Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
01-08-2020 19:37
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe
Resource
win10
General
-
Target
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe
-
Size
596KB
-
MD5
be46a654b9b6fef849466ea92d54cc1b
-
SHA1
380d5b896297a83dc3c3ad6a86c6f9eeaa72fdd7
-
SHA256
3dc9838107abe50dfcd90972d2e1a5a8e2aa6e735723fa635927bd4ddb790e81
-
SHA512
859d060f711eebb52f874d15d02c14c3efdc5d914204614e6e7eb17ad7a3f6dc9fe8f56529c6fc0e131ac6cc885f97cf70adc60febadf7b95c3d1bd815c8bf8d
Malware Config
Extracted
nanocore
1.2.2.0
79.134.225.12:1996
mogs20.hopto.org:1996
610a4fc8-16e9-4c97-b0a7-ec2ef0b6bea6
-
activate_away_mode
true
-
backup_connection_host
mogs20.hopto.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-04-07T08:06:17.001984136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1996
-
default_group
RESULTS
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
610a4fc8-16e9-4c97-b0a7-ec2ef0b6bea6
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
79.134.225.12
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exedescription pid process target process PID 1420 wrote to memory of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe PID 1420 wrote to memory of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe PID 1420 wrote to memory of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe PID 1420 wrote to memory of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe PID 1420 wrote to memory of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe PID 1420 wrote to memory of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe PID 1420 wrote to memory of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe PID 1420 wrote to memory of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exedescription pid process target process PID 1420 set thread context of 1508 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 87 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exepid process 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe -
Drops startup file 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe -
Processes:
RegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exepid process 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1420 SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe Token: SeDebugPrivilege 1508 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegAsm.exepid process 1508 RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.362.7860.17521.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Drops startup file
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1508-0-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1508-1-0x000000000041E792-mapping.dmp
-
memory/1508-2-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1508-3-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB