Analysis

  • max time kernel
    121s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    29-10-2021 15:54

General

  • Target

    3ea7bd2fb52842ea458767db3b9a3189.exe

  • Size

    202KB

  • MD5

    3ea7bd2fb52842ea458767db3b9a3189

  • SHA1

    a7e5bc074c3f2f318c5c38961d2d714b181f5aa6

  • SHA256

    c8c69f36f89061f4ce86b108c0ff12ade49d665eace2d60ba179a2341bd54c40

  • SHA512

    be61014439bc0556d8888429106f2ee4895f78a6a37c28d9226af22b9bdaf27e3d1b5a8a3f536f4f274ae1477a168128e5096ea327cc9fdb668d9c4e3cd3fcc1

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ea7bd2fb52842ea458767db3b9a3189.exe
    "C:\Users\Admin\AppData\Local\Temp\3ea7bd2fb52842ea458767db3b9a3189.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1540-55-0x00000000763C1000-0x00000000763C3000-memory.dmp

    Filesize

    8KB

  • memory/1540-56-0x0000000002290000-0x0000000002291000-memory.dmp

    Filesize

    4KB