Analysis

  • max time kernel
    9s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2022 07:52

General

  • Target

    Setup.exe

  • Size

    21.0MB

  • MD5

    8d2c812110771a601b50c35fc8566deb

  • SHA1

    93d2c215490b9abc362e17a4bab459675828b9e4

  • SHA256

    29dac6dc31f1359a11ebc13f86797b40f8d0c98f5f5a044541479926b37391f2

  • SHA512

    2549842a0ed61d71e91e9e46e0ef7b2b629a059dd72c969a2a5236dd164c457bfb012efc410a41d5c88c1424d7205096fbba55f67826ae8884462b25f20177c0

  • SSDEEP

    12288:LaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QySARMgp77:+aHMv6Corjqny/QyxKe7

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Roaming\winx86.exe
      C:\Users\Admin\AppData\Roaming\winx86.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        3⤵
          PID:1476

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OBZWEOSeYTXN
      Filesize

      217KB

      MD5

      ed8c4ab837c35cda702208adcfae397f

      SHA1

      f1c6368f8272d42d8a64685d5075e68ae6d672d9

      SHA256

      50f12c6d39af77b5567226341c5266430981ee4c2fa173abca1ec45573350448

      SHA512

      e8ce61cf03221ac6d34d7c116419a8a095c17396ad9e021d395ee07cd7489b649a666fccc526e8aaeca4c59cb4e7ffedd7e9cf59f6f7ede039bf1b42a3adf219

    • C:\Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      21.0MB

      MD5

      8d2c812110771a601b50c35fc8566deb

      SHA1

      93d2c215490b9abc362e17a4bab459675828b9e4

      SHA256

      29dac6dc31f1359a11ebc13f86797b40f8d0c98f5f5a044541479926b37391f2

      SHA512

      2549842a0ed61d71e91e9e46e0ef7b2b629a059dd72c969a2a5236dd164c457bfb012efc410a41d5c88c1424d7205096fbba55f67826ae8884462b25f20177c0

    • C:\Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      20.4MB

      MD5

      c5a6830206afafde6dd4f0760cfe521c

      SHA1

      20d862324a176a41111215494e4fc7d4fbbe8048

      SHA256

      965caca89d926d0a3f7106f85545077dcc54e7a1a5d2ae2bcb58249be5abb7c7

      SHA512

      05034a2632883cf3f19a9c4fe3cb2a38cf56689bad09227faf43c3afe6d61f948979651c4e12b3959ed10057c21e2de2eb56148ecbdb578b0cbe0cdbc15c9048

    • \Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      21.0MB

      MD5

      8d2c812110771a601b50c35fc8566deb

      SHA1

      93d2c215490b9abc362e17a4bab459675828b9e4

      SHA256

      29dac6dc31f1359a11ebc13f86797b40f8d0c98f5f5a044541479926b37391f2

      SHA512

      2549842a0ed61d71e91e9e46e0ef7b2b629a059dd72c969a2a5236dd164c457bfb012efc410a41d5c88c1424d7205096fbba55f67826ae8884462b25f20177c0

    • \Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      21.0MB

      MD5

      8d2c812110771a601b50c35fc8566deb

      SHA1

      93d2c215490b9abc362e17a4bab459675828b9e4

      SHA256

      29dac6dc31f1359a11ebc13f86797b40f8d0c98f5f5a044541479926b37391f2

      SHA512

      2549842a0ed61d71e91e9e46e0ef7b2b629a059dd72c969a2a5236dd164c457bfb012efc410a41d5c88c1424d7205096fbba55f67826ae8884462b25f20177c0

    • \Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      20.4MB

      MD5

      c5a6830206afafde6dd4f0760cfe521c

      SHA1

      20d862324a176a41111215494e4fc7d4fbbe8048

      SHA256

      965caca89d926d0a3f7106f85545077dcc54e7a1a5d2ae2bcb58249be5abb7c7

      SHA512

      05034a2632883cf3f19a9c4fe3cb2a38cf56689bad09227faf43c3afe6d61f948979651c4e12b3959ed10057c21e2de2eb56148ecbdb578b0cbe0cdbc15c9048

    • \Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      16.2MB

      MD5

      2f7fcbc8b89ff213720da727cfab4e7a

      SHA1

      982de091f60ca2a7369d93723404158de46bd60d

      SHA256

      861d091d4aba9984dab9636b399262cf83b75d73a3f2daf47571244138f63d88

      SHA512

      795df0ec48289cb9f2e6eb71e17ba8727bcf1ad139156e760840055223b7304dc7193d88b78e5c146b0ebbeefbfbce8e9bcf13437b7a7315ecc4a72418e80c73

    • \Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      20.4MB

      MD5

      c5a6830206afafde6dd4f0760cfe521c

      SHA1

      20d862324a176a41111215494e4fc7d4fbbe8048

      SHA256

      965caca89d926d0a3f7106f85545077dcc54e7a1a5d2ae2bcb58249be5abb7c7

      SHA512

      05034a2632883cf3f19a9c4fe3cb2a38cf56689bad09227faf43c3afe6d61f948979651c4e12b3959ed10057c21e2de2eb56148ecbdb578b0cbe0cdbc15c9048

    • memory/1476-66-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1476-65-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1476-68-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1476-71-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1476-70-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1476-72-0x000000000043432E-mapping.dmp
    • memory/1500-54-0x0000000075B41000-0x0000000075B43000-memory.dmp
      Filesize

      8KB

    • memory/1632-57-0x0000000000000000-mapping.dmp