrg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3416C:\Users\admin\AppData\Local\Temp\08610125\jrg.exe C:\Users\admin\AppData\Local\Temp\08610125\QSHPZC:\Users\admin\AppData\Local\Temp\08610125\jrg.exe
jrg.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\08610125\jrg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3864"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\b84f19c1345d696ae9d920b0365bba38.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3928"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
jrg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\users\admin\appdata\local\temp\regsvcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
4072"C:\Users\admin\AppData\Local\Temp\Rar$DIa1388.26530\Swift Copy.scr" /SC:\Users\admin\AppData\Local\Temp\Rar$DIa1388.26530\Swift Copy.scr
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$dia1388.26530\swift copy.scr
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 252
Read events
1 222
Write events
30
Delete events
0

Modification events

(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3864) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\b84f19c1345d696ae9d920b0365bba38.zip
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3864) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(1388) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
Executable files
4
Suspicious files
2
Text files
46
Unknown types
1

Dropped files

PID
Process
Filename
Type
3864WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3864.24218\b84f19c1345d696ae9d920b0365bba38
MD5:
SHA256:
1388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa1388.26530\Swift Copy.screxecutable
MD5:
SHA256:
4072Swift Copy.scrC:\Users\admin\AppData\Local\Temp\08610125\nme.txttext
MD5:
SHA256:
4072Swift Copy.scrC:\Users\admin\AppData\Local\Temp\08610125\cnq=ifvtext
MD5:
SHA256:
4072Swift Copy.scrC:\Users\admin\AppData\Local\Temp\08610125\UpDownConstants.dattext
MD5:
SHA256:
4072Swift Copy.scrC:\Users\admin\AppData\Local\Temp\08610125\rbr.docxtext
MD5:
SHA256:
4072Swift Copy.scrC:\Users\admin\AppData\Local\Temp\08610125\FontConstants.ppttext
MD5:
SHA256:
4072Swift Copy.scrC:\Users\admin\AppData\Local\Temp\08610125\rog.ppttext
MD5:
SHA256:
4072Swift Copy.scrC:\Users\admin\AppData\Local\Temp\08610125\bkg.docxtext
MD5:
SHA256:
4072Swift Copy.scrC:\Users\admin\AppData\Local\Temp\08610125\uqx.docxtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
70

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3928
RegSvcs.exe
31.171.152.106:1978
ncores.hopto.org
Keminet Ltd.
AL
malicious
3928
RegSvcs.exe
8.8.8.8:53
Google Inc.
US
malicious

DNS requests

Domain
IP
Reputation
ncores.hopto.org
  • 31.171.152.106
malicious

Threats

PID
Process
Class
Message
3928
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
3928
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3928
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3928
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3928
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3928
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3928
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
3928
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
62 ETPRO signatures available at the full report
No debug info