Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2022 20:10
Static task
static1
Behavioral task
behavioral1
Sample
59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe
Resource
win7-20220812-en
General
-
Target
59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe
-
Size
557KB
-
MD5
263a986b3341f186b7edde253915c8c8
-
SHA1
8711abc4850708f609b47519489e9ec670bc53cf
-
SHA256
59b3453fdaae52815822c89df9595a8e54cbd22bcefb75be3aae1b5c4d88df26
-
SHA512
9990051333eaecb7564242266e8e43d92c53da239a0140ad865691a34bcb077fe7ee74e5ff45d207b7bb6f654d1dec7caef384e5958f6512e63710381f22b37a
-
SSDEEP
12288:FrnpkjfuS8KEqUzx5ZxeSu7hvj4HkFTSm5LglIBF3X3um:JpkTuSCqUbA71jUkFDL5BF3X3V
Malware Config
Extracted
nanocore
1.2.2.0
microsoft1337.ddns.net:1447
41.216.183.49:1447
937bb3d2-5fda-473f-a587-a19ec5938661
-
activate_away_mode
true
-
backup_connection_host
41.216.183.49
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-07-30T21:53:43.883522036Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1447
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
937bb3d2-5fda-473f-a587-a19ec5938661
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
microsoft1337.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exer0pnCy.exepid process 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe 4420 r0pnCy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
r0pnCy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Manager = "C:\\Program Files (x86)\\DDP Manager\\ddpmgr.exe" r0pnCy.exe -
Processes:
r0pnCy.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA r0pnCy.exe -
Drops file in Program Files directory 2 IoCs
Processes:
r0pnCy.exedescription ioc process File created C:\Program Files (x86)\DDP Manager\ddpmgr.exe r0pnCy.exe File opened for modification C:\Program Files (x86)\DDP Manager\ddpmgr.exe r0pnCy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exepowershell.exer0pnCy.exepid process 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe 4884 powershell.exe 4884 powershell.exe 4420 r0pnCy.exe 4420 r0pnCy.exe 4420 r0pnCy.exe 4420 r0pnCy.exe 4420 r0pnCy.exe 4420 r0pnCy.exe 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
r0pnCy.exepid process 4420 r0pnCy.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exepowershell.exer0pnCy.exedescription pid process Token: SeDebugPrivilege 3468 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe Token: SeDebugPrivilege 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 4420 r0pnCy.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exepowershell.exedescription pid process target process PID 4524 wrote to memory of 4884 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe powershell.exe PID 4524 wrote to memory of 4884 4524 59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe powershell.exe PID 4884 wrote to memory of 4420 4884 powershell.exe r0pnCy.exe PID 4884 wrote to memory of 4420 4884 powershell.exe r0pnCy.exe PID 4884 wrote to memory of 4420 4884 powershell.exe r0pnCy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe"C:\Users\Admin\AppData\Local\Temp\59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
C:\Users\Admin\AppData\Roaming\59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exeC:\Users\Admin\AppData\Roaming\59B3453FDAAE52815822C89DF9595A8E54CBD22BCEFB7.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAIgBDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcAHIAMABwAG4AQwB5AC4AZQB4AGUAIgA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\r0pnCy.exe"C:\Users\Admin\AppData\Local\Temp\r0pnCy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5d1c50cad229bca00c7c6548ed1489d0a
SHA1a02c38c129178dde442b1cd4a4d11fbe177c513f
SHA2567f4cc04bfb8b2c562fbbff9e48c4ed13cd83f7e8cbadcef7c5cf205308cf5470
SHA512309312c1071a57c3d9ee1555e27a65940be13ed749977012adb97d197da5ef1be246f1de61d1924ce9df950475f37383761b87d2af61c18d5cfeea365b452ff4
-
Filesize
202KB
MD5d1c50cad229bca00c7c6548ed1489d0a
SHA1a02c38c129178dde442b1cd4a4d11fbe177c513f
SHA2567f4cc04bfb8b2c562fbbff9e48c4ed13cd83f7e8cbadcef7c5cf205308cf5470
SHA512309312c1071a57c3d9ee1555e27a65940be13ed749977012adb97d197da5ef1be246f1de61d1924ce9df950475f37383761b87d2af61c18d5cfeea365b452ff4
-
Filesize
557KB
MD5263a986b3341f186b7edde253915c8c8
SHA18711abc4850708f609b47519489e9ec670bc53cf
SHA25659b3453fdaae52815822c89df9595a8e54cbd22bcefb75be3aae1b5c4d88df26
SHA5129990051333eaecb7564242266e8e43d92c53da239a0140ad865691a34bcb077fe7ee74e5ff45d207b7bb6f654d1dec7caef384e5958f6512e63710381f22b37a
-
Filesize
557KB
MD5263a986b3341f186b7edde253915c8c8
SHA18711abc4850708f609b47519489e9ec670bc53cf
SHA25659b3453fdaae52815822c89df9595a8e54cbd22bcefb75be3aae1b5c4d88df26
SHA5129990051333eaecb7564242266e8e43d92c53da239a0140ad865691a34bcb077fe7ee74e5ff45d207b7bb6f654d1dec7caef384e5958f6512e63710381f22b37a