analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PURCHASE ORDER 09172019NBM.PNG.zip

Full analysis: https://app.any.run/tasks/c53894ad-858c-4c2e-8af1-f9817a395a3a
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: September 19, 2019, 09:23:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
nanocore
rat
keylogger
agenttesla
stealer
evasion
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

E0DC172E9F60C8833DED74E6A87BEFB0

SHA1:

34331962C509274377483A0E241FD620136B6363

SHA256:

E0355A9243AF49341100B38935D9FF4E7EEE63762A63175DDF2B46C1CC4BE4A8

SSDEEP:

768:UCZkiJAZG0DVT4q5z1lhHLHA8KKCBqz8C+dZ:5ZjIG4TxBZrg8KVBEj+b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PURCHASE ORDER 09192019CNB.bat (PID: 2836)
      • taskngrr.exe (PID: 2304)
      • PURCHASE ORDER 09192019CNB.bat (PID: 2424)
    • NANOCORE was detected

      • taskngrr.exe (PID: 2304)
    • Changes the autorun value in the registry

      • taskngrr.exe (PID: 2304)
      • PURCHASE ORDER 09192019CNB.bat (PID: 2424)
    • AGENTTESLA was detected

      • PURCHASE ORDER 09192019CNB.bat (PID: 2424)
    • Actions looks like stealing of personal data

      • PURCHASE ORDER 09192019CNB.bat (PID: 2424)
    • Connects to CnC server

      • taskngrr.exe (PID: 2304)
  • SUSPICIOUS

    • Executed via COM

      • DllHost.exe (PID: 3660)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3204)
    • Executable content was dropped or overwritten

      • PURCHASE ORDER 09192019CNB.bat (PID: 2836)
      • taskngrr.exe (PID: 2304)
    • Application launched itself

      • PURCHASE ORDER 09192019CNB.bat (PID: 2836)
    • Creates files in the user directory

      • taskngrr.exe (PID: 2304)
      • notepad++.exe (PID: 408)
    • Starts application with an unusual extension

      • PURCHASE ORDER 09192019CNB.bat (PID: 2836)
    • Checks for external IP

      • PURCHASE ORDER 09192019CNB.bat (PID: 2424)
  • INFO

    • Manual execution by user

      • chrome.exe (PID: 3204)
      • PURCHASE ORDER 09192019CNB.bat (PID: 2836)
      • notepad++.exe (PID: 408)
    • Reads the hosts file

      • chrome.exe (PID: 3204)
      • chrome.exe (PID: 2848)
    • Application launched itself

      • chrome.exe (PID: 3204)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 3204)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: PURCHASE ORDER 09172019NBM.PNG
ZipUncompressedSize: 25618
ZipCompressedSize: 25317
ZipCRC: 0x087ee14d
ZipModifyDate: 2019:09:19 09:12:01
ZipCompression: Deflated
ZipBitFlag: 0x0009
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
71
Monitored processes
34
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs PhotoViewer.dll no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs chrome.exe no specs purchase order 09192019cnb.bat #NANOCORE taskngrr.exe #AGENTTESLA purchase order 09192019cnb.bat chrome.exe no specs chrome.exe no specs notepad++.exe gup.exe

Process information

PID
CMD
Path
Indicators
Parent process
3536"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\PURCHASE ORDER 09172019NBM.PNG.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3660C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3204"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3980"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6dd9a9d0,0x6dd9a9e0,0x6dd9a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3224"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3220 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,9339460074037799769,7354158770159437845,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=16343756859672559201 --mojo-platform-channel-handle=1044 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2848"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1020,9339460074037799769,7354158770159437845,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=17641930904085778742 --mojo-platform-channel-handle=1632 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2684"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,9339460074037799769,7354158770159437845,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13301085801332982827 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
3308"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,9339460074037799769,7354158770159437845,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=5793821386771826220 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2444 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
2080"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,9339460074037799769,7354158770159437845,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3926037495540655712 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2420 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
2 403
Read events
2 249
Write events
149
Delete events
5

Modification events

(PID) Process:(3536) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3536) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3536) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3536) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PURCHASE ORDER 09172019NBM.PNG.zip
(PID) Process:(3536) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3536) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3536) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3536) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3536) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(3660) DllHost.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
DllHost.exe
Executable files
2
Suspicious files
29
Text files
191
Unknown types
6

Dropped files

PID
Process
Filename
Type
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old
MD5:
SHA256:
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF17104c.TMP
MD5:
SHA256:
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\820468a4-63c7-45d2-bc19-03bf6805dc50.tmp
MD5:
SHA256:
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:C4D6CBB269C626168A5D6D0D8CCE6C30
SHA256:B62CDBB758278A0C2E50593357390119441D8DE09428EB29027F3DFD1332E348
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:213AE3DA120D7862D60B5763B6C9D466
SHA256:5736534D6EE654C1BF1A8E79E73330AF58F622E8657285330D2C7189A55604F4
3536WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3536.4091\PURCHASE ORDER 09172019NBM.PNGimage
MD5:17F8F006087E692A334A899E316080F0
SHA256:26472C4539D8B9C9EA1745253D16F002CB50B5C29BEE2B13F615D09220E2C9DE
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF170ffd.TMPtext
MD5:DC32343F45B01764B6267AD36548102A
SHA256:A250F5AD57D4BD58AAE92810D50278E3BE2DBF869F126A3A3519691BCDFC2075
3204chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
27
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2Fz5hY5qj0aEmX0H4s05bY%3D
US
der
1.47 Kb
whitelisted
2424
PURCHASE ORDER 09192019CNB.bat
GET
200
3.224.145.145:80
http://checkip.amazonaws.com/
US
text
14 b
shared
2848
chrome.exe
GET
302
172.217.22.110:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
514 b
whitelisted
2848
chrome.exe
GET
200
74.125.104.104:80
http://r2---sn-2gb7sn7k.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=89.187.165.52&mm=28&mn=sn-2gb7sn7k&ms=nvh&mt=1568885002&mv=m&mvi=1&pl=24&shardbypass=yes
US
crx
862 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2848
chrome.exe
172.217.21.195:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2848
chrome.exe
216.58.205.227:443
www.google.com.ua
Google Inc.
US
whitelisted
2848
chrome.exe
216.58.207.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2848
chrome.exe
172.217.16.131:443
fonts.gstatic.com
Google Inc.
US
whitelisted
2848
chrome.exe
172.217.22.67:443
www.gstatic.com
Google Inc.
US
whitelisted
2848
chrome.exe
172.217.22.45:443
accounts.google.com
Google Inc.
US
whitelisted
2848
chrome.exe
172.217.22.110:80
redirector.gvt1.com
Google Inc.
US
whitelisted
2848
chrome.exe
216.58.205.238:443
apis.google.com
Google Inc.
US
whitelisted
2848
chrome.exe
216.58.206.4:443
www.google.com
Google Inc.
US
whitelisted
2848
chrome.exe
216.58.205.225:443
clients2.googleusercontent.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.21.195
whitelisted
accounts.google.com
  • 172.217.22.45
shared
www.google.com.ua
  • 216.58.205.227
whitelisted
fonts.googleapis.com
  • 216.58.207.42
whitelisted
www.gstatic.com
  • 172.217.22.67
whitelisted
fonts.gstatic.com
  • 172.217.16.131
whitelisted
apis.google.com
  • 216.58.205.238
whitelisted
ogs.google.com
  • 172.217.22.78
whitelisted
www.google.com
  • 216.58.206.4
whitelisted
clients2.google.com
  • 172.217.16.142
whitelisted

Threats

PID
Process
Class
Message
2304
taskngrr.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
2304
taskngrr.exe
A Network Trojan was detected
MALWARE [PTsecurity] NanoCore.RAT
2304
taskngrr.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
2304
taskngrr.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
2304
taskngrr.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
2304
taskngrr.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
2304
taskngrr.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
2304
taskngrr.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
2304
taskngrr.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 64B
2304
taskngrr.exe
A Network Trojan was detected
REMOTE [PTsecurity] NanoCore.RAT
33 ETPRO signatures available at the full report
Process
Message
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
42C4C5846BB675C74E2B2C90C69AB44366401093