Analysis
-
max time kernel
156s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 19:09
Static task
static1
Behavioral task
behavioral1
Sample
0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe
Resource
win7-20220812-en
General
-
Target
0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe
-
Size
933KB
-
MD5
407735b785efac4895c51c4fc2181290
-
SHA1
18e32c09939841d17f2eb978cb5667762b808d34
-
SHA256
0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560
-
SHA512
698e18fcdac00e3ea7d49bf0fb2672c014ec22aa66901c933da853a586e0addb0bc61c6f8005fb5c62516f6df3088b70795da7fee6592b46dfc47cf0f8ed1558
-
SSDEEP
24576:qjeIdUci07GTiFY7Tg/RIhmwDOIC3e7NCG55ZkY7Q:qtPoiF4g/KHoeZpfl
Malware Config
Extracted
nanocore
1.2.2.2
personalosas.no-ip.org:50299
dreamswitchd.no-ip.org:50299
ab4a6d78-3826-48aa-8286-d8b1ee6ca622
-
activate_away_mode
false
-
backup_connection_host
dreamswitchd.no-ip.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2015-04-18T02:19:20.785759236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
50299
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ab4a6d78-3826-48aa-8286-d8b1ee6ca622
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
personalosas.no-ip.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.2
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
scsisv.exeagpmon.exescsisv.exepid process 1812 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exescsisv.exeagpmon.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation scsisv.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation agpmon.exe -
Processes:
RegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exeagpmon.exedescription pid process target process PID 4908 set thread context of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 3192 set thread context of 2340 3192 agpmon.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exescsisv.exeRegAsm.exeagpmon.exescsisv.exepid process 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe 1812 scsisv.exe 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe 1812 scsisv.exe 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe 1812 scsisv.exe 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe 1812 scsisv.exe 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe 1812 scsisv.exe 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe 4568 RegAsm.exe 4568 RegAsm.exe 4568 RegAsm.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 4484 scsisv.exe 3192 agpmon.exe 3192 agpmon.exe 4484 scsisv.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe 4484 scsisv.exe 3192 agpmon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegAsm.exepid process 4568 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exescsisv.exeagpmon.exeRegAsm.exescsisv.exedescription pid process Token: SeDebugPrivilege 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe Token: SeDebugPrivilege 1812 scsisv.exe Token: SeDebugPrivilege 3192 agpmon.exe Token: SeDebugPrivilege 4568 RegAsm.exe Token: SeDebugPrivilege 4568 RegAsm.exe Token: SeDebugPrivilege 4484 scsisv.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 4568 RegAsm.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exescsisv.execmd.exeagpmon.exedescription pid process target process PID 4908 wrote to memory of 952 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe cmd.exe PID 4908 wrote to memory of 952 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe cmd.exe PID 4908 wrote to memory of 952 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe cmd.exe PID 4908 wrote to memory of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 4908 wrote to memory of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 4908 wrote to memory of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 4908 wrote to memory of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 4908 wrote to memory of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 4908 wrote to memory of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 4908 wrote to memory of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 4908 wrote to memory of 4568 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe RegAsm.exe PID 4908 wrote to memory of 1812 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe scsisv.exe PID 4908 wrote to memory of 1812 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe scsisv.exe PID 4908 wrote to memory of 1812 4908 0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe scsisv.exe PID 1812 wrote to memory of 1648 1812 scsisv.exe cmd.exe PID 1812 wrote to memory of 1648 1812 scsisv.exe cmd.exe PID 1812 wrote to memory of 1648 1812 scsisv.exe cmd.exe PID 1812 wrote to memory of 3192 1812 scsisv.exe agpmon.exe PID 1812 wrote to memory of 3192 1812 scsisv.exe agpmon.exe PID 1812 wrote to memory of 3192 1812 scsisv.exe agpmon.exe PID 1648 wrote to memory of 3916 1648 cmd.exe reg.exe PID 1648 wrote to memory of 3916 1648 cmd.exe reg.exe PID 1648 wrote to memory of 3916 1648 cmd.exe reg.exe PID 3192 wrote to memory of 2340 3192 agpmon.exe RegAsm.exe PID 3192 wrote to memory of 2340 3192 agpmon.exe RegAsm.exe PID 3192 wrote to memory of 2340 3192 agpmon.exe RegAsm.exe PID 3192 wrote to memory of 2340 3192 agpmon.exe RegAsm.exe PID 3192 wrote to memory of 2340 3192 agpmon.exe RegAsm.exe PID 3192 wrote to memory of 2340 3192 agpmon.exe RegAsm.exe PID 3192 wrote to memory of 2340 3192 agpmon.exe RegAsm.exe PID 3192 wrote to memory of 2340 3192 agpmon.exe RegAsm.exe PID 3192 wrote to memory of 4484 3192 agpmon.exe scsisv.exe PID 3192 wrote to memory of 4484 3192 agpmon.exe scsisv.exe PID 3192 wrote to memory of 4484 3192 agpmon.exe scsisv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe"C:\Users\Admin\AppData\Local\Temp\0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\0d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\agpmon.exe"2⤵PID:952
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\scsisv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\scsisv.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\scsisv.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\scsisv.exe" /f4⤵PID:3916
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\agpmon.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\agpmon.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"4⤵PID:2340
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\scsisv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\scsisv.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128B
MD5a5dcc7c9c08af7dddd82be5b036a4416
SHA14f998ca1526d199e355ffb435bae111a2779b994
SHA256e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA51256035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a
-
Filesize
933KB
MD5407735b785efac4895c51c4fc2181290
SHA118e32c09939841d17f2eb978cb5667762b808d34
SHA2560d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560
SHA512698e18fcdac00e3ea7d49bf0fb2672c014ec22aa66901c933da853a586e0addb0bc61c6f8005fb5c62516f6df3088b70795da7fee6592b46dfc47cf0f8ed1558
-
Filesize
933KB
MD5407735b785efac4895c51c4fc2181290
SHA118e32c09939841d17f2eb978cb5667762b808d34
SHA2560d6cd09ff9fcfb4cb88016a26c6db7b051128160aaeecd63f8f6a4b061e8e560
SHA512698e18fcdac00e3ea7d49bf0fb2672c014ec22aa66901c933da853a586e0addb0bc61c6f8005fb5c62516f6df3088b70795da7fee6592b46dfc47cf0f8ed1558
-
Filesize
12KB
MD504075a6207d65d88738aa8f855d0f70c
SHA1b85cc7c8644d26ca7cdd6e24d4cef85dc026c091
SHA256e6e4ff71e0adbd767c8bee7e04ca9e4867e000817bfdeb6162ac548992c3d9dd
SHA51221723ef782e6f1820e2960b580b4ab51ef64d01c8dd7af3dd5b4503ea3b0b1cfdd2234288ac4a67cd20bb7171cd4c6f9d97c3eef387ea7df0352a4fea5eb0be7
-
Filesize
12KB
MD504075a6207d65d88738aa8f855d0f70c
SHA1b85cc7c8644d26ca7cdd6e24d4cef85dc026c091
SHA256e6e4ff71e0adbd767c8bee7e04ca9e4867e000817bfdeb6162ac548992c3d9dd
SHA51221723ef782e6f1820e2960b580b4ab51ef64d01c8dd7af3dd5b4503ea3b0b1cfdd2234288ac4a67cd20bb7171cd4c6f9d97c3eef387ea7df0352a4fea5eb0be7
-
Filesize
12KB
MD504075a6207d65d88738aa8f855d0f70c
SHA1b85cc7c8644d26ca7cdd6e24d4cef85dc026c091
SHA256e6e4ff71e0adbd767c8bee7e04ca9e4867e000817bfdeb6162ac548992c3d9dd
SHA51221723ef782e6f1820e2960b580b4ab51ef64d01c8dd7af3dd5b4503ea3b0b1cfdd2234288ac4a67cd20bb7171cd4c6f9d97c3eef387ea7df0352a4fea5eb0be7
-
Filesize
12KB
MD504075a6207d65d88738aa8f855d0f70c
SHA1b85cc7c8644d26ca7cdd6e24d4cef85dc026c091
SHA256e6e4ff71e0adbd767c8bee7e04ca9e4867e000817bfdeb6162ac548992c3d9dd
SHA51221723ef782e6f1820e2960b580b4ab51ef64d01c8dd7af3dd5b4503ea3b0b1cfdd2234288ac4a67cd20bb7171cd4c6f9d97c3eef387ea7df0352a4fea5eb0be7