Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:14
Static task
static1
Behavioral task
behavioral1
Sample
TBA.exe
Resource
win7-20220414-en
General
-
Target
TBA.exe
-
Size
492KB
-
MD5
a8cd86a7698875d1eba6a5b03d24e61b
-
SHA1
3de1fbe8198880e2005b7e7d26e288d068165acd
-
SHA256
b3fd83d19a65a806d17f9c5245b94d7499e711f56814a2d1fe4ae62474315781
-
SHA512
dc29909c2602b7f97cb828c1f8f54d8fd0e8fb8c2e29aed94c7811ac03169853ab379b106c2883280b87243e4261df4f999d055f9326878728ab37d2680a6514
Malware Config
Extracted
nanocore
1.2.2.0
isiefi.ddns.net:9909
1c87c2a2-27a9-4062-b41f-749df56c3f54
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-03-28T18:27:52.322706536Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
9909
-
default_group
latest
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1c87c2a2-27a9-4062-b41f-749df56c3f54
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
isiefi.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DSL Service = "C:\\Program Files (x86)\\DSL Service\\dslsvc.exe" MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TBA.exedescription pid process target process PID 1180 set thread context of 1332 1180 TBA.exe MSBuild.exe -
Drops file in Program Files directory 2 IoCs
Processes:
MSBuild.exedescription ioc process File created C:\Program Files (x86)\DSL Service\dslsvc.exe MSBuild.exe File opened for modification C:\Program Files (x86)\DSL Service\dslsvc.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
TBA.exeMSBuild.exepid process 1180 TBA.exe 1332 MSBuild.exe 1332 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
TBA.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1180 TBA.exe Token: SeDebugPrivilege 1332 MSBuild.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
TBA.exedescription pid process target process PID 1180 wrote to memory of 1960 1180 TBA.exe schtasks.exe PID 1180 wrote to memory of 1960 1180 TBA.exe schtasks.exe PID 1180 wrote to memory of 1960 1180 TBA.exe schtasks.exe PID 1180 wrote to memory of 1960 1180 TBA.exe schtasks.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe PID 1180 wrote to memory of 1332 1180 TBA.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TBA.exe"C:\Users\Admin\AppData\Local\Temp\TBA.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sBjJNTRC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E2A.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3E2A.tmpFilesize
1KB
MD5e0b5a7adbfbeadac2570bc08168722f7
SHA11598d8c763dad50f1954cd8ad20df082cf97de11
SHA2562728af9703485fec90409c07532c289a0780abd48d3a73c62394c2579d90e6e8
SHA512f02ed812ccabddfa381326208e0346a7e7aebfa84f8d62cbf385866d3b0cd267e78010057845ec071bbb79f7ae4c5f615653e6b99d0d6817025aaff72eeb6cf6
-
memory/1180-55-0x0000000076C81000-0x0000000076C83000-memory.dmpFilesize
8KB
-
memory/1180-56-0x00000000004D0000-0x00000000004DA000-memory.dmpFilesize
40KB
-
memory/1180-57-0x0000000000990000-0x00000000009D0000-memory.dmpFilesize
256KB
-
memory/1180-54-0x0000000000B10000-0x0000000000B92000-memory.dmpFilesize
520KB
-
memory/1332-69-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1332-60-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1332-61-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1332-63-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1332-64-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1332-66-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1332-67-0x000000000041E792-mapping.dmp
-
memory/1332-71-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1332-73-0x00000000003E0000-0x00000000003EA000-memory.dmpFilesize
40KB
-
memory/1332-74-0x00000000004D0000-0x00000000004EE000-memory.dmpFilesize
120KB
-
memory/1332-75-0x00000000003F0000-0x00000000003FA000-memory.dmpFilesize
40KB
-
memory/1332-76-0x0000000004D35000-0x0000000004D46000-memory.dmpFilesize
68KB
-
memory/1960-58-0x0000000000000000-mapping.dmp