| URL: | https://www.dropbox.com/s/guzbanwzgn87jqp/Advance%20swift%20copy.pdf.z?dl=1 |
| Full analysis: | https://app.any.run/tasks/fdbd18d8-456d-4a93-b42b-a04ddbc3fc43 |
| Verdict: | Malicious activity |
| Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
| Analysis date: | July 17, 2019, 08:13:39 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 67DDC5D4DA5D2C3E4679966F6E9B9CA7 |
| SHA1: | 3D534CA7605EE1C144EC533851E08715945B0510 |
| SHA256: | ABF87B1505389F440F669E75D43E269B841BF31EC7B8AC653EDD04DA52128897 |
| SSDEEP: | 3:N8DSLcVHGkYgSITEIuXDrKJ5:2OLHkUIT7T |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1172 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3460.26957\pictures sample_3091BB0.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3460.26957\pictures sample_3091BB0.exe | — | WinRAR.exe | |||||||||||
User: admin Company: rectifying4 Integrity Level: MEDIUM Description: Sambucaceae6 Exit code: 0 Version: 1.05.0004 Modules
| |||||||||||||||
| 1352 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\subfolder\winlogon.vbs" | C:\Windows\System32\WScript.exe | pictures sample_3091BB0.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 2192 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3460.26400\Advance swift copy_DFF8D0F.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3460.26400\Advance swift copy_DFF8D0F.exe | WinRAR.exe | ||||||||||||
User: admin Company: Pullout6 Integrity Level: MEDIUM Description: coexecutor Exit code: 0 Version: 1.03.0004 Modules
| |||||||||||||||
| 2584 | C:\Users\admin\subfolder\winlogon.exe" | C:\Users\admin\subfolder\winlogon.exe | — | winlogon.exe | |||||||||||
User: admin Company: Pullout6 Integrity Level: MEDIUM Description: coexecutor Exit code: 0 Version: 1.03.0004 Modules
| |||||||||||||||
| 2852 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\subfolder\winlogon.vbs" | C:\Windows\System32\WScript.exe | Advance swift copy_DFF8D0F.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 3328 | "C:\Users\admin\subfolder\winlogon.exe" | C:\Users\admin\subfolder\winlogon.exe | — | pictures sample_3091BB0.exe | |||||||||||
User: admin Company: Pullout6 Integrity Level: MEDIUM Description: coexecutor Exit code: 0 Version: 1.03.0004 Modules
| |||||||||||||||
| 3436 | "C:\Program Files\Internet Explorer\iexplore.exe" -nohome | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3460 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\99FORPZD\Advance%20swift%20copy.pdf[1].z" | C:\Program Files\WinRAR\WinRAR.exe | iexplore.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 3560 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3436 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3712 | C:\Users\admin\subfolder\winlogon.exe" | C:\Users\admin\subfolder\winlogon.exe | winlogon.exe | ||||||||||||
User: admin Company: Pullout6 Integrity Level: MEDIUM Description: coexecutor Exit code: 0 Version: 1.03.0004 Modules
| |||||||||||||||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones |
| Operation: | write | Name: | SecuritySafe |
Value: 1 | |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active |
| Operation: | write | Name: | {D0E09653-A86A-11E9-B2FD-5254004A04AF} |
Value: 0 | |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Type |
Value: 4 | |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Count |
Value: 1 | |||
| (PID) Process: | (3436) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Time |
Value: E30707000300110008000D003700C600 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3436 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
| 3436 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 3560 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@dropbox[1].txt | — | |
MD5:— | SHA256:— | |||
| 3560 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@www.dropbox[1].txt | — | |
MD5:— | SHA256:— | |||
| 3436 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF62F5E96E72C2D11C.TMP | — | |
MD5:— | SHA256:— | |||
| 3436 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DFFF1DEA2F6E2935B4.TMP | — | |
MD5:— | SHA256:— | |||
| 3436 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D0E09653-A86A-11E9-B2FD-5254004A04AF}.dat | — | |
MD5:— | SHA256:— | |||
| 3560 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat | dat | |
MD5:— | SHA256:— | |||
| 3436 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{D0E09654-A86A-11E9-B2FD-5254004A04AF}.dat | binary | |
MD5:— | SHA256:— | |||
| 3560 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat | dat | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3436 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3712 | winlogon.exe | 185.247.228.5:3640 | xtracool1.ddns.net | — | — | malicious |
3436 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3560 | iexplore.exe | 162.125.66.1:443 | www.dropbox.com | Dropbox, Inc. | DE | shared |
3560 | iexplore.exe | 162.125.66.6:443 | uc742a51cdf1acb5de28933354b5.dl.dropboxusercontent.com | Dropbox, Inc. | DE | shared |
3712 | winlogon.exe | 8.8.8.8:53 | — | Google Inc. | US | malicious |
Domain | IP | Reputation |
|---|---|---|
www.bing.com |
| whitelisted |
www.dropbox.com |
| shared |
uc742a51cdf1acb5de28933354b5.dl.dropboxusercontent.com |
| malicious |
xtracool1.ddns.net |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3560 | iexplore.exe | Potential Corporate Privacy Violation | SUSPICIOUS [PTsecurity] Dropbox SSL Payload Request |
3712 | winlogon.exe | A Network Trojan was detected | ET TROJAN Possible NanoCore C2 60B |
3712 | winlogon.exe | A Network Trojan was detected | MALWARE [PTsecurity] NanoCore.RAT |
3712 | winlogon.exe | A Network Trojan was detected | MALWARE [PTsecurity] NanoCore.RAT |
3712 | winlogon.exe | A Network Trojan was detected | MALWARE [PTsecurity] NanoCore.RAT |
3712 | winlogon.exe | A Network Trojan was detected | MALWARE [PTsecurity] NanoCore.RAT |
3712 | winlogon.exe | A Network Trojan was detected | MALWARE [PTsecurity] NanoCore.RAT |
3712 | winlogon.exe | A Network Trojan was detected | MALWARE [PTsecurity] NanoCore.RAT |
3712 | winlogon.exe | A Network Trojan was detected | MALWARE [PTsecurity] NanoCore.RAT |
3712 | winlogon.exe | A Network Trojan was detected | MALWARE [PTsecurity] NanoCore.RAT |