Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 17:36
Static task
static1
Behavioral task
behavioral1
Sample
eb0ed1d3d1ecdee4d44e4a19a672b549.exe
Resource
win7-20220901-en
General
-
Target
eb0ed1d3d1ecdee4d44e4a19a672b549.exe
-
Size
634KB
-
MD5
eb0ed1d3d1ecdee4d44e4a19a672b549
-
SHA1
4b29e2c54e9a35ba92e63872e7bce4304789fe4a
-
SHA256
66277a2940790dc82ed209d3cc1af94ce22735f2eda359fc7fe8383f08c5ca05
-
SHA512
a17a1f4c45c260ce93c678b21144e2865ab4ebd2b4ccc8e6ddf9f606656ac1162845431d100df4779fbea83a8745fb79231113f6313c1b831625e077c8b998a6
-
SSDEEP
12288:3bjqjqjfAXzY0lvpAYPcb/6XcClGgoaOo:3bjqjOWUGJCCPlGgoaOo
Malware Config
Extracted
nanocore
1.2.2.0
chibuikelight.ddns.net:1122
d2cbe170-91e2-41f9-913f-0880782b9838
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-07-30T23:43:32.343213436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1122
-
default_group
love
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
d2cbe170-91e2-41f9-913f-0880782b9838
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
chibuikelight.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
eafjwzqw.exepid process 1760 eafjwzqw.exe -
Loads dropped DLL 3 IoCs
Processes:
eb0ed1d3d1ecdee4d44e4a19a672b549.exeeafjwzqw.exeeafjwzqw.exepid process 1536 eb0ed1d3d1ecdee4d44e4a19a672b549.exe 1760 eafjwzqw.exe 1720 eafjwzqw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
eafjwzqw.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\syqymlwo = "C:\\Users\\Admin\\AppData\\Roaming\\adbl\\oilas.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\eafjwzqw.exe\"" eafjwzqw.exe -
Processes:
eafjwzqw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eafjwzqw.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
eafjwzqw.exedescription pid process target process PID 1760 set thread context of 1720 1760 eafjwzqw.exe eafjwzqw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
eafjwzqw.exepid process 1720 eafjwzqw.exe 1720 eafjwzqw.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
eafjwzqw.exepid process 1720 eafjwzqw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
eafjwzqw.exedescription pid process Token: SeDebugPrivilege 1720 eafjwzqw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
eb0ed1d3d1ecdee4d44e4a19a672b549.exeeafjwzqw.exedescription pid process target process PID 1536 wrote to memory of 1760 1536 eb0ed1d3d1ecdee4d44e4a19a672b549.exe eafjwzqw.exe PID 1536 wrote to memory of 1760 1536 eb0ed1d3d1ecdee4d44e4a19a672b549.exe eafjwzqw.exe PID 1536 wrote to memory of 1760 1536 eb0ed1d3d1ecdee4d44e4a19a672b549.exe eafjwzqw.exe PID 1536 wrote to memory of 1760 1536 eb0ed1d3d1ecdee4d44e4a19a672b549.exe eafjwzqw.exe PID 1760 wrote to memory of 1720 1760 eafjwzqw.exe eafjwzqw.exe PID 1760 wrote to memory of 1720 1760 eafjwzqw.exe eafjwzqw.exe PID 1760 wrote to memory of 1720 1760 eafjwzqw.exe eafjwzqw.exe PID 1760 wrote to memory of 1720 1760 eafjwzqw.exe eafjwzqw.exe PID 1760 wrote to memory of 1720 1760 eafjwzqw.exe eafjwzqw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb0ed1d3d1ecdee4d44e4a19a672b549.exe"C:\Users\Admin\AppData\Local\Temp\eb0ed1d3d1ecdee4d44e4a19a672b549.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\eafjwzqw.exe"C:\Users\Admin\AppData\Local\Temp\eafjwzqw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\eafjwzqw.exe"C:\Users\Admin\AppData\Local\Temp\eafjwzqw.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD52ba6deeb78963ffea21cbf0d1d1dae2e
SHA1ccd23c3f4cab4a51463a1936114f3a5990327d9f
SHA25603e7ac600c3c90b8e65a7228477794f26c28a15b2118723f45dede4a8bd47c2c
SHA5121d7fc004110b9b1b5805563f3e93f40db49451789c439645903e7cad1e63c91d4a04c06c62d835d3517fb106567f4deaa6f5856ea323790ca0e6f32b6f725814
-
Filesize
59KB
MD52ba6deeb78963ffea21cbf0d1d1dae2e
SHA1ccd23c3f4cab4a51463a1936114f3a5990327d9f
SHA25603e7ac600c3c90b8e65a7228477794f26c28a15b2118723f45dede4a8bd47c2c
SHA5121d7fc004110b9b1b5805563f3e93f40db49451789c439645903e7cad1e63c91d4a04c06c62d835d3517fb106567f4deaa6f5856ea323790ca0e6f32b6f725814
-
Filesize
59KB
MD52ba6deeb78963ffea21cbf0d1d1dae2e
SHA1ccd23c3f4cab4a51463a1936114f3a5990327d9f
SHA25603e7ac600c3c90b8e65a7228477794f26c28a15b2118723f45dede4a8bd47c2c
SHA5121d7fc004110b9b1b5805563f3e93f40db49451789c439645903e7cad1e63c91d4a04c06c62d835d3517fb106567f4deaa6f5856ea323790ca0e6f32b6f725814
-
Filesize
6KB
MD584ea7d66d8c0c12d6ea950062da62627
SHA197e7abd8b8180f1c9aac438baf1391448415258f
SHA2566a8037d826df41ae1b6968f9eb44cd731f5bc913cf5608ecac6a7430b704466e
SHA512a8b8cb20e2c7dd9a2b7785b90f71cb1a2d97132704502242817bc8f62579a1f3842bc8c37851c950ad5bba7386d313bd03578a07bdd053d0dacdf8c148abadc0
-
Filesize
280KB
MD5195eb8ccef6718005acc0dd309787e9d
SHA13111e3c532d17e4489b32a26dcc62615219bf92b
SHA256170d1980f6a469f9b381607e7d86a92c9864dc82723608f2d83c5e0f1fb4e8a2
SHA51270e61403ea47267c64669f2f46716bad0c1e1024ac5a4bda09806723375dd413e7b0c8b5f3933685bc114b74cd62c32ed2af8a8c923434d5fdaa936dcdc64c9c
-
Filesize
59KB
MD52ba6deeb78963ffea21cbf0d1d1dae2e
SHA1ccd23c3f4cab4a51463a1936114f3a5990327d9f
SHA25603e7ac600c3c90b8e65a7228477794f26c28a15b2118723f45dede4a8bd47c2c
SHA5121d7fc004110b9b1b5805563f3e93f40db49451789c439645903e7cad1e63c91d4a04c06c62d835d3517fb106567f4deaa6f5856ea323790ca0e6f32b6f725814
-
Filesize
59KB
MD52ba6deeb78963ffea21cbf0d1d1dae2e
SHA1ccd23c3f4cab4a51463a1936114f3a5990327d9f
SHA25603e7ac600c3c90b8e65a7228477794f26c28a15b2118723f45dede4a8bd47c2c
SHA5121d7fc004110b9b1b5805563f3e93f40db49451789c439645903e7cad1e63c91d4a04c06c62d835d3517fb106567f4deaa6f5856ea323790ca0e6f32b6f725814