Analysis
-
max time kernel
57s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 07:12
Static task
static1
Behavioral task
behavioral1
Sample
TNT AWB TRACKING DETAILS.exe
Resource
win7-20220901-en
General
-
Target
TNT AWB TRACKING DETAILS.exe
-
Size
669KB
-
MD5
283577808207c31484c8e9891cb2e6ff
-
SHA1
f52e2651a40c85bb4a872a2707a20fb9a5b47555
-
SHA256
dba4977fca4502e32071bcb088434cd1c9cd822a58ca5346c50b5f92e49bb3a6
-
SHA512
fd4f57ef30735b7100f674f65a193ab9af6e619a1e14b782b3549fc0d839df9d7b2036bf4b22152b3e8b7fad048929c9f2610825fe3c2fec67f9ff7fa5dbc4c6
-
SSDEEP
12288:lPDDk/PSWdyWpm0T1Df4dr2+Ujd2eFQLzQksqiOXHMFnpYqQ:lYPSWf1r5FnksqfHSnpYqQ
Malware Config
Extracted
nanocore
1.2.2.0
chinomso.duckdns.org:7688
1a89322e-5293-4ba8-a831-31eb0594f72f
-
activate_away_mode
true
-
backup_connection_host
chinomso.duckdns.org
-
backup_dns_server
chinomso.duckdns.org
-
buffer_size
65535
-
build_time
2022-07-04T03:07:42.605643236Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
7688
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1a89322e-5293-4ba8-a831-31eb0594f72f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
chinomso.duckdns.org
-
primary_dns_server
chinomso.duckdns.org
-
request_elevation
false
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
TNT AWB TRACKING DETAILS.exedescription pid process target process PID 1292 set thread context of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
TNT AWB TRACKING DETAILS.exedescription pid process target process PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe PID 1292 wrote to memory of 456 1292 TNT AWB TRACKING DETAILS.exe TNT AWB TRACKING DETAILS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TNT AWB TRACKING DETAILS.exe"C:\Users\Admin\AppData\Local\Temp\TNT AWB TRACKING DETAILS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\TNT AWB TRACKING DETAILS.exe"C:\Users\Admin\AppData\Local\Temp\TNT AWB TRACKING DETAILS.exe"2⤵PID:456