Analysis
-
max time kernel
30s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 18:07
Static task
static1
Behavioral task
behavioral1
Sample
fb64fc2471a48928b7989f7e959de261.exe
Resource
win7v20210408
General
-
Target
fb64fc2471a48928b7989f7e959de261.exe
-
Size
867KB
-
MD5
fb64fc2471a48928b7989f7e959de261
-
SHA1
334f95083ee83d20255b87e0bfd4aae86a922d20
-
SHA256
cc536d630284e622821d1034fadec488cb35dc72bdfb75edbd184a638d052f98
-
SHA512
c96a7ef0e0691096e7cd8c841696a4be951f4b1621c4aa89b39d98e24e9310464558c66eba3f67600e169da46d9936d670a26802b2f5550a4804552ef9fc7916
Malware Config
Extracted
nanocore
1.2.2.0
hhjhtggfr.duckdns.org:8234
dertrefg.duckdns.org:8234
6a1c2465-7ac5-4f1d-acc5-ef04fcf454c9
-
activate_away_mode
true
-
backup_connection_host
dertrefg.duckdns.org
-
backup_dns_server
dertrefg.duckdns.org
-
buffer_size
65535
-
build_time
2021-03-26T23:25:40.118592436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
8234
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
6a1c2465-7ac5-4f1d-acc5-ef04fcf454c9
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
hhjhtggfr.duckdns.org
-
primary_dns_server
hhjhtggfr.duckdns.org
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISS Manager = "C:\\Program Files (x86)\\ISS Manager\\issmgr.exe" fb64fc2471a48928b7989f7e959de261.exe -
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fb64fc2471a48928b7989f7e959de261.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription pid process target process PID 3016 set thread context of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription ioc process File created C:\Program Files (x86)\ISS Manager\issmgr.exe fb64fc2471a48928b7989f7e959de261.exe File opened for modification C:\Program Files (x86)\ISS Manager\issmgr.exe fb64fc2471a48928b7989f7e959de261.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exefb64fc2471a48928b7989f7e959de261.exepid process 3016 fb64fc2471a48928b7989f7e959de261.exe 3016 fb64fc2471a48928b7989f7e959de261.exe 3928 fb64fc2471a48928b7989f7e959de261.exe 3928 fb64fc2471a48928b7989f7e959de261.exe 3928 fb64fc2471a48928b7989f7e959de261.exe 3928 fb64fc2471a48928b7989f7e959de261.exe 3928 fb64fc2471a48928b7989f7e959de261.exe 3928 fb64fc2471a48928b7989f7e959de261.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exepid process 3928 fb64fc2471a48928b7989f7e959de261.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exefb64fc2471a48928b7989f7e959de261.exedescription pid process Token: SeDebugPrivilege 3016 fb64fc2471a48928b7989f7e959de261.exe Token: SeDebugPrivilege 3928 fb64fc2471a48928b7989f7e959de261.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fb64fc2471a48928b7989f7e959de261.exedescription pid process target process PID 3016 wrote to memory of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 3016 wrote to memory of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 3016 wrote to memory of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 3016 wrote to memory of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 3016 wrote to memory of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 3016 wrote to memory of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 3016 wrote to memory of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe PID 3016 wrote to memory of 3928 3016 fb64fc2471a48928b7989f7e959de261.exe fb64fc2471a48928b7989f7e959de261.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb64fc2471a48928b7989f7e959de261.exe"C:\Users\Admin\AppData\Local\Temp\fb64fc2471a48928b7989f7e959de261.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\fb64fc2471a48928b7989f7e959de261.exeC:\Users\Admin\AppData\Local\Temp\fb64fc2471a48928b7989f7e959de261.exe2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fb64fc2471a48928b7989f7e959de261.exe.log
MD59e7845217df4a635ec4341c3d52ed685
SHA1d65cb39d37392975b038ce503a585adadb805da5
SHA256d60e596ed3d5c13dc9f1660e6d870d99487e1383891437645c4562a9ecaa8c9b
SHA512307c3b4d4f2655bdeb177e7b9c981ca27513618903f02c120caa755c9da5a8dd03ebab660b56108a680720a97c1e9596692490aede18cc4bd77b9fc3d8e68aa1