Analysis
-
max time kernel
156s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:14
Static task
static1
Behavioral task
behavioral1
Sample
TBA.exe
Resource
win7-20220414-en
General
-
Target
TBA.exe
-
Size
492KB
-
MD5
a8cd86a7698875d1eba6a5b03d24e61b
-
SHA1
3de1fbe8198880e2005b7e7d26e288d068165acd
-
SHA256
b3fd83d19a65a806d17f9c5245b94d7499e711f56814a2d1fe4ae62474315781
-
SHA512
dc29909c2602b7f97cb828c1f8f54d8fd0e8fb8c2e29aed94c7811ac03169853ab379b106c2883280b87243e4261df4f999d055f9326878728ab37d2680a6514
Malware Config
Extracted
nanocore
1.2.2.0
isiefi.ddns.net:9909
1c87c2a2-27a9-4062-b41f-749df56c3f54
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-03-28T18:27:52.322706536Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
9909
-
default_group
latest
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1c87c2a2-27a9-4062-b41f-749df56c3f54
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
isiefi.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
TBA.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation TBA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Service = "C:\\Program Files (x86)\\WPA Service\\wpasv.exe" MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TBA.exedescription pid process target process PID 2364 set thread context of 2568 2364 TBA.exe MSBuild.exe -
Drops file in Program Files directory 2 IoCs
Processes:
MSBuild.exedescription ioc process File created C:\Program Files (x86)\WPA Service\wpasv.exe MSBuild.exe File opened for modification C:\Program Files (x86)\WPA Service\wpasv.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
TBA.exeMSBuild.exepid process 2364 TBA.exe 2568 MSBuild.exe 2568 MSBuild.exe 2568 MSBuild.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
MSBuild.exepid process 2568 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
TBA.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 2364 TBA.exe Token: SeDebugPrivilege 2568 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
TBA.exedescription pid process target process PID 2364 wrote to memory of 2404 2364 TBA.exe schtasks.exe PID 2364 wrote to memory of 2404 2364 TBA.exe schtasks.exe PID 2364 wrote to memory of 2404 2364 TBA.exe schtasks.exe PID 2364 wrote to memory of 2568 2364 TBA.exe MSBuild.exe PID 2364 wrote to memory of 2568 2364 TBA.exe MSBuild.exe PID 2364 wrote to memory of 2568 2364 TBA.exe MSBuild.exe PID 2364 wrote to memory of 2568 2364 TBA.exe MSBuild.exe PID 2364 wrote to memory of 2568 2364 TBA.exe MSBuild.exe PID 2364 wrote to memory of 2568 2364 TBA.exe MSBuild.exe PID 2364 wrote to memory of 2568 2364 TBA.exe MSBuild.exe PID 2364 wrote to memory of 2568 2364 TBA.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TBA.exe"C:\Users\Admin\AppData\Local\Temp\TBA.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sBjJNTRC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp89EC.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp89EC.tmpFilesize
1KB
MD523bd020f9b17c0f3fbaaffe0d187bc59
SHA1979da6c35c9e63f7875253dd58444d5f246b4c1e
SHA25609b3676ec6f17345e2679ca50ce0c90eadbc8e1969b6bbfcb911294261b971dd
SHA51212a5554bdf4a03388080258a20d8e783de71d42581c4b19737724b27036ee8de23eea0a6c31bf03878f88fce478d723486d4574fced1350ea585c4da02cd05e4
-
memory/2364-130-0x0000000000A70000-0x0000000000AF2000-memory.dmpFilesize
520KB
-
memory/2364-131-0x0000000005A80000-0x0000000006024000-memory.dmpFilesize
5.6MB
-
memory/2364-132-0x00000000054D0000-0x0000000005562000-memory.dmpFilesize
584KB
-
memory/2364-133-0x0000000006030000-0x00000000061B6000-memory.dmpFilesize
1.5MB
-
memory/2364-134-0x0000000005970000-0x0000000005A0C000-memory.dmpFilesize
624KB
-
memory/2404-135-0x0000000000000000-mapping.dmp
-
memory/2568-137-0x0000000000000000-mapping.dmp
-
memory/2568-138-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2568-139-0x0000000004E50000-0x0000000004E5A000-memory.dmpFilesize
40KB