analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PAYMENT COPY_53673672882.tbz.z

Full analysis: https://app.any.run/tasks/ec51a803-a59a-4e78-a10d-b502fc5c59f9
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: April 15, 2019, 09:29:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
rat
nanocore
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

9DCF4E3203376EE7781922516DEA7AA2

SHA1:

1220078C0F096D839ACCC49E3FFE5154FB5B6615

SHA256:

C4E9379666DDED57B4C71A8531999ADE04C21789EEE6C61ACCC25B7E9B8F9F8B

SSDEEP:

24576:LMhwXOnEy9znr3/y/F21bXb13SwcRZITV:EwXKR9zragbX5iVR2Z

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • kgj.exe (PID: 3552)
      • PAYMENT COPY_53673672882.scr (PID: 2488)
      • kgj.exe (PID: 2712)
      • RegSvcs.exe (PID: 876)
    • Changes the autorun value in the registry

      • kgj.exe (PID: 2712)
      • RegSvcs.exe (PID: 876)
    • NanoCore was detected

      • RegSvcs.exe (PID: 876)
  • SUSPICIOUS

    • Drop AutoIt3 executable file

      • PAYMENT COPY_53673672882.scr (PID: 2488)
    • Executable content was dropped or overwritten

      • PAYMENT COPY_53673672882.scr (PID: 2488)
      • WinRAR.exe (PID: 2076)
      • RegSvcs.exe (PID: 876)
      • kgj.exe (PID: 2712)
    • Starts application with an unusual extension

      • WinRAR.exe (PID: 2076)
    • Application launched itself

      • kgj.exe (PID: 3552)
    • Creates files in the user directory

      • RegSvcs.exe (PID: 876)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • PAYMENT COPY_53673672882.scr (PID: 2488)
      • kgj.exe (PID: 3552)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start winrar.exe payment copy_53673672882.scr kgj.exe no specs kgj.exe #NANOCORE regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
2076"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\PAYMENT COPY_53673672882.tbz.z.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2488"C:\Users\admin\AppData\Local\Temp\Rar$DIa2076.10996\PAYMENT COPY_53673672882.scr" /SC:\Users\admin\AppData\Local\Temp\Rar$DIa2076.10996\PAYMENT COPY_53673672882.scr
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3552"C:\Users\admin\AppData\Local\Temp\60283121\kgj.exe" afo=xpd C:\Users\admin\AppData\Local\Temp\60283121\kgj.exePAYMENT COPY_53673672882.scr
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
2712C:\Users\admin\AppData\Local\Temp\60283121\kgj.exe C:\Users\admin\AppData\Local\Temp\60283121\BKBWWC:\Users\admin\AppData\Local\Temp\60283121\kgj.exe
kgj.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
876"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\admin\AppData\Local\Temp\RegSvcs.exe
kgj.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.6.1055.0 built by: NETFXREL2
Total events
834
Read events
802
Write events
32
Delete events
0

Modification events

(PID) Process:(2076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2076) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\PAYMENT COPY_53673672882.tbz.z.rar
(PID) Process:(2076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2076) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@shell32,-10162
Value:
Screen saver
(PID) Process:(2076) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
5
Suspicious files
1
Text files
55
Unknown types
0

Dropped files

PID
Process
Filename
Type
2076WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa2076.10996\PAYMENT COPY_53673672882.screxecutable
MD5:6EED1B25E43CC5E2BD237DE92B11E238
SHA256:9F83C1EAD3FC41AAF57C63A494612B17EA09E9E09B8EF8372A6227151D37F771
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\afo=xpdtext
MD5:BF3A89112E8FEBE95E44D7EDDCCDD42B
SHA256:C4A96E9E6E84C1E5B4A30CE3451A200D725F56C713BC37100B600CF2C2E9FDE6
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\nje.mp3text
MD5:F24449B784C38C5AEE63AAE3ABFC1BE2
SHA256:59F3C134D7FD06C83FE167434B5F882660AF16E85B7B35F940B4AC0D43B14D75
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\ToolTipConstants.jpgtext
MD5:907441DB4EB84C19A075343C0F588B5D
SHA256:638F96C764E2291260A1C8E75C6BDE7E8E86B12058A2CAD6BDDD7CD6AC71E619
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\fua.icmtext
MD5:7C89ED93652E495E087E71D6BCE676C3
SHA256:3F18B234D99AB4F85D37CDC7841E1F9259DE0E2ABBC972BF261A34B12B5909CB
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\msm.dattext
MD5:EF47A780C333BE3B11B74BD55558BA00
SHA256:43B2F44A4671155AF65D9524FEDEBD6CC789CFAF1A0135B0C92BFD9FB409981D
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\vuq.xltext
MD5:250D1D0410856B3AA7F45DA15E5FACE7
SHA256:297D546F9172C04ECFF832E9EE8529541A0C4D970458957523A5A10FA943C0D8
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\ToolbarConstants.txttext
MD5:FB0CAAFBFE58676638BCFD80697AD706
SHA256:4E1AF42343988ED1737EB778D310EE0FB0B075C6C9F0188BB1B0F4F05A9E1D55
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\xtq.ppttext
MD5:D48CE040EBB4CA8598418DA16450A495
SHA256:6CCABB445C9671476DC84BB748365CE76E121AB2FE3E4F54D5BDAEC4FC66E9E6
2488PAYMENT COPY_53673672882.scrC:\Users\admin\AppData\Local\Temp\60283121\rdd.xltext
MD5:317AD26D6EB90CB36A79A2D797B98580
SHA256:A2CB984323B6FE3C69E4BAC17C6D5EAD81EF7B0E6F9CA78EE99FD0C737DCC5CE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
9
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
95.140.125.22:2643
Drustvo za telekomunikacije Orion telekom doo Beograd, Gandijeva 76a
RS
unknown
876
RegSvcs.exe
95.140.125.22:2643
Drustvo za telekomunikacije Orion telekom doo Beograd, Gandijeva 76a
RS
unknown

DNS requests

No data

Threats

No threats detected
No debug info