Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 12:38
Static task
static1
Behavioral task
behavioral1
Sample
FILE.exe
Resource
win7v200430
General
-
Target
FILE.exe
-
Size
1.0MB
-
MD5
5b5369b2f6c3375da64a1ab886f50f9f
-
SHA1
71fb505cb1333272197f7a034061253ec52fdb59
-
SHA256
7943dd3d1f4215ee40123ab13edc945dccd0ff9d3e9cddf372ff8ecbffe62635
-
SHA512
af84b9c8edb227367bb7729d696e02420166f1f98b1595e891fd937a31acaee234fb11b9f6a1ec378415eb5f8c19701d912dac0cf8f42b2ab75ca94f0c9e1989
Malware Config
Extracted
nanocore
1.2.2.0
johnsuccess18.ddns.net:52943
154.16.93.185:52943
ecda5e37-0f0a-4c9a-9215-b73b6f1653e9
-
activate_away_mode
false
-
backup_connection_host
154.16.93.185
- backup_dns_server
-
buffer_size
65538
-
build_time
2020-03-08T11:31:26.590996936Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
52943
-
default_group
WINMONI$
-
enable_debug_mode
true
-
gc_threshold
1.0485772e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.0485772e+07
-
mutex
ecda5e37-0f0a-4c9a-9215-b73b6f1653e9
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
johnsuccess18.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8009
Signatures
-
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3760 2944 FILE.exe 67 PID 2944 wrote to memory of 3760 2944 FILE.exe 67 PID 2944 wrote to memory of 3760 2944 FILE.exe 67 PID 3760 wrote to memory of 3824 3760 qrinvwbw.pif 69 PID 3760 wrote to memory of 3824 3760 qrinvwbw.pif 69 PID 3760 wrote to memory of 3824 3760 qrinvwbw.pif 69 PID 3760 wrote to memory of 4016 3760 qrinvwbw.pif 70 PID 3760 wrote to memory of 4016 3760 qrinvwbw.pif 70 PID 3760 wrote to memory of 4016 3760 qrinvwbw.pif 70 PID 3760 wrote to memory of 2464 3760 qrinvwbw.pif 71 PID 3760 wrote to memory of 2464 3760 qrinvwbw.pif 71 PID 3760 wrote to memory of 2464 3760 qrinvwbw.pif 71 PID 3760 wrote to memory of 692 3760 qrinvwbw.pif 72 PID 3760 wrote to memory of 692 3760 qrinvwbw.pif 72 PID 3760 wrote to memory of 692 3760 qrinvwbw.pif 72 PID 3760 wrote to memory of 1752 3760 qrinvwbw.pif 73 PID 3760 wrote to memory of 1752 3760 qrinvwbw.pif 73 PID 3760 wrote to memory of 1752 3760 qrinvwbw.pif 73 PID 3760 wrote to memory of 3892 3760 qrinvwbw.pif 74 PID 3760 wrote to memory of 3892 3760 qrinvwbw.pif 74 PID 3760 wrote to memory of 3892 3760 qrinvwbw.pif 74 PID 3760 wrote to memory of 3900 3760 qrinvwbw.pif 75 PID 3760 wrote to memory of 3900 3760 qrinvwbw.pif 75 PID 3760 wrote to memory of 3900 3760 qrinvwbw.pif 75 PID 3760 wrote to memory of 496 3760 qrinvwbw.pif 76 PID 3760 wrote to memory of 496 3760 qrinvwbw.pif 76 PID 3760 wrote to memory of 496 3760 qrinvwbw.pif 76 PID 3760 wrote to memory of 496 3760 qrinvwbw.pif 76 PID 3760 wrote to memory of 496 3760 qrinvwbw.pif 76 PID 496 wrote to memory of 3216 496 RegSvcs.exe 77 PID 496 wrote to memory of 3216 496 RegSvcs.exe 77 PID 496 wrote to memory of 3216 496 RegSvcs.exe 77 PID 496 wrote to memory of 476 496 RegSvcs.exe 79 PID 496 wrote to memory of 476 496 RegSvcs.exe 79 PID 496 wrote to memory of 476 496 RegSvcs.exe 79 -
Executes dropped EXE 1 IoCs
pid Process 3760 qrinvwbw.pif -
Adds Run entry to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run qrinvwbw.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\50783558\\qrinvwbw.pif C:\\Users\\Admin\\AppData\\Roaming\\50783558\\lnnufwq.ebp" qrinvwbw.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Subsystem = "C:\\Program Files (x86)\\DDP Subsystem\\ddpss.exe" RegSvcs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegSvcs.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\DDP Subsystem\ddpss.exe RegSvcs.exe File created C:\Program Files (x86)\DDP Subsystem\ddpss.exe RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3216 schtasks.exe 476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 3760 qrinvwbw.pif 496 RegSvcs.exe 496 RegSvcs.exe 496 RegSvcs.exe 496 RegSvcs.exe 496 RegSvcs.exe 496 RegSvcs.exe 496 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3760 set thread context of 496 3760 qrinvwbw.pif 76 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 496 RegSvcs.exe Token: SeDebugPrivilege 496 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 496 RegSvcs.exe -
Disables Task Manager via registry modification
Processes
-
C:\Users\Admin\AppData\Local\Temp\FILE.exe"C:\Users\Admin\AppData\Local\Temp\FILE.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\50783558\qrinvwbw.pif"C:\Users\Admin\AppData\Roaming\50783558\qrinvwbw.pif" lnnufwq.ebp2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Adds Run entry to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:3760 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵PID:3824
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵PID:4016
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵PID:2464
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵PID:692
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵PID:1752
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵PID:3892
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵PID:3900
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: GetForegroundWindowSpam
PID:496 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9C89.tmp"4⤵
- Creates scheduled task(s)
PID:3216
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9D17.tmp"4⤵
- Creates scheduled task(s)
PID:476
-
-
-