Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 21:26
Static task
static1
General
-
Target
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe
-
Size
631KB
-
MD5
d7eac25ddf1e2da8348052e2290bf485
-
SHA1
b33c9d6ae0e2aa9d8df3ced0979ffeb48dc1598f
-
SHA256
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a
-
SHA512
c636c9a4cfdfbeea7d2451cd249d4b76d3a963bb482c17dcb14302a3f287edd43d0f094086e0984c4978ababf3b339d55fbd2f372a3d99db36b49bb051514011
Malware Config
Extracted
nanocore
1.2.2.0
newme122.3utilities.com:8822
newme1122.3utilities.com:8822
dcf3fee6-c103-45ee-a2f0-f8afaa78d1fe
-
activate_away_mode
true
-
backup_connection_host
newme1122.3utilities.com
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-07-31T13:00:17.372768836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
8822
-
default_group
A New TIme Has Come
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
dcf3fee6-c103-45ee-a2f0-f8afaa78d1fe
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
newme122.3utilities.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exepid process 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe -
Processes:
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exedescription pid process target process PID 1424 set thread context of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exepid process 4248 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 4248 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 4248 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 4248 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 4248 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 4248 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exepid process 4248 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exedescription pid process Token: SeDebugPrivilege 4248 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exedescription pid process target process PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe PID 1424 wrote to memory of 4248 1424 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe 1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe"C:\Users\Admin\AppData\Local\Temp\1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe"C:\Users\Admin\AppData\Local\Temp\1ab179b32507607f04f2511045a519a9d7c7c2d433efb19205c95b3906b8fb0a.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsf1D68.tmp\qththtaxv.dllMD5
52b53086a341f2e33f813e162e8b83c5
SHA1eca955e5a53c20dad9c5167b9557d14b09c8e7ff
SHA2569612371e3b0c7142aad86937703c2a9eff4a7a4366f67ea5247439e762ea6305
SHA51257ea982edd1f3913399f0693a3ea8337833bfa204d37a4ef2f5ff5fd9e9acfa4f6240b4ddac892928cf5894a88fc5baf54c3cf5fcf89425e3cc3b50b42f373e9
-
memory/4248-116-0x0000000000400000-0x000000000049B000-memory.dmpFilesize
620KB
-
memory/4248-117-0x000000000040188B-mapping.dmp
-
memory/4248-118-0x0000000000400000-0x000000000049B000-memory.dmpFilesize
620KB
-
memory/4248-119-0x0000000004B40000-0x0000000004B41000-memory.dmpFilesize
4KB
-
memory/4248-120-0x0000000004A00000-0x0000000004A86000-memory.dmpFilesize
536KB
-
memory/4248-122-0x0000000004B50000-0x0000000004B51000-memory.dmpFilesize
4KB
-
memory/4248-123-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/4248-124-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/4248-125-0x00000000052B0000-0x00000000052B1000-memory.dmpFilesize
4KB
-
memory/4248-127-0x0000000004B43000-0x0000000004B44000-memory.dmpFilesize
4KB
-
memory/4248-126-0x0000000004B42000-0x0000000004B43000-memory.dmpFilesize
4KB
-
memory/4248-128-0x0000000004B44000-0x0000000004B45000-memory.dmpFilesize
4KB
-
memory/4248-129-0x0000000005920000-0x0000000005925000-memory.dmpFilesize
20KB
-
memory/4248-130-0x00000000059B0000-0x00000000059BD000-memory.dmpFilesize
52KB
-
memory/4248-131-0x00000000059C0000-0x00000000059D5000-memory.dmpFilesize
84KB
-
memory/4248-132-0x0000000005AF0000-0x0000000005AF6000-memory.dmpFilesize
24KB
-
memory/4248-133-0x0000000005B00000-0x0000000005B07000-memory.dmpFilesize
28KB
-
memory/4248-134-0x0000000005B10000-0x0000000005B16000-memory.dmpFilesize
24KB
-
memory/4248-135-0x0000000005B20000-0x0000000005B2D000-memory.dmpFilesize
52KB
-
memory/4248-136-0x0000000005B50000-0x0000000005B59000-memory.dmpFilesize
36KB
-
memory/4248-137-0x0000000005B70000-0x0000000005B7F000-memory.dmpFilesize
60KB
-
memory/4248-138-0x0000000005B80000-0x0000000005B8A000-memory.dmpFilesize
40KB
-
memory/4248-139-0x0000000005B90000-0x0000000005BA9000-memory.dmpFilesize
100KB
-
memory/4248-140-0x0000000005BB0000-0x0000000005BB3000-memory.dmpFilesize
12KB
-
memory/4248-141-0x0000000005E40000-0x0000000005E69000-memory.dmpFilesize
164KB
-
memory/4248-142-0x0000000005E90000-0x0000000005E9F000-memory.dmpFilesize
60KB