Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:34
Static task
static1
Behavioral task
behavioral1
Sample
U85C0HFJ.exe
Resource
win7-20220414-en
General
-
Target
U85C0HFJ.exe
-
Size
842KB
-
MD5
1e6c98943038ee098cb0203a0d8231ef
-
SHA1
2dc93e968f7560f709c8a3c115e305194c8fe87d
-
SHA256
23143dfb44c72eeec3b05a6d3dde2c4245adcb7db200c00f7700257830b4bcc4
-
SHA512
6ab77d1062467897b892619d6a09360dfb8dc676abf813817c935b41f7119fa8cfc6912a1d4a576556f37c2875df3f68fc421de162e99ea9d586e36c8016d436
Malware Config
Extracted
nanocore
1.2.2.0
185.165.153.236:9083
godrich.duckdns.org:9083
8048bd48-ccbd-4e17-b105-f23d73fd0f3e
-
activate_away_mode
false
-
backup_connection_host
godrich.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-05-16T12:17:36.575332436Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
9083
-
default_group
reciept
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
8048bd48-ccbd-4e17-b105-f23d73fd0f3e
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
185.165.153.236
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
4985
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
U85C0HFJ.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SCSI Subsystem = "C:\\Program Files (x86)\\SCSI Subsystem\\scsiss.exe" U85C0HFJ.exe -
Processes:
U85C0HFJ.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA U85C0HFJ.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
U85C0HFJ.exedescription pid process target process PID 1352 set thread context of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe -
Drops file in Program Files directory 2 IoCs
Processes:
U85C0HFJ.exedescription ioc process File created C:\Program Files (x86)\SCSI Subsystem\scsiss.exe U85C0HFJ.exe File opened for modification C:\Program Files (x86)\SCSI Subsystem\scsiss.exe U85C0HFJ.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2632 schtasks.exe 2232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
U85C0HFJ.exeU85C0HFJ.exepid process 1352 U85C0HFJ.exe 1352 U85C0HFJ.exe 1352 U85C0HFJ.exe 1352 U85C0HFJ.exe 1352 U85C0HFJ.exe 1352 U85C0HFJ.exe 2628 U85C0HFJ.exe 2628 U85C0HFJ.exe 2628 U85C0HFJ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
U85C0HFJ.exepid process 2628 U85C0HFJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
U85C0HFJ.exeU85C0HFJ.exedescription pid process Token: SeDebugPrivilege 1352 U85C0HFJ.exe Token: SeDebugPrivilege 2628 U85C0HFJ.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
U85C0HFJ.exeU85C0HFJ.exedescription pid process target process PID 1352 wrote to memory of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe PID 1352 wrote to memory of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe PID 1352 wrote to memory of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe PID 1352 wrote to memory of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe PID 1352 wrote to memory of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe PID 1352 wrote to memory of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe PID 1352 wrote to memory of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe PID 1352 wrote to memory of 2628 1352 U85C0HFJ.exe U85C0HFJ.exe PID 2628 wrote to memory of 2632 2628 U85C0HFJ.exe schtasks.exe PID 2628 wrote to memory of 2632 2628 U85C0HFJ.exe schtasks.exe PID 2628 wrote to memory of 2632 2628 U85C0HFJ.exe schtasks.exe PID 2628 wrote to memory of 2232 2628 U85C0HFJ.exe schtasks.exe PID 2628 wrote to memory of 2232 2628 U85C0HFJ.exe schtasks.exe PID 2628 wrote to memory of 2232 2628 U85C0HFJ.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\U85C0HFJ.exe"C:\Users\Admin\AppData\Local\Temp\U85C0HFJ.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\U85C0HFJ.exe"{path}"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SCSI Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp222E.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SCSI Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp27AD.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\U85C0HFJ.exe.logFilesize
507B
MD58cf94b5356be60247d331660005941ec
SHA1fdedb361f40f22cb6a086c808fc0056d4e421131
SHA25652a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0
SHA512b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651
-
C:\Users\Admin\AppData\Local\Temp\tmp222E.tmpFilesize
1KB
MD54ff4b10cf65700de5145553c9ef11281
SHA17ed8f6d10d21ff964957a40ab7b5f18f3b781937
SHA25646475d14cd8b49da221eeeb35ce439706991237e29a01f6b7dde4e91560618bc
SHA512d9e5e9b788fdaaa2a5ad860ab1cb537526367d52a2ba89936daa31da3118581fed75eef02a3b9f10b11623b25ac0136e2a6e4aa68458b126a21a8fa3495002ab
-
C:\Users\Admin\AppData\Local\Temp\tmp27AD.tmpFilesize
1KB
MD5bd110f9fc6c1a842f1d9b269010b0611
SHA1ef71c062902602faef9b66dcd1cfc9fe5baaf389
SHA2568135c4e4eeaa741f752c0ab8f4ee33e3bb8a0cac5923812234f2e5177d50eb5b
SHA512b8a7943a3126880b26407800bbdad5402c5b0e2aa106e7dbbb35d0cb145ca9de114401573a6aa66042a2e13674cfbcc2981d66b813f9b923fff5302210afba1f
-
memory/1352-130-0x0000000000FB0000-0x0000000001088000-memory.dmpFilesize
864KB
-
memory/1352-131-0x0000000006070000-0x0000000006614000-memory.dmpFilesize
5.6MB
-
memory/1352-132-0x0000000005CE0000-0x0000000005D72000-memory.dmpFilesize
584KB
-
memory/1352-133-0x0000000005E20000-0x0000000005EBC000-memory.dmpFilesize
624KB
-
memory/2232-140-0x0000000000000000-mapping.dmp
-
memory/2628-134-0x0000000000000000-mapping.dmp
-
memory/2628-135-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2628-137-0x0000000005600000-0x000000000560A000-memory.dmpFilesize
40KB
-
memory/2632-138-0x0000000000000000-mapping.dmp