Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-07-2021 03:04
Static task
static1
Behavioral task
behavioral1
Sample
FFXML21050419.PNG.exe
Resource
win7v20210410
General
-
Target
FFXML21050419.PNG.exe
-
Size
1.1MB
-
MD5
00512040b46ab96a32589281a10b9a2a
-
SHA1
f1f15876cec6262ce5e4054dedc5d85d9a161571
-
SHA256
d94e9c9d9140741e9415fde7ee2f33d74f6773cc3a3f3d890ce8a5b5e1d092b8
-
SHA512
217a0f8c3b614f18da94145716af79d755848043040838647879351d6b565781702a0219916850ddad80a5bdc4b33f6459d2c241a5cded77e5973ffefb4ada3f
Malware Config
Extracted
nanocore
1.2.2.0
strongodss.ddns.net:48562
185.19.85.175:48562
ba2baad0-dd3f-4844-a1e3-4d042f9ae8b6
-
activate_away_mode
false
-
backup_connection_host
185.19.85.175
- backup_dns_server
-
buffer_size
65538
-
build_time
2021-04-20T00:12:13.961451136Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
48562
-
default_group
HOBBIT
-
enable_debug_mode
true
-
gc_threshold
1.0485772e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.0485772e+07
-
mutex
ba2baad0-dd3f-4844-a1e3-4d042f9ae8b6
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
strongodss.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8009
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
xohk.pifRegSvcs.exepid process 2400 xohk.pif 196 RegSvcs.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
xohk.pifRegSvcs.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xohk.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Chrome = "C:\\Users\\Admin\\15449656\\xohk.pif C:\\Users\\Admin\\15449656\\RTADMQ~1.GLU" xohk.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AutoUpdate = "C:\\Users\\Admin\\15449656\\Update.vbs" xohk.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UPNP Subsystem = "C:\\Program Files (x86)\\UPNP Subsystem\\upnpss.exe" RegSvcs.exe -
Processes:
RegSvcs.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
xohk.pifdescription pid process target process PID 2400 set thread context of 196 2400 xohk.pif RegSvcs.exe -
Drops file in Program Files directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Program Files (x86)\UPNP Subsystem\upnpss.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\UPNP Subsystem\upnpss.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4052 schtasks.exe 3828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
RegSvcs.exepid process 196 RegSvcs.exe 196 RegSvcs.exe 196 RegSvcs.exe 196 RegSvcs.exe 196 RegSvcs.exe 196 RegSvcs.exe 196 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 196 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 196 RegSvcs.exe Token: SeDebugPrivilege 196 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
FFXML21050419.PNG.exexohk.pifRegSvcs.exedescription pid process target process PID 568 wrote to memory of 2400 568 FFXML21050419.PNG.exe xohk.pif PID 568 wrote to memory of 2400 568 FFXML21050419.PNG.exe xohk.pif PID 568 wrote to memory of 2400 568 FFXML21050419.PNG.exe xohk.pif PID 2400 wrote to memory of 196 2400 xohk.pif RegSvcs.exe PID 2400 wrote to memory of 196 2400 xohk.pif RegSvcs.exe PID 2400 wrote to memory of 196 2400 xohk.pif RegSvcs.exe PID 2400 wrote to memory of 196 2400 xohk.pif RegSvcs.exe PID 2400 wrote to memory of 196 2400 xohk.pif RegSvcs.exe PID 196 wrote to memory of 3828 196 RegSvcs.exe schtasks.exe PID 196 wrote to memory of 3828 196 RegSvcs.exe schtasks.exe PID 196 wrote to memory of 3828 196 RegSvcs.exe schtasks.exe PID 196 wrote to memory of 4052 196 RegSvcs.exe schtasks.exe PID 196 wrote to memory of 4052 196 RegSvcs.exe schtasks.exe PID 196 wrote to memory of 4052 196 RegSvcs.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FFXML21050419.PNG.exe"C:\Users\Admin\AppData\Local\Temp\FFXML21050419.PNG.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\15449656\xohk.pif"C:\Users\Admin\15449656\xohk.pif" rtadmqvui.glu2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UPNP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7DA2.tmp"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UPNP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7F77.tmp"4⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\15449656\rtadmqvui.gluMD5
555e4d93b63107ddf305749525d9e162
SHA1c277178e3856fdaab1395981c54a954c12f2651f
SHA256e0cee13d4664a298952acf30b285d7b2a72076142e02df3f5f091490b70e440b
SHA512a514ec268633cd5fb18336d4187fbad5c479c9c870687d432ae2b30441e1838600ac96c56828f8ccb0770f5424cea4c2d483952b92727d0bd1a1c2fea494a123
-
C:\Users\Admin\15449656\tcrvxrahk.iniMD5
c14d9de8217f5db3747392ea80598311
SHA19dac2a0844c2d009a0a1ec0e3422ad13dce3baef
SHA2563f18132d7cf42e5f301666a94dd691febdaf2cd8206b779f13d390d579fda07c
SHA51215f621be27833c005945a3291c71755f17a95de784000f258f315e811018956beadfad43822332c21b3a50fc19483b4df83bbfbee2724690e0853d1b24ca041a
-
C:\Users\Admin\15449656\xohk.pifMD5
9736d137a50072cafb00ea5c03798da2
SHA121bd4affbe0a61af9a5bdc5cb7fa19eac92e52c0
SHA256624690a68085948a842e9f78c37001e9541c3d996d7ce8758f296b4e6b011540
SHA512cf7dbf2f762c660d9802ac3935b61217c7917e85d1ca247dfd4aa50c16a3f314fcf474cd3cc824c6ee1f4c9ba891f65651d96dfbf44532e340ad105b2eac0c28
-
C:\Users\Admin\15449656\xohk.pifMD5
9736d137a50072cafb00ea5c03798da2
SHA121bd4affbe0a61af9a5bdc5cb7fa19eac92e52c0
SHA256624690a68085948a842e9f78c37001e9541c3d996d7ce8758f296b4e6b011540
SHA512cf7dbf2f762c660d9802ac3935b61217c7917e85d1ca247dfd4aa50c16a3f314fcf474cd3cc824c6ee1f4c9ba891f65651d96dfbf44532e340ad105b2eac0c28
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeMD5
0e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeMD5
0e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215
-
C:\Users\Admin\AppData\Local\Temp\tmp7DA2.tmpMD5
95aceabc58acad5d73372b0966ee1b35
SHA12293b7ad4793cf574b1a5220e85f329b5601040a
SHA2568d9642e1c3cd1e0b5d1763de2fb5e605ba593e5a918b93eec15acbc5dcc48fd4
SHA51200760dfc9d8caf357f0cee5336e5448a4cca18e32cc63e1a69c16e34fe00ea29acd5b2cf278e86c6f9c3e66a1b176d27ed927361848212e6bf1fade7d3d06e74
-
C:\Users\Admin\AppData\Local\Temp\tmp7F77.tmpMD5
af9986f5e128fd8bd3ae748fcba6576d
SHA18060072c35108b48649a03be91803b97f1ad40a4
SHA256f3242f6480b3d1a8f9285135fdce9a201c4802ce062eee4fb41c488a21d53303
SHA512f35c8e1699905bc972ae48a5a4a9fd33ea04b2d851ffc1cb1d1573a2087121d803b4186a696b2edad10a9c46c388a478e105f5a730020b598aa9f483086dba38
-
memory/196-120-0x000000000132E792-mapping.dmp
-
memory/196-119-0x0000000001310000-0x000000000196C000-memory.dmpFilesize
6.4MB
-
memory/196-126-0x0000000006070000-0x0000000006071000-memory.dmpFilesize
4KB
-
memory/196-127-0x0000000006110000-0x0000000006111000-memory.dmpFilesize
4KB
-
memory/196-128-0x0000000005FD0000-0x00000000064CE000-memory.dmpFilesize
5.0MB
-
memory/196-129-0x0000000005FB0000-0x0000000005FB1000-memory.dmpFilesize
4KB
-
memory/196-137-0x0000000006290000-0x0000000006293000-memory.dmpFilesize
12KB
-
memory/196-125-0x00000000064D0000-0x00000000064D1000-memory.dmpFilesize
4KB
-
memory/196-136-0x0000000006270000-0x0000000006289000-memory.dmpFilesize
100KB
-
memory/196-135-0x0000000006050000-0x0000000006056000-memory.dmpFilesize
24KB
-
memory/196-134-0x0000000006040000-0x0000000006045000-memory.dmpFilesize
20KB
-
memory/2400-114-0x0000000000000000-mapping.dmp
-
memory/3828-130-0x0000000000000000-mapping.dmp
-
memory/4052-132-0x0000000000000000-mapping.dmp