Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2022 18:26

General

  • Target

    5ba1ec417eed18b3f39bd6a83d171d9df8b6336adc966afaf083995d77c5fae4.exe

  • Size

    309KB

  • MD5

    3e84ff0190e4ebfb051448fde035364e

  • SHA1

    7efd883c4fcc49df5615658605d09d57e427dbc6

  • SHA256

    5ba1ec417eed18b3f39bd6a83d171d9df8b6336adc966afaf083995d77c5fae4

  • SHA512

    c872e2af779db49352eb916321290f13fad7cf6acee518057009032cceea3b42b975566079560309c6df707d84a3abb5071d8bec52ad06cf60ea5807a1dd5cbf

  • SSDEEP

    6144:5K9eooDK1zJmZNUrz21pQotrLHeHbxG/GWvmm8NErGQiVSHTXiPBKq4U:MoDIe63EphFyHFiGWvmmYyYgUn5

Malware Config

Extracted

Family

nanocore

Version

1.2.2.2

C2

tadas123.mooo.com:59786

ktmpss.mooo.com:59786

Mutex

fbd611ba-8508-451c-8f11-45e28ff8e35e

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    ktmpss.mooo.com

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2015-04-14T14:04:43.383753236Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    true

  • connect_delay

    4000

  • connection_port

    59786

  • default_group

    CsGo Botai 0307

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    fbd611ba-8508-451c-8f11-45e28ff8e35e

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    tadas123.mooo.com

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.2

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 14 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Runs ping.exe 1 TTPs 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ba1ec417eed18b3f39bd6a83d171d9df8b6336adc966afaf083995d77c5fae4.exe
    "C:\Users\Admin\AppData\Local\Temp\5ba1ec417eed18b3f39bd6a83d171d9df8b6336adc966afaf083995d77c5fae4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1992
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:568
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1316
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1592
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1192
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1380
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1692
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:816
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1952
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1664
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      "\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=AppLaunch.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1904
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:537610 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1984
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:209945 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:812
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:209957 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2192
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:1061904 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2540
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1548
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:304
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1996
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:904
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1660
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:584
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1604
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1648
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:456
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • Runs ping.exe
      PID:1276
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "mstsc" /t REG_SZ /F /D "C:\Users\Admin\Documents\mstsc\mstsc.exe
      2⤵
      • Adds Run key to start application
      PID:1956
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "mstsc" /t REG_SZ /F /D "C:\Users\Admin\Documents\mstsc\mstsc.exe
      2⤵
      • Adds Run key to start application
      PID:1920
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      "\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
      2⤵
        PID:1296
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "mstsc" /t REG_SZ /F /D "C:\Users\Admin\Documents\mstsc\mstsc.exe
        2⤵
        • Adds Run key to start application
        PID:1976
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        "\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
        2⤵
          PID:1816
        • C:\Windows\SysWOW64\REG.exe
          REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "mstsc" /t REG_SZ /F /D "C:\Users\Admin\Documents\mstsc\mstsc.exe
          2⤵
          • Adds Run key to start application
          PID:2088
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          "\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
          2⤵
            PID:2100
          • C:\Windows\SysWOW64\REG.exe
            REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "mstsc" /t REG_SZ /F /D "C:\Users\Admin\Documents\mstsc\mstsc.exe
            2⤵
            • Adds Run key to start application
            PID:2336
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
            "\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
            2⤵
              PID:2348
            • C:\Windows\SysWOW64\REG.exe
              REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "mstsc" /t REG_SZ /F /D "C:\Users\Admin\Documents\mstsc\mstsc.exe
              2⤵
              • Adds Run key to start application
              PID:2448
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
              "\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
              2⤵
                PID:2460
              • C:\Windows\SysWOW64\REG.exe
                REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "mstsc" /t REG_SZ /F /D "C:\Users\Admin\Documents\mstsc\mstsc.exe
                2⤵
                • Adds Run key to start application
                PID:2636
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
                "\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
                2⤵
                  PID:2652

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Defense Evasion

              Modify Registry

              2
              T1112

              Discovery

              Remote System Discovery

              1
              T1018

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\66YCQLJB.txt
                Filesize

                539B

                MD5

                524f6844de1b915c8dd62792b8bfa233

                SHA1

                f1d027439b2f716b6154ad3c0d97be0326e5bef6

                SHA256

                a75c30687ee055594c634afab85d3fa633df946b0c48506e1f27e2933cfc12ae

                SHA512

                c9c213f72dd8b2336f5a0136bd7afc9efb0865aa18f29f4dbbcb1f6d9ac3f1d0082c47530837d03e2cb5597fbfd420cd5899061d0e6d316a6bc2bef80e8bcb78

              • memory/304-81-0x0000000000000000-mapping.dmp
              • memory/456-88-0x0000000000000000-mapping.dmp
              • memory/568-57-0x0000000000000000-mapping.dmp
              • memory/584-85-0x0000000000000000-mapping.dmp
              • memory/816-64-0x0000000000000000-mapping.dmp
              • memory/904-83-0x0000000000000000-mapping.dmp
              • memory/1192-61-0x0000000000000000-mapping.dmp
              • memory/1276-89-0x0000000000000000-mapping.dmp
              • memory/1296-99-0x000000000041E73A-mapping.dmp
              • memory/1316-58-0x0000000000000000-mapping.dmp
              • memory/1380-62-0x0000000000000000-mapping.dmp
              • memory/1548-76-0x0000000000000000-mapping.dmp
              • memory/1592-59-0x0000000000000000-mapping.dmp
              • memory/1604-86-0x0000000000000000-mapping.dmp
              • memory/1648-87-0x0000000000000000-mapping.dmp
              • memory/1660-84-0x0000000000000000-mapping.dmp
              • memory/1664-66-0x0000000000000000-mapping.dmp
              • memory/1692-63-0x0000000000000000-mapping.dmp
              • memory/1816-113-0x000000000041E73A-mapping.dmp
              • memory/1900-74-0x000000000041E73A-mapping.dmp
              • memory/1900-68-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/1900-77-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/1900-79-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/1900-73-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/1900-71-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/1900-70-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/1900-67-0x0000000000400000-0x0000000000438000-memory.dmp
                Filesize

                224KB

              • memory/1920-91-0x0000000000000000-mapping.dmp
              • memory/1952-65-0x0000000000000000-mapping.dmp
              • memory/1956-90-0x0000000000000000-mapping.dmp
              • memory/1976-105-0x0000000000000000-mapping.dmp
              • memory/1992-55-0x0000000000000000-mapping.dmp
              • memory/1996-82-0x0000000000000000-mapping.dmp
              • memory/2032-54-0x00000000766D1000-0x00000000766D3000-memory.dmp
                Filesize

                8KB

              • memory/2032-56-0x0000000074E10000-0x00000000753BB000-memory.dmp
                Filesize

                5.7MB

              • memory/2032-60-0x0000000074E10000-0x00000000753BB000-memory.dmp
                Filesize

                5.7MB

              • memory/2088-120-0x0000000000000000-mapping.dmp
              • memory/2100-128-0x000000000041E73A-mapping.dmp
              • memory/2336-134-0x0000000000000000-mapping.dmp
              • memory/2348-142-0x000000000041E73A-mapping.dmp
              • memory/2448-148-0x0000000000000000-mapping.dmp
              • memory/2460-156-0x000000000041E73A-mapping.dmp
              • memory/2636-162-0x0000000000000000-mapping.dmp
              • memory/2652-170-0x000000000041E73A-mapping.dmp