Resubmissions

14-01-2025 09:53

250114-lwyesaxjan 10

14-01-2025 06:39

250114-henx8szmaz 10

20-06-2022 14:10

220620-rgn6fsdgdq 10

Analysis

  • max time kernel
    26s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 14:10

General

  • Target

    ccc.exe

  • Size

    202KB

  • MD5

    a88b1378237da8dc5ce1b174b08ba618

  • SHA1

    35063e0fadc39dcd690b3f20793223f096a614d9

  • SHA256

    dcb5330316f2cd274e28927e3ebb604e55fe6604593c45a3c2a24799190bb363

  • SHA512

    6130b66ea4a724408321c985559dcfee0dba4ccd69388cfe1588128d2dcccb56325834de47a8fd9edabca7ea6fcf9a8159758b72fc0beaef4cbe10b32ae4483c

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • suricata: ET MALWARE Possible NanoCore C2 60B

    suricata: ET MALWARE Possible NanoCore C2 60B

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccc.exe
    "C:\Users\Admin\AppData\Local\Temp\ccc.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1320
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1780
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1496

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1320-54-0x0000000075CD1000-0x0000000075CD3000-memory.dmp

        Filesize

        8KB

      • memory/1320-55-0x0000000074990000-0x0000000074F3B000-memory.dmp

        Filesize

        5.7MB

      • memory/1320-56-0x0000000074990000-0x0000000074F3B000-memory.dmp

        Filesize

        5.7MB

      • memory/1320-58-0x0000000074990000-0x0000000074F3B000-memory.dmp

        Filesize

        5.7MB

      • memory/1780-57-0x000007FEFBE61000-0x000007FEFBE63000-memory.dmp

        Filesize

        8KB