Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    26-01-2022 15:33

General

  • Target

    34a01c5a55d7f77a53d694af2dcd284b259530a34a3ac8caa279cccc4959710f.exe

  • Size

    83KB

  • MD5

    972a4f69140dd4785c051d5e82937404

  • SHA1

    5792f489d1337f21b4783aa9d87dd664f4b662bc

  • SHA256

    34a01c5a55d7f77a53d694af2dcd284b259530a34a3ac8caa279cccc4959710f

  • SHA512

    39fb7b873c325cc7e4a5a73ec9383e8ff604c649a2b1e3dbb410e63d6c66e44a37568e6b9ff475d05b4133cad1c95a246ce831a2075f79189921536c9ea93a6c

Score
10/10

Malware Config

Extracted

Family

nworm

Version

v0.3.8

C2

narotomagic.publicvm.com:1170

Mutex

c31d7883

Signatures

  • NWorm

    A TrickBot module used to propagate to vulnerable domain controllers.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34a01c5a55d7f77a53d694af2dcd284b259530a34a3ac8caa279cccc4959710f.exe
    "C:\Users\Admin\AppData\Local\Temp\34a01c5a55d7f77a53d694af2dcd284b259530a34a3ac8caa279cccc4959710f.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'SANTOK.exe"' /tr "'C:\Users\Admin\AppData\Roaming\SANTOK.exe"'
      2⤵
      • Creates scheduled task(s)
      PID:460
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp4F96.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1132
      • C:\Users\Admin\AppData\Roaming\SANTOK.exe
        "C:\Users\Admin\AppData\Roaming\SANTOK.exe"
        3⤵
        • Executes dropped EXE
        PID:540

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp4F96.tmp.bat
    MD5

    1296f9e2ab3bbcb2916adf13e455994f

    SHA1

    2fa18742c4a2daff32acfa874bf15e0f6e070a79

    SHA256

    412b339508a0d924a988acda3bd5b3b7c6d93b8db0348f4dcc852f8b555ddc3c

    SHA512

    98c43af2ecf32b367fe42438f9965ec7adad086519f8bf9aa8a9dfe51a0d23fd380196bd8897c058b0af4659dab4c230fb4f56c777b927f66276b0ec3a67c2dc

  • C:\Users\Admin\AppData\Roaming\SANTOK.exe
    MD5

    f3cd50692308908e3589fc9504a93229

    SHA1

    fd3167813e04ab84a8260a6688e8b89cec1f3654

    SHA256

    a4c82be64d4bf02a942da91f27d24eb79aaaca5bf438e3aab99bd6095ba6a582

    SHA512

    25227d8d0e8975d4b57548bd0022baa12c71293ba5f70573a6d62b6e9061d0f10387cdfe4d8276a911c108cec77b404e540e640e7c237ce2a187680be42a5a48

  • C:\Users\Admin\AppData\Roaming\SANTOK.exe
    MD5

    f3cd50692308908e3589fc9504a93229

    SHA1

    fd3167813e04ab84a8260a6688e8b89cec1f3654

    SHA256

    a4c82be64d4bf02a942da91f27d24eb79aaaca5bf438e3aab99bd6095ba6a582

    SHA512

    25227d8d0e8975d4b57548bd0022baa12c71293ba5f70573a6d62b6e9061d0f10387cdfe4d8276a911c108cec77b404e540e640e7c237ce2a187680be42a5a48

  • memory/540-58-0x00000000008C0000-0x00000000008DA000-memory.dmp
    Filesize

    104KB

  • memory/540-59-0x0000000002130000-0x0000000002132000-memory.dmp
    Filesize

    8KB

  • memory/1724-53-0x0000000000C10000-0x0000000000C2A000-memory.dmp
    Filesize

    104KB

  • memory/1724-54-0x000007FEFC451000-0x000007FEFC453000-memory.dmp
    Filesize

    8KB