Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-01-2021 09:21
Static task
static1
Behavioral task
behavioral1
Sample
1514dad5fc756723d4c00e0817605ae9.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1514dad5fc756723d4c00e0817605ae9.exe
Resource
win10v20201028
General
-
Target
1514dad5fc756723d4c00e0817605ae9.exe
-
Size
1.8MB
-
MD5
1514dad5fc756723d4c00e0817605ae9
-
SHA1
ba60f92da33b83ec49dd2a80dcdaec358dfc4c53
-
SHA256
66d2cbc64ba169d994da1f76587f48695ae0c3ec91fed8cb17c023e7370db0c9
-
SHA512
7656d372e1972e21911017873a89b4959abc982d2535b20d03fca07ce4764b37b271c3fa27cf52c9815b3e53a11c38d451a8d32134c541721085c7856460b475
Malware Config
Extracted
nanocore
1.2.2.0
dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu:2420
9a83c6a0-5b64-416c-b0dc-d47048e32edf
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-11-08T01:17:30.860776436Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
2420
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
9a83c6a0-5b64-416c-b0dc-d47048e32edf
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
dmjncbzvayuywqalponmcbvzcxhyuesgfhdnautwm.ydns.eu
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1514dad5fc756723d4c00e0817605ae9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Host = "C:\\Program Files (x86)\\WPA Host\\wpahost.exe" 1514dad5fc756723d4c00e0817605ae9.exe -
Processes:
1514dad5fc756723d4c00e0817605ae9.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1514dad5fc756723d4c00e0817605ae9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
1514dad5fc756723d4c00e0817605ae9.exepid process 776 1514dad5fc756723d4c00e0817605ae9.exe 776 1514dad5fc756723d4c00e0817605ae9.exe 776 1514dad5fc756723d4c00e0817605ae9.exe 776 1514dad5fc756723d4c00e0817605ae9.exe 776 1514dad5fc756723d4c00e0817605ae9.exe 776 1514dad5fc756723d4c00e0817605ae9.exe 776 1514dad5fc756723d4c00e0817605ae9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1514dad5fc756723d4c00e0817605ae9.exedescription pid process target process PID 776 set thread context of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe -
Drops file in Program Files directory 2 IoCs
Processes:
1514dad5fc756723d4c00e0817605ae9.exedescription ioc process File created C:\Program Files (x86)\WPA Host\wpahost.exe 1514dad5fc756723d4c00e0817605ae9.exe File opened for modification C:\Program Files (x86)\WPA Host\wpahost.exe 1514dad5fc756723d4c00e0817605ae9.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1968 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
1514dad5fc756723d4c00e0817605ae9.exe1514dad5fc756723d4c00e0817605ae9.exepid process 776 1514dad5fc756723d4c00e0817605ae9.exe 776 1514dad5fc756723d4c00e0817605ae9.exe 776 1514dad5fc756723d4c00e0817605ae9.exe 608 1514dad5fc756723d4c00e0817605ae9.exe 608 1514dad5fc756723d4c00e0817605ae9.exe 608 1514dad5fc756723d4c00e0817605ae9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
1514dad5fc756723d4c00e0817605ae9.exepid process 608 1514dad5fc756723d4c00e0817605ae9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1514dad5fc756723d4c00e0817605ae9.exe1514dad5fc756723d4c00e0817605ae9.exedescription pid process Token: SeDebugPrivilege 776 1514dad5fc756723d4c00e0817605ae9.exe Token: SeDebugPrivilege 608 1514dad5fc756723d4c00e0817605ae9.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
1514dad5fc756723d4c00e0817605ae9.execmd.exe1514dad5fc756723d4c00e0817605ae9.exedescription pid process target process PID 776 wrote to memory of 2036 776 1514dad5fc756723d4c00e0817605ae9.exe cmd.exe PID 776 wrote to memory of 2036 776 1514dad5fc756723d4c00e0817605ae9.exe cmd.exe PID 776 wrote to memory of 2036 776 1514dad5fc756723d4c00e0817605ae9.exe cmd.exe PID 776 wrote to memory of 2036 776 1514dad5fc756723d4c00e0817605ae9.exe cmd.exe PID 2036 wrote to memory of 1968 2036 cmd.exe timeout.exe PID 2036 wrote to memory of 1968 2036 cmd.exe timeout.exe PID 2036 wrote to memory of 1968 2036 cmd.exe timeout.exe PID 2036 wrote to memory of 1968 2036 cmd.exe timeout.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 776 wrote to memory of 608 776 1514dad5fc756723d4c00e0817605ae9.exe 1514dad5fc756723d4c00e0817605ae9.exe PID 608 wrote to memory of 1772 608 1514dad5fc756723d4c00e0817605ae9.exe schtasks.exe PID 608 wrote to memory of 1772 608 1514dad5fc756723d4c00e0817605ae9.exe schtasks.exe PID 608 wrote to memory of 1772 608 1514dad5fc756723d4c00e0817605ae9.exe schtasks.exe PID 608 wrote to memory of 1772 608 1514dad5fc756723d4c00e0817605ae9.exe schtasks.exe PID 608 wrote to memory of 808 608 1514dad5fc756723d4c00e0817605ae9.exe schtasks.exe PID 608 wrote to memory of 808 608 1514dad5fc756723d4c00e0817605ae9.exe schtasks.exe PID 608 wrote to memory of 808 608 1514dad5fc756723d4c00e0817605ae9.exe schtasks.exe PID 608 wrote to memory of 808 608 1514dad5fc756723d4c00e0817605ae9.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1514dad5fc756723d4c00e0817605ae9.exe"C:\Users\Admin\AppData\Local\Temp\1514dad5fc756723d4c00e0817605ae9.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\1514dad5fc756723d4c00e0817605ae9.exe"C:\Users\Admin\AppData\Local\Temp\1514dad5fc756723d4c00e0817605ae9.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WPA Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp982.tmp"3⤵
- Creates scheduled task(s)
PID:1772 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WPA Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpACB.tmp"3⤵
- Creates scheduled task(s)
PID:808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
284bbc20466cbe9ba3462702e01c89d7
SHA113c946cedb05dd1fabf458ccc86fb2ff1bb35f50
SHA25639e3f328609e5825954ce0dce32f4952b349cf758abbd1dde617114715859200
SHA5122728465400c0f2ee4abb9eb67e6a382852f64e1ce0c253aeb2c52ed7163d609befe3f8e6946f288a04e857ac29870663615e490dbc95d4270a4a9a3328c34c93
-
MD5
819bdbdac3be050783d203020e6c4c30
SHA1a373521fceb21cac8b93e55ee48578e40a6e740b
SHA2560e5dedca6d0d3c50ebcedb5bbf51ef3d434eb6b43da46764205de7636131f053
SHA512cece1c4d8b4db79fc6e3cd225efaccdf9d2493f28991b1d48439944af38aaa61a215bd00a0beedcbdecc4f1ec5be0843774375a483f3d4a573a3980c54798cbd