Analysis
-
max time kernel
66s -
max time network
151s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13/07/2020, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
23C8Bj2mCZIlAVt.exe
Resource
win7
General
-
Target
23C8Bj2mCZIlAVt.exe
-
Size
350KB
-
MD5
60e504ff4a2e238ff0716044e8d3f4e3
-
SHA1
8e0b70725fce4818e20a5e524211b4f7e93a731a
-
SHA256
f1935263e66e861d822355a9ec1332f46f74ff8fded6e52cefbfed60cd3eca0a
-
SHA512
b34c70da34dd76bb683b978847496509bc74c8562af68046932ded4c0cd7e0ebcf023c1883c386439d269f14abef3a494380edee236f78332c4d215eaa780788
Malware Config
Extracted
nanocore
1.2.2.0
91.193.75.58:1985
596c2bb9-90b7-4362-af9a-082627ebed15
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-03-30T21:40:30.911959536Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1985
-
default_group
official
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
596c2bb9-90b7-4362-af9a-082627ebed15
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
91.193.75.58
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2916 23C8Bj2mCZIlAVt.exe Token: SeDebugPrivilege 3612 RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2916 23C8Bj2mCZIlAVt.exe 3612 RegSvcs.exe 3612 RegSvcs.exe 3612 RegSvcs.exe 3612 RegSvcs.exe 3612 RegSvcs.exe 3612 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3612 RegSvcs.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SCSI Manager = "C:\\Program Files (x86)\\SCSI Manager\\scsimgr.exe" RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3588 2916 23C8Bj2mCZIlAVt.exe 73 PID 2916 wrote to memory of 3588 2916 23C8Bj2mCZIlAVt.exe 73 PID 2916 wrote to memory of 3588 2916 23C8Bj2mCZIlAVt.exe 73 PID 2916 wrote to memory of 3612 2916 23C8Bj2mCZIlAVt.exe 75 PID 2916 wrote to memory of 3612 2916 23C8Bj2mCZIlAVt.exe 75 PID 2916 wrote to memory of 3612 2916 23C8Bj2mCZIlAVt.exe 75 PID 2916 wrote to memory of 3612 2916 23C8Bj2mCZIlAVt.exe 75 PID 2916 wrote to memory of 3612 2916 23C8Bj2mCZIlAVt.exe 75 PID 2916 wrote to memory of 3612 2916 23C8Bj2mCZIlAVt.exe 75 PID 2916 wrote to memory of 3612 2916 23C8Bj2mCZIlAVt.exe 75 PID 2916 wrote to memory of 3612 2916 23C8Bj2mCZIlAVt.exe 75 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 3612 2916 23C8Bj2mCZIlAVt.exe 75 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\SCSI Manager\scsimgr.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\SCSI Manager\scsimgr.exe RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3588 schtasks.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23C8Bj2mCZIlAVt.exe"C:\Users\Admin\AppData\Local\Temp\23C8Bj2mCZIlAVt.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:2916 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WxXJDiE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp285E.tmp"2⤵
- Creates scheduled task(s)
PID:3588
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Adds Run entry to start application
- Drops file in Program Files directory
- Checks whether UAC is enabled
PID:3612
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:556