Resubmissions

14-01-2025 09:53

250114-lwyesaxjan 10

14-01-2025 06:39

250114-henx8szmaz 10

20-06-2022 14:10

220620-rgn6fsdgdq 10

Analysis

  • max time kernel
    37s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-06-2022 14:10

General

  • Target

    ccc.exe

  • Size

    202KB

  • MD5

    a88b1378237da8dc5ce1b174b08ba618

  • SHA1

    35063e0fadc39dcd690b3f20793223f096a614d9

  • SHA256

    dcb5330316f2cd274e28927e3ebb604e55fe6604593c45a3c2a24799190bb363

  • SHA512

    6130b66ea4a724408321c985559dcfee0dba4ccd69388cfe1588128d2dcccb56325834de47a8fd9edabca7ea6fcf9a8159758b72fc0beaef4cbe10b32ae4483c

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • suricata: ET MALWARE Possible NanoCore C2 60B

    suricata: ET MALWARE Possible NanoCore C2 60B

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccc.exe
    "C:\Users\Admin\AppData\Local\Temp\ccc.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3436
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39e3855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:3088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3436-130-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3436-131-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB

  • memory/3436-132-0x0000000074C20000-0x00000000751D1000-memory.dmp

    Filesize

    5.7MB