File name:

nanocloer.zip

Full analysis: https://app.any.run/tasks/3c1540cb-72ac-4669-a4ea-dd4b4942c841
Verdict: Malicious activity
Analysis date: July 18, 2024, 15:26:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
MD5:

AFD8ED859CEF9F51B550C0A3D27A967E

SHA1:

6E939E64DEB01C12D6976F7DFA39CD3F4175D505

SHA256:

EDF2FEE744E8B3E86D1FF84D3602BA7030D86E3A899AAB7DCC2FF61B30FEE371

SSDEEP:

1536:6CbnZqgF9CvxV3SscbEhFkG0lIql8/y11wK3fC/d6C5:6CjZxmxQEhKG0uqcOwqC/n5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 7948)
      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
    • Changes the autorun value in the registry

      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
    • Unusual execution from MS Office

      • WINWORD.EXE (PID: 5244)
      • WINWORD.EXE (PID: 7440)
    • Actions looks like stealing of personal data

      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
    • Executes as Windows Service

      • OfficeClickToRun.exe (PID: 972)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7948)
    • Creates files or folders in the user directory

      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
    • Checks supported languages

      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
    • Manual execution by a user

      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
      • lansrv.exe (PID: 7224)
      • WINWORD.EXE (PID: 5244)
      • WINWORD.EXE (PID: 7440)
      • notepad++.exe (PID: 3836)
      • lansrv.exe (PID: 4020)
    • Reads the computer name

      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
    • Reads the machine GUID from the registry

      • 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe (PID: 7044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 1980:00:00 00:00:00
ZipCRC: 0x00000000
ZipCompressedSize: 56145
ZipUncompressedSize: 201216
ZipFileName: 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
11
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe slui.exe no specs lansrv.exe no specs winword.exe no specs officeclicktorun.exe no specs officec2rclient.exe no specs winword.exe no specs officec2rclient.exe no specs notepad++.exe no specs lansrv.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
972"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /serviceC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Office Click-to-Run (SxS)
Version:
16.0.16026.20140
1020C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3328OfficeC2RClient.exe /error PID=5244 ProcessName="Microsoft Word" UIType=3 ErrorSource=0x8b10082a ErrorCode=0xc00cee2d ShowUI=1C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office Click-to-Run Client
Exit code:
0
Version:
16.0.16026.20140
3836"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\ATTENTION.RTF"C:\Program Files\Notepad++\notepad++.exeexplorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Version:
7.91
4020"C:\Users\admin\AppData\Local\lansrv.exe" C:\Users\admin\AppData\Local\lansrv.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
5244"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\ATTENTION.RTF" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
3221225794
Version:
16.0.16026.20146
5492OfficeC2RClient.exe /error PID=7440 ProcessName="Microsoft Word" UIType=3 ErrorSource=0x8b10082a ErrorCode=0xc00cee2d ShowUI=1C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office Click-to-Run Client
Exit code:
0
Version:
16.0.16026.20140
7044"C:\Users\admin\Desktop\462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe" C:\Users\admin\Desktop\462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\desktop\462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7224"C:\Users\admin\AppData\Local\lansrv.exe" C:\Users\admin\AppData\Local\lansrv.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
656116
7440"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /vu "C:\Users\admin\Desktop\ATTENTION.RTF"C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Total events
3 641
Read events
3 631
Write events
10
Delete events
0

Modification events

(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\nanocloer.zip
(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7948) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7044) 462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:LanmanServer
Value:
C:\Users\admin\AppData\Local\lansrv.exe
Executable files
2
Suspicious files
522
Text files
9
Unknown types
1

Dropped files

PID
Process
Filename
Type
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\Microsoft\Office\SolutionPackages\4404078e2dabd634eb723d7c3b67cf69\PackageResources\OfflineFiles\BoutiqueDark_960_2670632012cab762c1b532bbae7ce357.jpgbinary
MD5:5D77040EEB8F9C8C99F9997874E45334
SHA256:985618F18CEF434445EA32442EF18278E8FE87C9111761503444EE1FC4FC12AC
7948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb7948.20826\462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06aexecutable
MD5:FCE023BE1FB28B656E419C5C817DEB73
SHA256:462E30EB9CF267315E5F39E4FEC4CFFF78B34A5F6EBF61BAD06CDFD9CBE0A06A
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\lansrv.exeexecutable
MD5:FCE023BE1FB28B656E419C5C817DEB73
SHA256:462E30EB9CF267315E5F39E4FEC4CFFF78B34A5F6EBF61BAD06CDFD9CBE0A06A
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\Microsoft\Office\SolutionPackages\4404078e2dabd634eb723d7c3b67cf69\PackageResources\OfflineFiles\Aurora_960_e5e180d0afc4c9938bc4f43c29faad2f.jpgbinary
MD5:999792DA7355B86589840657B5244623
SHA256:E990C5B224A7EC431DE45D985CC137A4C0643F6D489E23EB69185A410A5CD9DB
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\Microsoft\Office\SolutionPackages\4404078e2dabd634eb723d7c3b67cf69\PackageResources\OfflineFiles\Aerial_V2_960_e4f16d9ab2de9e07fc69b471b386ba4b.jpgbinary
MD5:B63CE98520072DC6DB0F4D609D61EA00
SHA256:8FB2913B503F092AF369AA20AFC561DDABBC0F7982C65BA4D9BDBC211E028E16
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\Microsoft\Office\SolutionPackages\4404078e2dabd634eb723d7c3b67cf69\PackageResources\OfflineFiles\Bokeh_V2_960_4a9e6622fd62a84a258eb269895a094c.jpgbinary
MD5:537A81F259DCFBF94ABBA247AB72E286
SHA256:3AC1B900A5D4688618540BFC58E82CEE46C558914D189D24F5BAC5371704052E
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\Microsoft\Office\SolutionPackages\4404078e2dabd634eb723d7c3b67cf69\PackageResources\OfflineFiles\Fluent_864_bf384ed42f878a0cff607687a6bb7590.jpgbinary
MD5:15CB3FF8E65D6D2B8FFB4A493EF41AE1
SHA256:3CCE04FEA85281F5939D768EE5394AFF77FE315FD71EACA565E9593D175A0B15
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\Microsoft\Office\SolutionPackages\4404078e2dabd634eb723d7c3b67cf69\PackageResources\OfflineFiles\Celestial_V2_960_1b011c282433a37463b96c8587dc3874.jpgbinary
MD5:B89936E610092604506442AD5D2E012C
SHA256:E53F3951F3C02C448C4169148E8ABFAB1CB8D5B7CA7BEDE5C8C2720C1AEA48D6
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\Microsoft\Office\SolutionPackages\4404078e2dabd634eb723d7c3b67cf69\PackageResources\OfflineFiles\Lucent_960_45a6dba5a0d070b7aa3cf5b8bea87687.jpgbinary
MD5:B2847046A441E094F0A7DCD36CC6CCFE
SHA256:D4720BA2D27BA7FD37E37B145CA6DA537A2319623332C2CB245CD6C8092677A3
7044462e30eb9cf267315e5f39e4fec4cfff78b34a5f6ebf61bad06cdfd9cbe0a06a.exeC:\Users\admin\AppData\Local\Microsoft\Office\SolutionPackages\4404078e2dabd634eb723d7c3b67cf69\PackageResources\OfflineFiles\Convergence_V2_960_a4291915a9e359b054f1e7b21f49dca9.jpgbinary
MD5:C69A46701E90BF7FEF601CCD845489E5
SHA256:25AEF859DCDF60FA5133E1090C0CDF0AEEB9B061B1C0287A824C5CB1C6CDB58F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
24
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
7484
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
4716
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
7856
svchost.exe
4.209.32.198:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
7484
backgroundTaskHost.exe
20.223.36.55:443
fd.api.iris.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2760
svchost.exe
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5948
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4716
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
arc.msn.com
  • 20.199.58.43
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.73
  • 20.190.159.2
  • 20.190.159.75
  • 40.126.31.73
  • 40.126.31.71
  • 20.190.159.4
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.71
  • 40.126.31.67
  • 40.126.31.69
whitelisted
google.com
  • 216.58.206.46
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
officeclient.microsoft.com
  • 52.109.28.46
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
self.events.data.microsoft.com
  • 104.208.16.95
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.43
  • 52.111.229.19
whitelisted

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET MALWARE NanoLocker Check-in (ICMP) M1
No debug info