Analysis
-
max time kernel
113s -
max time network
155s -
platform
windows7_x64 -
resource
win7 -
submitted
14-07-2020 04:31
Static task
static1
Behavioral task
behavioral1
Sample
RECEIPT.EXE
Resource
win7
General
-
Target
RECEIPT.EXE
-
Size
863KB
-
MD5
5d5f377b2b6e58c34129590d83126fcd
-
SHA1
13119c08afcc73e20126a3359f227e696090d3cf
-
SHA256
7a9a1eca3717a1e6baba9df99504b2c92066e6f5652f0315de0776f0c319d3a4
-
SHA512
a0408ca8f4bdb47aad2d643c8085dd648238779916a1a8471224512eddb535b5068ff2afc98efa7ff8ddff338b5ad6f81eddf4453ff9e4471c05a546fe3568da
Malware Config
Extracted
nanocore
1.2.2.0
u852117.nvpn.to:5638
c20191a5-cd52-4887-8771-2d1dca5667b7
-
activate_away_mode
true
-
backup_connection_host
u852117.nvpn.to
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-03-19T15:09:07.734275836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5638
-
default_group
BEGINS
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
c20191a5-cd52-4887-8771-2d1dca5667b7
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
u852117.nvpn.to
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1696 1060 RECEIPT.EXE 26 PID 1060 wrote to memory of 1696 1060 RECEIPT.EXE 26 PID 1060 wrote to memory of 1696 1060 RECEIPT.EXE 26 PID 1060 wrote to memory of 1696 1060 RECEIPT.EXE 26 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 PID 1060 wrote to memory of 1392 1060 RECEIPT.EXE 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1060 set thread context of 1392 1060 RECEIPT.EXE 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1392 RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1392 RegSvcs.exe 1392 RegSvcs.exe 1392 RegSvcs.exe 1392 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1392 RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RECEIPT.EXE"C:\Users\Admin\AppData\Local\Temp\RECEIPT.EXE"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1060 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FsyymdEoVL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF546.tmp"2⤵
- Creates scheduled task(s)
PID:1696
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1392
-