Analysis
-
max time kernel
36s -
max time network
196s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-07-2021 18:07
Static task
static1
Behavioral task
behavioral1
Sample
fb64fc2471a48928b7989f7e959de261.exe
Resource
win7v20210408
General
-
Target
fb64fc2471a48928b7989f7e959de261.exe
-
Size
867KB
-
MD5
fb64fc2471a48928b7989f7e959de261
-
SHA1
334f95083ee83d20255b87e0bfd4aae86a922d20
-
SHA256
cc536d630284e622821d1034fadec488cb35dc72bdfb75edbd184a638d052f98
-
SHA512
c96a7ef0e0691096e7cd8c841696a4be951f4b1621c4aa89b39d98e24e9310464558c66eba3f67600e169da46d9936d670a26802b2f5550a4804552ef9fc7916
Malware Config
Extracted
nanocore
1.2.2.0
hhjhtggfr.duckdns.org:8234
dertrefg.duckdns.org:8234
6a1c2465-7ac5-4f1d-acc5-ef04fcf454c9
-
activate_away_mode
true
-
backup_connection_host
dertrefg.duckdns.org
-
backup_dns_server
dertrefg.duckdns.org
-
buffer_size
65535
-
build_time
2021-03-26T23:25:40.118592436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
8234
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
6a1c2465-7ac5-4f1d-acc5-ef04fcf454c9
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
hhjhtggfr.duckdns.org
-
primary_dns_server
hhjhtggfr.duckdns.org
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Service = "C:\\Program Files (x86)\\DPI Service\\dpisv.exe" fb64fc2471a48928b7989f7e959de261.exe -
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fb64fc2471a48928b7989f7e959de261.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription pid process target process PID 1092 set thread context of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription ioc process File created C:\Program Files (x86)\DPI Service\dpisv.exe fb64fc2471a48928b7989f7e959de261.exe File opened for modification C:\Program Files (x86)\DPI Service\dpisv.exe fb64fc2471a48928b7989f7e959de261.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exefb64fc2471a48928b7989f7e959de261.exepid process 1092 fb64fc2471a48928b7989f7e959de261.exe 1092 fb64fc2471a48928b7989f7e959de261.exe 1028 fb64fc2471a48928b7989f7e959de261.exe 1028 fb64fc2471a48928b7989f7e959de261.exe 1028 fb64fc2471a48928b7989f7e959de261.exe 1028 fb64fc2471a48928b7989f7e959de261.exe 1028 fb64fc2471a48928b7989f7e959de261.exe 1028 fb64fc2471a48928b7989f7e959de261.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exepid process 1028 fb64fc2471a48928b7989f7e959de261.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exefb64fc2471a48928b7989f7e959de261.exedescription pid process Token: SeDebugPrivilege 1092 fb64fc2471a48928b7989f7e959de261.exe Token: SeDebugPrivilege 1028 fb64fc2471a48928b7989f7e959de261.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription pid process target process PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 1092 wrote to memory of 1028 1092 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb64fc2471a48928b7989f7e959de261.exe"C:\Users\Admin\AppData\Local\Temp\fb64fc2471a48928b7989f7e959de261.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\fb64fc2471a48928b7989f7e959de261.exeC:\Users\Admin\AppData\Local\Temp\fb64fc2471a48928b7989f7e959de261.exe2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1028
-