Advertisement
paladin316

NanoCore_ec56cc8e321ba060e4eb52b0e296b307_pif_2019-08-28_02_30.txt

Aug 27th, 2019
1,774
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.28 KB | None | 0 0
  1.  
  2. * MalFamily: "Nanocore"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "NanoCore_ec56cc8e321ba060e4eb52b0e296b307.pif"
  7. * File Size: 1140224
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "d38dbcb7d8b8b31fb112257305a6c1a90e7a304546c24e6cf6044e2ac256cf8a"
  10. * MD5: "ec56cc8e321ba060e4eb52b0e296b307"
  11. * SHA1: "2f3e2208f8fc54a205d03f4c0d3c97549277cf76"
  12. * SHA512: "f2fcf47bd8e19d4351bde79b4dbab11d53969319f8ae24ead0fc40b2a0f901975213ad9d18735d84659dda0ac58f9aab42b2f4098c268bfb8baefa6e4108bdb0"
  13. * CRC32: "0152BF26"
  14. * SSDEEP: "24576:yAHnh+eWsN3skA4RV1Hom2KXMmHahjGUqITLC5:1h+ZkldoPK8YaVGUBTs"
  15.  
  16. * Process Execution:
  17. "P5rJQ.exe",
  18. "RegAsm.exe",
  19. "schtasks.exe",
  20. "schtasks.exe",
  21. "svchost.exe",
  22. "taskeng.exe",
  23. "taskeng.exe",
  24. "msoia.exe",
  25. "msoia.exe",
  26. "taskeng.exe",
  27. "taskeng.exe",
  28. "taskeng.exe",
  29. "svchost.exe"
  30.  
  31.  
  32. * Executed Commands:
  33. "\"schtasks.exe\" /create /f /tn \"DSL Subsystem\" /xml \"C:\\Users\\user\\AppData\\Local\\Temp\\tmpB3AE.tmp\"",
  34. "\"schtasks.exe\" /create /f /tn \"DSL Subsystem Task\" /xml \"C:\\Users\\user\\AppData\\Local\\Temp\\tmpBE6D.tmp\"",
  35. "taskeng.exe 06027CFB-0B68-4E4C-BEA4-8559A6F9E1BF S-1-5-18:NT AUTHORITY\\System:Service:",
  36. "taskeng.exe 69E21F04-938C-46A8-B4AD-6FCB4F20E4CC S-1-5-21-0000000000-0000000000-0000000000-1000:Host\\user:Interactive:1",
  37. "taskeng.exe E80BCF90-2770-40E3-A64D-3E6331A4BEE3 S-1-5-18:NT AUTHORITY\\System:Service:",
  38. "taskeng.exe 6864624C-748C-42BC-951C-D9405A41132B S-1-5-18:NT AUTHORITY\\System:Service:",
  39. "taskeng.exe 05587565-AC7C-43BF-838B-9F2EC71C2015 S-1-5-18:NT AUTHORITY\\System:Service:",
  40. "\"C:\\Program Files\\Common Files\\Microsoft Shared\\Office15\\OLicenseHeartbeat.exe\"",
  41. "\"C:\\Program Files\\Microsoft Office\\Office15\\msoia.exe\" scan upload mininterval:2880",
  42. "\"C:\\Program Files\\Microsoft Office\\Office15\\msoia.exe\" scan upload"
  43.  
  44.  
  45. * Signatures Detected:
  46.  
  47. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  48. "Details":
  49.  
  50.  
  51. "Description": "Behavioural detection: Executable code extraction",
  52. "Details":
  53.  
  54.  
  55. "Description": "Attempts to connect to a dead IP:Port (1 unique times)",
  56. "Details":
  57.  
  58. "IP": "185.105.236.176:2179 (Iran, Islamic Republic of)"
  59.  
  60.  
  61.  
  62.  
  63. "Description": "Guard pages use detected - possible anti-debugging.",
  64. "Details":
  65.  
  66.  
  67. "Description": "A process attempted to delay the analysis task.",
  68. "Details":
  69.  
  70. "Process": "RegAsm.exe tried to sleep 1368 seconds, actually delayed analysis time by 0 seconds"
  71.  
  72.  
  73. "Process": "svchost.exe tried to sleep 315 seconds, actually delayed analysis time by 0 seconds"
  74.  
  75.  
  76. "Process": "taskeng.exe tried to sleep 601 seconds, actually delayed analysis time by 0 seconds"
  77.  
  78.  
  79.  
  80.  
  81. "Description": "At least one IP Address, Domain, or File Name was found in a crypto call",
  82. "Details":
  83.  
  84. "ioc": "v2.0.50727"
  85.  
  86.  
  87.  
  88.  
  89. "Description": "Reads data out of its own binary image",
  90. "Details":
  91.  
  92. "self_read": "process: P5rJQ.exe, pid: 2484, offset: 0x00000000, length: 0x00116600"
  93.  
  94.  
  95. "self_read": "process: RegAsm.exe, pid: 2900, offset: 0x00000000, length: 0x00001000"
  96.  
  97.  
  98. "self_read": "process: RegAsm.exe, pid: 2900, offset: 0x00000080, length: 0x00000200"
  99.  
  100.  
  101. "self_read": "process: RegAsm.exe, pid: 2900, offset: 0x00000178, length: 0x00000200"
  102.  
  103.  
  104. "self_read": "process: RegAsm.exe, pid: 2900, offset: 0x0000a720, length: 0x00000200"
  105.  
  106.  
  107. "self_read": "process: RegAsm.exe, pid: 2900, offset: 0x0000a73c, length: 0x00000200"
  108.  
  109.  
  110.  
  111.  
  112. "Description": "A process created a hidden window",
  113. "Details":
  114.  
  115. "Process": "RegAsm.exe -> \"schtasks.exe\" /create /f /tn \"DSL Subsystem\" /xml \"C:\\Users\\user\\AppData\\Local\\Temp\\tmpB3AE.tmp\""
  116.  
  117.  
  118. "Process": "RegAsm.exe -> \"schtasks.exe\" /create /f /tn \"DSL Subsystem Task\" /xml \"C:\\Users\\user\\AppData\\Local\\Temp\\tmpBE6D.tmp\""
  119.  
  120.  
  121.  
  122.  
  123. "Description": "The binary likely contains encrypted or compressed data.",
  124. "Details":
  125.  
  126. "section": "name: .rsrc, entropy: 7.86, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x0004c000, virtual_size: 0x0004bf4c"
  127.  
  128.  
  129.  
  130.  
  131. "Description": "Uses Windows utilities for basic functionality",
  132. "Details":
  133.  
  134. "command": "\"schtasks.exe\" /create /f /tn \"DSL Subsystem\" /xml \"C:\\Users\\user\\AppData\\Local\\Temp\\tmpB3AE.tmp\""
  135.  
  136.  
  137. "command": "\"schtasks.exe\" /create /f /tn \"DSL Subsystem Task\" /xml \"C:\\Users\\user\\AppData\\Local\\Temp\\tmpBE6D.tmp\""
  138.  
  139.  
  140. "command": "\"C:\\Program Files\\Common Files\\Microsoft Shared\\Office15\\OLicenseHeartbeat.exe\""
  141.  
  142.  
  143.  
  144.  
  145. "Description": "Behavioural detection: Injection (Process Hollowing)",
  146. "Details":
  147.  
  148. "Injection": "P5rJQ.exe(2484) -> RegAsm.exe(2900)"
  149.  
  150.  
  151.  
  152.  
  153. "Description": "Executed a process and injected code into it, probably while unpacking",
  154. "Details":
  155.  
  156. "Injection": "P5rJQ.exe(2484) -> RegAsm.exe(2900)"
  157.  
  158.  
  159.  
  160.  
  161. "Description": "Attempts to remove evidence of file being downloaded from the Internet",
  162. "Details":
  163.  
  164. "file": "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe:Zone.Identifier"
  165.  
  166.  
  167.  
  168.  
  169. "Description": "Behavioural detection: Injection (inter-process)",
  170. "Details":
  171.  
  172.  
  173. "Description": "Behavioural detection: Injection with CreateRemoteThread in a remote process",
  174. "Details":
  175.  
  176.  
  177. "Description": "Attempts to execute a Living Off The Land Binary command for post exeploitation",
  178. "Details":
  179.  
  180. "MITRE T1078 - schtask": "(Tactic: Execution, Persistence, Privilege Escalation)"
  181.  
  182.  
  183.  
  184.  
  185. "Description": "Installs itself for autorun at Windows startup",
  186. "Details":
  187.  
  188. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\eoyxwfmnmydtdsnhhxqv"
  189.  
  190.  
  191. "data": "C:\\Users\\Public\\eoyxwfmnmydtdsnhhxqv.vbs"
  192.  
  193.  
  194. "key": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\DSL Subsystem"
  195.  
  196.  
  197. "data": "C:\\Program Files (x86)\\DSL Subsystem\\dslss.exe"
  198.  
  199.  
  200.  
  201.  
  202. "Description": "Exhibits behavior characteristic of Nanocore RAT",
  203. "Details":
  204.  
  205.  
  206. "Description": "Stack pivoting was detected when using a critical API",
  207. "Details":
  208.  
  209. "process": "taskeng.exe:660"
  210.  
  211.  
  212.  
  213.  
  214. "Description": "File has been identified by 26 Antiviruses on VirusTotal as malicious",
  215. "Details":
  216.  
  217. "McAfee": "Trojan-AitInject.aq"
  218.  
  219.  
  220. "Cylance": "Unsafe"
  221.  
  222.  
  223. "CrowdStrike": "win/malicious_confidence_80% (W)"
  224.  
  225.  
  226. "Alibaba": "Trojan:Win32/AutoitInject.984ef763"
  227.  
  228.  
  229. "F-Prot": "W32/Autoit.G.gen!Eldorado"
  230.  
  231.  
  232. "ESET-NOD32": "a variant of Win32/Injector.Autoit.EGA"
  233.  
  234.  
  235. "APEX": "Malicious"
  236.  
  237.  
  238. "Paloalto": "generic.ml"
  239.  
  240.  
  241. "Kaspersky": "UDS:DangerousObject.Multi.Generic"
  242.  
  243.  
  244. "Avast": "Win32:Trojan-gen"
  245.  
  246.  
  247. "Rising": "Trojan.Obfus/Autoit!1.BB81 (CLASSIC)"
  248.  
  249.  
  250. "Endgame": "malicious (high confidence)"
  251.  
  252.  
  253. "Invincea": "heuristic"
  254.  
  255.  
  256. "McAfee-GW-Edition": "BehavesLike.Win32.Downloader.tc"
  257.  
  258.  
  259. "FireEye": "Generic.mg.ec56cc8e321ba060"
  260.  
  261.  
  262. "Cyren": "W32/Autoit.G.gen!Eldorado"
  263.  
  264.  
  265. "Antiy-AVL": "Trojan/Generic.ASVCS3S.1E5"
  266.  
  267.  
  268. "Microsoft": "Trojan:Win32/AutoitInject.BH!MTB"
  269.  
  270.  
  271. "AegisLab": "Trojan.Multi.Generic.4!c"
  272.  
  273.  
  274. "ZoneAlarm": "UDS:DangerousObject.Multi.Generic"
  275.  
  276.  
  277. "AhnLab-V3": "Win-Trojan/Autoinj02.Exp"
  278.  
  279.  
  280. "Acronis": "suspicious"
  281.  
  282.  
  283. "MAX": "malware (ai score=100)"
  284.  
  285.  
  286. "Fortinet": "AutoIt/Injector.EFY!tr"
  287.  
  288.  
  289. "AVG": "Win32:Trojan-gen"
  290.  
  291.  
  292. "Qihoo-360": "HEUR/QVM10.1.7B5F.Malware.Gen"
  293.  
  294.  
  295.  
  296.  
  297. "Description": "Creates a slightly modified copy of itself",
  298. "Details":
  299.  
  300. "file": "C:\\Users\\user\\difx64\\GenValObj.bat"
  301.  
  302.  
  303. "percent_match": 100
  304.  
  305.  
  306.  
  307.  
  308. "Description": "Collects information to fingerprint the system",
  309. "Details":
  310.  
  311.  
  312. "Description": "Anomalous binary characteristics",
  313. "Details":
  314.  
  315. "anomaly": "Actual checksum does not match that reported in PE header"
  316.  
  317.  
  318.  
  319.  
  320. "Description": "Created network traffic indicative of malicious activity",
  321. "Details":
  322.  
  323. "signature": "ET TROJAN Possible NanoCore C2 60B"
  324.  
  325.  
  326.  
  327.  
  328.  
  329. * Started Service:
  330.  
  331. * Mutexes:
  332. "Global\\CLR_PerfMon_WrapMutex",
  333. "Global\\CLR_CASOFF_MUTEX",
  334. "Global\\57ffda26-c21f-4689-a222-3f698e68773b",
  335. "Global\\.net clr networking"
  336.  
  337.  
  338. * Modified Files:
  339. "C:\\Users\\user\\difx64\\GenValObj.bat",
  340. "C:\\Users\\Public\\eoyxwfmnmydtdsnhhxqv.vbs",
  341. "C:\\Users\\user\\AppData\\Roaming\\C1515A12-1764-4632-ACE9-A9DFF9253200\\run.dat",
  342. "C:\\Program Files (x86)\\DSL Subsystem\\dslss.exe",
  343. "C:\\Users\\user\\AppData\\Local\\Temp\\tmpB3AE.tmp",
  344. "C:\\Users\\user\\AppData\\Roaming\\C1515A12-1764-4632-ACE9-A9DFF9253200\\task.dat",
  345. "C:\\Users\\user\\AppData\\Local\\Temp\\tmpBE6D.tmp",
  346. "\\Device\\LanmanDatagramReceiver",
  347. "\\??\\PIPE\\srvsvc",
  348. "C:\\Windows\\SoftwareDistribution\\DataStore\\DataStore.edb",
  349. "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edb.chk"
  350.  
  351.  
  352. * Deleted Files:
  353. "C:\\Program Files (x86)\\DSL Subsystem\\dslss.exe",
  354. "C:\\Users\\user\\AppData\\Roaming\\C1515A12-1764-4632-ACE9-A9DFF9253200\\DSL Subsystem\\dslss.exe",
  355. "C:\\Users\\user\\AppData\\Local\\Temp\\tmpB3AE.tmp",
  356. "C:\\Users\\user\\AppData\\Local\\Temp\\tmpBE6D.tmp",
  357. "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe:Zone.Identifier",
  358. "C:\\Windows\\Tasks\\DSL Subsystem.job",
  359. "C:\\Windows\\Tasks\\DSL Subsystem Task.job",
  360. "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edbtmp.log"
  361.  
  362.  
  363. * Modified Registry Keys:
  364. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\eoyxwfmnmydtdsnhhxqv",
  365. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\DSL Subsystem",
  366. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\DB552228-963B-4834-85B5-1AB46FE86BF1\\Path",
  367. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\DB552228-963B-4834-85B5-1AB46FE86BF1\\Hash",
  368. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\DSL Subsystem\\Id",
  369. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\DSL Subsystem\\Index",
  370. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\DB552228-963B-4834-85B5-1AB46FE86BF1\\Triggers",
  371. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\6695562F-EAB8-491E-BD4B-50D4AC2F08F6\\Path",
  372. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\6695562F-EAB8-491E-BD4B-50D4AC2F08F6\\Hash",
  373. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\DSL Subsystem Task\\Id",
  374. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\DSL Subsystem Task\\Index",
  375. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\6695562F-EAB8-491E-BD4B-50D4AC2F08F6\\Triggers",
  376. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\ED0D73D7-BC97-46E2-AC55-FD6EB3F72C05\\DynamicInfo",
  377. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\06027CFB-0B68-4E4C-BEA4-8559A6F9E1BF",
  378. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\B17E070E-57E3-43F6-96F5-A9A9C921DEBF\\DynamicInfo",
  379. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\69E21F04-938C-46A8-B4AD-6FCB4F20E4CC",
  380. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\DF000DCA-3FA2-48A6-9E59-C0606F9F8D73\\DynamicInfo",
  381. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\E80BCF90-2770-40E3-A64D-3E6331A4BEE3",
  382. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\6864624C-748C-42BC-951C-D9405A41132B",
  383. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\05587565-AC7C-43BF-838B-9F2EC71C2015",
  384. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\06027CFB-0B68-4E4C-BEA4-8559A6F9E1BF\\data",
  385. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\69E21F04-938C-46A8-B4AD-6FCB4F20E4CC\\data",
  386. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\E80BCF90-2770-40E3-A64D-3E6331A4BEE3\\data",
  387. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\6864624C-748C-42BC-951C-D9405A41132B\\data",
  388. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\05587565-AC7C-43BF-838B-9F2EC71C2015\\data"
  389.  
  390.  
  391. * Deleted Registry Keys:
  392. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\CompatibilityAdapter\\Signatures\\DSL Subsystem.job",
  393. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\CompatibilityAdapter\\Signatures\\DSL Subsystem.job.fp",
  394. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\CompatibilityAdapter\\Signatures\\DSL Subsystem Task.job",
  395. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\CompatibilityAdapter\\Signatures\\DSL Subsystem Task.job.fp"
  396.  
  397.  
  398. * DNS Communications:
  399.  
  400. "type": "A",
  401. "request": "calitus.hopto.org",
  402. "answers":
  403.  
  404. "data": "185.105.236.176",
  405. "type": "A"
  406.  
  407.  
  408.  
  409.  
  410.  
  411. * Domains:
  412.  
  413. "ip": "185.105.236.176",
  414. "domain": "calitus.hopto.org"
  415.  
  416.  
  417.  
  418. * Network Communication - ICMP:
  419.  
  420. * Network Communication - HTTP:
  421.  
  422. * Network Communication - SMTP:
  423.  
  424. * Network Communication - Hosts:
  425.  
  426. "country_name": "Iran, Islamic Republic of",
  427. "ip": "185.105.236.176",
  428. "inaddrarpa": "",
  429. "hostname": "calitus.hopto.org"
  430.  
  431.  
  432.  
  433. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement