Analysis
-
max time kernel
62s -
max time network
143s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
23C8Bj2mCZIlAVt.exe
Resource
win7
General
-
Target
23C8Bj2mCZIlAVt.exe
-
Size
350KB
-
MD5
60e504ff4a2e238ff0716044e8d3f4e3
-
SHA1
8e0b70725fce4818e20a5e524211b4f7e93a731a
-
SHA256
f1935263e66e861d822355a9ec1332f46f74ff8fded6e52cefbfed60cd3eca0a
-
SHA512
b34c70da34dd76bb683b978847496509bc74c8562af68046932ded4c0cd7e0ebcf023c1883c386439d269f14abef3a494380edee236f78332c4d215eaa780788
Malware Config
Extracted
nanocore
1.2.2.0
91.193.75.58:1985
596c2bb9-90b7-4362-af9a-082627ebed15
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-03-30T21:40:30.911959536Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1985
-
default_group
official
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
596c2bb9-90b7-4362-af9a-082627ebed15
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
91.193.75.58
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1584 RegSvcs.exe 1584 RegSvcs.exe 1584 RegSvcs.exe 1584 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1584 RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 316 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1088 wrote to memory of 316 1088 23C8Bj2mCZIlAVt.exe 24 PID 1088 wrote to memory of 316 1088 23C8Bj2mCZIlAVt.exe 24 PID 1088 wrote to memory of 316 1088 23C8Bj2mCZIlAVt.exe 24 PID 1088 wrote to memory of 316 1088 23C8Bj2mCZIlAVt.exe 24 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 PID 1088 wrote to memory of 1584 1088 23C8Bj2mCZIlAVt.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 1584 1088 23C8Bj2mCZIlAVt.exe 26 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WAN Subsystem\wanss.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\WAN Subsystem\wanss.exe RegSvcs.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Subsystem = "C:\\Program Files (x86)\\WAN Subsystem\\wanss.exe" RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1584 RegSvcs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23C8Bj2mCZIlAVt.exe"C:\Users\Admin\AppData\Local\Temp\23C8Bj2mCZIlAVt.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1088 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WxXJDiE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9349.tmp"2⤵
- Creates scheduled task(s)
PID:316
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Drops file in Program Files directory
- Adds Run entry to start application
- Suspicious use of AdjustPrivilegeToken
- Checks whether UAC is enabled
PID:1584
-