Analysis
-
max time kernel
13s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-01-2021 07:50
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT COPY RECEIPT.exe
Resource
win7v20201028
General
-
Target
PAYMENT COPY RECEIPT.exe
-
Size
434KB
-
MD5
c3da28de257b1b534110d8697563a743
-
SHA1
b127eb700d37a8b027fe67b78b0afa35975ffff9
-
SHA256
17b4666d69c4c82a89ee9208dfe8ebb84e3f7acdd81dfb2320ed00efcce33134
-
SHA512
747ab809f36efd6df6153ed1c3100a7e376677397ab7c23c4f2de2ef89d0dc17e25cbe9ab3180cece43f1188f62a56fca78b2779456cb23c276e20500422cf4a
Malware Config
Extracted
nanocore
1.2.2.0
chinomso.duckdns.org:7688
5c856c52-5125-42de-9ed3-2389e16da064
-
activate_away_mode
true
-
backup_connection_host
chinomso.duckdns.org
-
backup_dns_server
chinomso.duckdns.org
-
buffer_size
65535
-
build_time
2020-10-13T03:36:21.868380136Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
7688
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
5c856c52-5125-42de-9ed3-2389e16da064
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
chinomso.duckdns.org
-
primary_dns_server
chinomso.duckdns.org
-
request_elevation
false
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
PAYMENT COPY RECEIPT.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Host = "C:\\Program Files (x86)\\WPA Host\\wpahost.exe" PAYMENT COPY RECEIPT.exe -
Processes:
PAYMENT COPY RECEIPT.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PAYMENT COPY RECEIPT.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PAYMENT COPY RECEIPT.exedescription pid process target process PID 2028 set thread context of 1620 2028 PAYMENT COPY RECEIPT.exe PAYMENT COPY RECEIPT.exe -
Drops file in Program Files directory 2 IoCs
Processes:
PAYMENT COPY RECEIPT.exedescription ioc process File opened for modification C:\Program Files (x86)\WPA Host\wpahost.exe PAYMENT COPY RECEIPT.exe File created C:\Program Files (x86)\WPA Host\wpahost.exe PAYMENT COPY RECEIPT.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1972 schtasks.exe 1772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
PAYMENT COPY RECEIPT.exepid process 1620 PAYMENT COPY RECEIPT.exe 1620 PAYMENT COPY RECEIPT.exe 1620 PAYMENT COPY RECEIPT.exe 1620 PAYMENT COPY RECEIPT.exe 1620 PAYMENT COPY RECEIPT.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
PAYMENT COPY RECEIPT.exepid process 1620 PAYMENT COPY RECEIPT.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
PAYMENT COPY RECEIPT.exepid process 2028 PAYMENT COPY RECEIPT.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PAYMENT COPY RECEIPT.exedescription pid process Token: SeDebugPrivilege 1620 PAYMENT COPY RECEIPT.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
PAYMENT COPY RECEIPT.exePAYMENT COPY RECEIPT.exedescription pid process target process PID 2028 wrote to memory of 1620 2028 PAYMENT COPY RECEIPT.exe PAYMENT COPY RECEIPT.exe PID 2028 wrote to memory of 1620 2028 PAYMENT COPY RECEIPT.exe PAYMENT COPY RECEIPT.exe PID 2028 wrote to memory of 1620 2028 PAYMENT COPY RECEIPT.exe PAYMENT COPY RECEIPT.exe PID 2028 wrote to memory of 1620 2028 PAYMENT COPY RECEIPT.exe PAYMENT COPY RECEIPT.exe PID 2028 wrote to memory of 1620 2028 PAYMENT COPY RECEIPT.exe PAYMENT COPY RECEIPT.exe PID 1620 wrote to memory of 1972 1620 PAYMENT COPY RECEIPT.exe schtasks.exe PID 1620 wrote to memory of 1972 1620 PAYMENT COPY RECEIPT.exe schtasks.exe PID 1620 wrote to memory of 1972 1620 PAYMENT COPY RECEIPT.exe schtasks.exe PID 1620 wrote to memory of 1972 1620 PAYMENT COPY RECEIPT.exe schtasks.exe PID 1620 wrote to memory of 1772 1620 PAYMENT COPY RECEIPT.exe schtasks.exe PID 1620 wrote to memory of 1772 1620 PAYMENT COPY RECEIPT.exe schtasks.exe PID 1620 wrote to memory of 1772 1620 PAYMENT COPY RECEIPT.exe schtasks.exe PID 1620 wrote to memory of 1772 1620 PAYMENT COPY RECEIPT.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY RECEIPT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY RECEIPT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY RECEIPT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY RECEIPT.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WPA Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1239.tmp"3⤵
- Creates scheduled task(s)
PID:1972
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WPA Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1391.tmp"3⤵
- Creates scheduled task(s)
PID:1772
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7b5f0c95e2d79859228267ea42895694
SHA13df34c5687efde4141225094d39ff7cae08d1e51
SHA2563a1ac8d74e73caa86ecb8928327f7a3a53b21d19da46ba7b93c3ed48cb9db66a
SHA51242b483614109ed944880265cf097e914c771b24d99ae85afec93936e04cfd1e1ec9635689e5ee324d91b86fa26d58a4ffe86958447da0b095e050dcde806b342
-
MD5
819bdbdac3be050783d203020e6c4c30
SHA1a373521fceb21cac8b93e55ee48578e40a6e740b
SHA2560e5dedca6d0d3c50ebcedb5bbf51ef3d434eb6b43da46764205de7636131f053
SHA512cece1c4d8b4db79fc6e3cd225efaccdf9d2493f28991b1d48439944af38aaa61a215bd00a0beedcbdecc4f1ec5be0843774375a483f3d4a573a3980c54798cbd