Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 04:56
Static task
static1
Behavioral task
behavioral1
Sample
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe
Resource
win7-20220718-en
General
-
Target
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe
-
Size
1.3MB
-
MD5
f41ac3c9d7cac6153c6687fe0b160dc9
-
SHA1
c7368bb2435f0dca25a39fe11ca1df1be9dbef6c
-
SHA256
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802
-
SHA512
40d7605ec4244a702893ed926b5e4eeef41052fa06ffd5c753bf06b03c171dcd6929a58d2336f47ac4b5def49221c811748f8b9962896ed900141ddda595bc8d
Malware Config
Signatures
-
suricata: ET MALWARE Possible NanoCore C2 60B
suricata: ET MALWARE Possible NanoCore C2 60B
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ARP Monitor = "C:\\Program Files (x86)\\ARP Monitor\\arpmon.exe" fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exefb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exepid process 2004 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exedescription pid process target process PID 2004 set thread context of 996 2004 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exedescription ioc process File created C:\Program Files (x86)\ARP Monitor\arpmon.exe fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe File opened for modification C:\Program Files (x86)\ARP Monitor\arpmon.exe fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1172 schtasks.exe 2036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exepid process 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exepid process 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exedescription pid process Token: SeDebugPrivilege 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exepid process 2004 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exepid process 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exefb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exedescription pid process target process PID 2004 wrote to memory of 996 2004 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe PID 2004 wrote to memory of 996 2004 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe PID 2004 wrote to memory of 996 2004 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe PID 2004 wrote to memory of 996 2004 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe PID 996 wrote to memory of 1172 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe schtasks.exe PID 996 wrote to memory of 1172 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe schtasks.exe PID 996 wrote to memory of 1172 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe schtasks.exe PID 996 wrote to memory of 1172 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe schtasks.exe PID 996 wrote to memory of 2036 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe schtasks.exe PID 996 wrote to memory of 2036 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe schtasks.exe PID 996 wrote to memory of 2036 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe schtasks.exe PID 996 wrote to memory of 2036 996 fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe"C:\Users\Admin\AppData\Local\Temp\fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe"C:\Users\Admin\AppData\Local\Temp\fb54fb0923bdd2eab423511171594f00e111895a2569ff98079e264ba8ef5802.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "ARP Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3286.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "ARP Monitor Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3610.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3286.tmpFilesize
1KB
MD577ae39d74633ba1cd28d5af6dfc9ae48
SHA1a07a06e314d8da1e79389c8040b72eac1de1a147
SHA2563a91e8698b1f3f1a58948608e660a9febe3533f9573d097a952386f7f87f95e1
SHA5124d1d8a1bc29d78f98b419490bcc8d175fe6afd22f8c2d7573748b60e4926d36979d89171acb54bdbe7fb1e21c6b4dc6491c468bff32dcf662ee56894e98f3240
-
C:\Users\Admin\AppData\Local\Temp\tmp3610.tmpFilesize
1KB
MD5acc7d7829edec6af26aa18f8ca7776ef
SHA129f5290d08127f29924a2eb189e21b9bcfbb6f3a
SHA2562165ad57e4cd29e911a2861e1fe6366ce11912c95f8e5ede61d247b75753001a
SHA51207e84e0f7eb030dc0f2efde201c023051a2559dbdcde957fea73669a6e2deac9848cf3503e4e7f9524660d61ead850632bb998f12b73b887dfe841286002bc5b
-
memory/996-67-0x0000000000400000-0x0000000000544000-memory.dmpFilesize
1.3MB
-
memory/996-73-0x0000000074FB0000-0x000000007555B000-memory.dmpFilesize
5.7MB
-
memory/996-78-0x0000000074FB0000-0x000000007555B000-memory.dmpFilesize
5.7MB
-
memory/996-77-0x0000000000220000-0x000000000022E000-memory.dmpFilesize
56KB
-
memory/996-61-0x00000000005173F9-mapping.dmp
-
memory/996-66-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/996-75-0x0000000021690000-0x00000000216CC000-memory.dmpFilesize
240KB
-
memory/996-68-0x0000000077C10000-0x0000000077DB9000-memory.dmpFilesize
1.7MB
-
memory/996-69-0x0000000077DF0000-0x0000000077F70000-memory.dmpFilesize
1.5MB
-
memory/1172-70-0x0000000000000000-mapping.dmp
-
memory/2004-59-0x0000000077C10000-0x0000000077DB9000-memory.dmpFilesize
1.7MB
-
memory/2004-60-0x0000000077DF0000-0x0000000077F70000-memory.dmpFilesize
1.5MB
-
memory/2004-57-0x00000000760F1000-0x00000000760F3000-memory.dmpFilesize
8KB
-
memory/2004-56-0x0000000000310000-0x000000000031E000-memory.dmpFilesize
56KB
-
memory/2004-63-0x0000000077DF0000-0x0000000077F70000-memory.dmpFilesize
1.5MB
-
memory/2004-62-0x0000000000310000-0x000000000031E000-memory.dmpFilesize
56KB
-
memory/2036-72-0x0000000000000000-mapping.dmp