Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
fwfuJFhRr1BqCWi.exe
Resource
win7-20220414-en
General
-
Target
fwfuJFhRr1BqCWi.exe
-
Size
589KB
-
MD5
372d925870b10617a1bafa396d646bd9
-
SHA1
647431572f8119f401092f8874b087d1fa468ac4
-
SHA256
5693fc15c7c4843819dd2e7d768f7ad32c031ca0a112cf604d38319d00e7a811
-
SHA512
5f632d330eab155ecda41becc25fd6be13ebe1d5da7e6d13f7b421abd223f2a78e08b33b9ee008953a5676f15a81e62031bbfa69e93e7c7949670d28025d3d75
Malware Config
Extracted
nanocore
1.2.2.0
185.140.53.51:1985
127.0.0.1:1985
05567b5c-42af-4a71-996e-6f0227b9f4ae
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-05-09T11:35:52.395864036Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1985
-
default_group
Sureboy
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
05567b5c-42af-4a71-996e-6f0227b9f4ae
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
185.140.53.51
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fwfuJFhRr1BqCWi.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation fwfuJFhRr1BqCWi.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Monitor = "C:\\Program Files (x86)\\WPA Monitor\\wpamon.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fwfuJFhRr1BqCWi.exedescription pid process target process PID 2512 set thread context of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe -
Drops file in Program Files directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Program Files (x86)\WPA Monitor\wpamon.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\WPA Monitor\wpamon.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
fwfuJFhRr1BqCWi.exeRegSvcs.exepid process 2512 fwfuJFhRr1BqCWi.exe 2512 fwfuJFhRr1BqCWi.exe 2512 fwfuJFhRr1BqCWi.exe 2512 fwfuJFhRr1BqCWi.exe 2512 fwfuJFhRr1BqCWi.exe 2512 fwfuJFhRr1BqCWi.exe 2512 fwfuJFhRr1BqCWi.exe 2512 fwfuJFhRr1BqCWi.exe 4632 RegSvcs.exe 4632 RegSvcs.exe 4632 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 4632 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fwfuJFhRr1BqCWi.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2512 fwfuJFhRr1BqCWi.exe Token: SeDebugPrivilege 4632 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
fwfuJFhRr1BqCWi.exedescription pid process target process PID 2512 wrote to memory of 2584 2512 fwfuJFhRr1BqCWi.exe schtasks.exe PID 2512 wrote to memory of 2584 2512 fwfuJFhRr1BqCWi.exe schtasks.exe PID 2512 wrote to memory of 2584 2512 fwfuJFhRr1BqCWi.exe schtasks.exe PID 2512 wrote to memory of 3536 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 3536 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 3536 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 1972 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 1972 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 1972 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe PID 2512 wrote to memory of 4632 2512 fwfuJFhRr1BqCWi.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fwfuJFhRr1BqCWi.exe"C:\Users\Admin\AppData\Local\Temp\fwfuJFhRr1BqCWi.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\&startupname&" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4B70.tmp"2⤵
- Creates scheduled task(s)
PID:2584 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵PID:3536
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵PID:1972
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ab9f8a9574d9209cd8666decb37e33cc
SHA1b768b98d37b96bcf5eeeb4bae10589a196b66db2
SHA2562c052172f943620c36053efd2ab1d6ef9fbb671c55669b9f49430f0f7acd7704
SHA5125059538580cce17a2c7516e3117297310455e38ff32d51c6e17ef188448ce3567f9c968ad478df725ed2ce8630ceee2340246264a6e60877895591a67d45da70