Analysis

  • max time kernel
    178s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2022 11:38

General

  • Target

    ITSARAT.exe

  • Size

    203KB

  • MD5

    5dadfc1c90afe933eb3f76c0432a1067

  • SHA1

    7f3d72b6b7d84df3f9dbc980acf19a4c588793c8

  • SHA256

    eafe5062cb0fce38399521ab487ca4e7cd81c39811763c011e48921640966d34

  • SHA512

    a07ddaea31c008efae8b898332aeaba239fa0f5e7f6c8050851f5f141baca76812ef41d58f6f83c7f217a94ba68635ec7e7bb00ff481c0b0d3384c48736441c8

  • SSDEEP

    6144:cLV6Bta6dtJmakIM59+ZeHyUHKlbK46HylxXAjN:cLV6BtpmkdZeL2KhxjN

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ITSARAT.exe
    "C:\Users\Admin\AppData\Local\Temp\ITSARAT.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "DDP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmpEF80.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3680
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "DDP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF30C.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3520

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpEF80.tmp
    Filesize

    1KB

    MD5

    7197d8046458b144a4a2b58ce0a87743

    SHA1

    a84c96e0452f099157ed863bd0171d0c7c2de840

    SHA256

    fe28b5043f9a26facb2cf80040528507259cd13ff61776f2cd9b3e8d0774e53e

    SHA512

    0806843540037341f958b1189c8aae361b6994ef868871e403497763385033b57b3518f0f19026a4b89753bcebb4535f69b1de7ee06e9dd2b1a5c49ab14df43a

  • C:\Users\Admin\AppData\Local\Temp\tmpF30C.tmp
    Filesize

    1KB

    MD5

    2271642ca970891700e3f48439739ed8

    SHA1

    cd472df2349f7db9e1e460d0ee28acd97b8a8793

    SHA256

    7aba66abbcb0b13455609174db23aed495a9adbef0e0acd28baa9c92445eda68

    SHA512

    4669a4ef8ec28cdb852ffc1401576b1bf9a9d837797d7d92bc88c18b3097404f36854e50167b309706fef400cabc43c876569ce2797ba85eb169a2783b8fe807

  • memory/3520-136-0x0000000000000000-mapping.dmp
  • memory/3680-134-0x0000000000000000-mapping.dmp
  • memory/4008-132-0x00000000746C0000-0x0000000074C71000-memory.dmp
    Filesize

    5.7MB

  • memory/4008-133-0x00000000746C0000-0x0000000074C71000-memory.dmp
    Filesize

    5.7MB