Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 22:05

General

  • Target

    dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe

  • Size

    854KB

  • MD5

    7cfe2e952780ae0a43d725ff1afdf539

  • SHA1

    e813574b7586a374ee81e1ae1749d6214da56e21

  • SHA256

    dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91

  • SHA512

    a36b1cc8ec94b36dce24da6bcc29de3059f938c8280ba47164a1703d6ec4d61efa8b366ffadef4c1c1310a5a64e8393e82409f6599fe73cf74161c84865cef28

  • SSDEEP

    12288:n9CewMixJ6X7DKKPhc/AsubBOEgIQLSV2E2HILMbTziCLQfKeKE22DzTXHz:n9CewMJVc/ARYEILI2E2oLQPiCCKE2S

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

processor.ddns.net:8778

Mutex

5bb23e3c-21bd-4668-a566-023ef5da1692

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    processor.ddns.net

  • backup_dns_server

  • buffer_size

    65535

  • build_time

    2015-03-31T23:41:41.391502136Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    true

  • connect_delay

    4000

  • connection_port

    8778

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    5bb23e3c-21bd-4668-a566-023ef5da1692

  • mutex_timeout

    5000

  • prevent_system_sleep

    true

  • primary_connection_host

    processor.ddns.net

  • primary_dns_server

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe
    "C:\Users\Admin\AppData\Local\Temp\dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Users\Admin\Desktop\String.exe
      "C:\Users\Admin\Desktop\String.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3220
      • C:\Users\Admin\Desktop\String.exe
        "C:\Users\Admin\Desktop\String.exe"
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious behavior: SetClipboardViewer
        • Suspicious use of AdjustPrivilegeToken
        PID:3568
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1604
    • C:\Users\Admin\AppData\Local\Temp\dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe
      "C:\Users\Admin\AppData\Local\Temp\dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91.exe"
      2⤵
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:3932
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe"
          4⤵
          • Executes dropped EXE
          PID:2116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\AdobeARMservice.exe.log

    Filesize

    404B

    MD5

    15b6596d028baa2a113143d1828bcc36

    SHA1

    f1be43126c4e765fe499718c388823d44bf1fef1

    SHA256

    529f9fde2234067382b4c6fb8e5aee49d8a8b1b85c82b0bdae425fa2a0264f75

    SHA512

    f2a6cb8498f596c7bf9178ea32a245dbb3657f43a179f378ce952ce5cb8580810cd67ef1efb623bcf6cd796d74e2c9b7bc42cb8665ead397546ce3b400181e83

  • C:\Users\Admin\AppData\Roaming\4CFB5922-B036-4C14-9ED1-03C0DAD19FBD\run.dat

    Filesize

    8B

    MD5

    025370c404e0b04329fc6d989a31dfe4

    SHA1

    20b4575f07e6793388d15b66c69a13ad08fdbd3e

    SHA256

    3a5fd4f896b64358d6b6baeb034f666ef4199dfa9ed8d2b75024ee02c8edcac5

    SHA512

    f534323b0f11ed2231ce5c8e95cd786b89c441bd89a038a40f4644baadab983e567c35ac84ec97c8f7ba97a54cffd8aaccccd72b2378b746beee4cb211ca4a93

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

    Filesize

    10KB

    MD5

    3e06d8a3100e400ab1e628ce8deb2367

    SHA1

    5a1ec4e87d1750c4e4cdfd64d8e52fef35611dac

    SHA256

    cbf1feeabb169c53706763f4b9d646ae2bff48af57023cc8a0f06231d428b846

    SHA512

    56d59982f4c1acc122a8baafcefb4dc032cc38c0f1b5d138450635c560af2cdef389957b05e65b0c2e70fba2fc05f36a3f3bc247661a1fa5d077735b83bfd0d2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

    Filesize

    10KB

    MD5

    3e06d8a3100e400ab1e628ce8deb2367

    SHA1

    5a1ec4e87d1750c4e4cdfd64d8e52fef35611dac

    SHA256

    cbf1feeabb169c53706763f4b9d646ae2bff48af57023cc8a0f06231d428b846

    SHA512

    56d59982f4c1acc122a8baafcefb4dc032cc38c0f1b5d138450635c560af2cdef389957b05e65b0c2e70fba2fc05f36a3f3bc247661a1fa5d077735b83bfd0d2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

    Filesize

    10KB

    MD5

    a940b261ec4480bf5c5cdeb063d64b50

    SHA1

    a528f41956a077f99b9fca2dd862f9462bb08834

    SHA256

    a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611

    SHA512

    d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AdobeARMservice.exe

    Filesize

    10KB

    MD5

    a940b261ec4480bf5c5cdeb063d64b50

    SHA1

    a528f41956a077f99b9fca2dd862f9462bb08834

    SHA256

    a5085e4a6b469e14c9386b9e02acc95d80c8ad7431c9c5a7b468a071758f9611

    SHA512

    d7096cc7b569b2cf0a49270ee0cb011ff7a7c346abdd4a958c8abea21d66a043cf983cee7c8e73c125a21f5b4c0e259194248105549d853f02110f11a512cd45

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

    Filesize

    854KB

    MD5

    7cfe2e952780ae0a43d725ff1afdf539

    SHA1

    e813574b7586a374ee81e1ae1749d6214da56e21

    SHA256

    dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91

    SHA512

    a36b1cc8ec94b36dce24da6bcc29de3059f938c8280ba47164a1703d6ec4d61efa8b366ffadef4c1c1310a5a64e8393e82409f6599fe73cf74161c84865cef28

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

    Filesize

    854KB

    MD5

    7cfe2e952780ae0a43d725ff1afdf539

    SHA1

    e813574b7586a374ee81e1ae1749d6214da56e21

    SHA256

    dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91

    SHA512

    a36b1cc8ec94b36dce24da6bcc29de3059f938c8280ba47164a1703d6ec4d61efa8b366ffadef4c1c1310a5a64e8393e82409f6599fe73cf74161c84865cef28

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bthserv.exe

    Filesize

    854KB

    MD5

    7cfe2e952780ae0a43d725ff1afdf539

    SHA1

    e813574b7586a374ee81e1ae1749d6214da56e21

    SHA256

    dd2a499da99db92ce44b24f78fcb91d704789d119a52f9cc84854aeb2c7e6c91

    SHA512

    a36b1cc8ec94b36dce24da6bcc29de3059f938c8280ba47164a1703d6ec4d61efa8b366ffadef4c1c1310a5a64e8393e82409f6599fe73cf74161c84865cef28

  • C:\Users\Admin\Desktop\String.exe

    Filesize

    405KB

    MD5

    9cb77bd039a53b629afedbac8b14c3d3

    SHA1

    73972a7f9ae35d51138a8122732f51175a53e051

    SHA256

    07e2d5d58738aeb71422b0f237639b2a062114b893501033210be479c713414f

    SHA512

    a538ce7f344779e0f64ddf6cf07a81d828d53a71dec9a2f75d053d08ea64b07994a9774a0718fc9b6f9063fd77430d462814709cec9263df98f1e673e34234bc

  • C:\Users\Admin\Desktop\String.exe

    Filesize

    405KB

    MD5

    9cb77bd039a53b629afedbac8b14c3d3

    SHA1

    73972a7f9ae35d51138a8122732f51175a53e051

    SHA256

    07e2d5d58738aeb71422b0f237639b2a062114b893501033210be479c713414f

    SHA512

    a538ce7f344779e0f64ddf6cf07a81d828d53a71dec9a2f75d053d08ea64b07994a9774a0718fc9b6f9063fd77430d462814709cec9263df98f1e673e34234bc

  • C:\Users\Admin\Desktop\String.exe

    Filesize

    405KB

    MD5

    9cb77bd039a53b629afedbac8b14c3d3

    SHA1

    73972a7f9ae35d51138a8122732f51175a53e051

    SHA256

    07e2d5d58738aeb71422b0f237639b2a062114b893501033210be479c713414f

    SHA512

    a538ce7f344779e0f64ddf6cf07a81d828d53a71dec9a2f75d053d08ea64b07994a9774a0718fc9b6f9063fd77430d462814709cec9263df98f1e673e34234bc

  • memory/976-144-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/976-139-0x0000000000000000-mapping.dmp

  • memory/976-151-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/976-153-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/1604-164-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/1604-171-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/1604-159-0x0000000000000000-mapping.dmp

  • memory/2116-168-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/2116-165-0x0000000000000000-mapping.dmp

  • memory/2116-169-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3220-134-0x0000000000000000-mapping.dmp

  • memory/3220-149-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3220-142-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3568-158-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3568-155-0x0000000000000000-mapping.dmp

  • memory/3568-170-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3764-154-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3764-132-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3764-133-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3932-137-0x0000000000000000-mapping.dmp

  • memory/3932-150-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/3932-138-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3932-143-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/4720-152-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB

  • memory/4720-145-0x0000000000000000-mapping.dmp

  • memory/4720-148-0x0000000075190000-0x0000000075741000-memory.dmp

    Filesize

    5.7MB