Analysis

  • max time kernel
    15s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2022 07:52

General

  • Target

    Setup.exe

  • Size

    21.0MB

  • MD5

    8d2c812110771a601b50c35fc8566deb

  • SHA1

    93d2c215490b9abc362e17a4bab459675828b9e4

  • SHA256

    29dac6dc31f1359a11ebc13f86797b40f8d0c98f5f5a044541479926b37391f2

  • SHA512

    2549842a0ed61d71e91e9e46e0ef7b2b629a059dd72c969a2a5236dd164c457bfb012efc410a41d5c88c1424d7205096fbba55f67826ae8884462b25f20177c0

  • SSDEEP

    12288:LaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QySARMgp77:+aHMv6Corjqny/QyxKe7

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Roaming\winx86.exe
      C:\Users\Admin\AppData\Roaming\winx86.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        3⤵
          PID:1320

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OBZWEOSeYTXN
      Filesize

      217KB

      MD5

      ed8c4ab837c35cda702208adcfae397f

      SHA1

      f1c6368f8272d42d8a64685d5075e68ae6d672d9

      SHA256

      50f12c6d39af77b5567226341c5266430981ee4c2fa173abca1ec45573350448

      SHA512

      e8ce61cf03221ac6d34d7c116419a8a095c17396ad9e021d395ee07cd7489b649a666fccc526e8aaeca4c59cb4e7ffedd7e9cf59f6f7ede039bf1b42a3adf219

    • C:\Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      21.0MB

      MD5

      8d2c812110771a601b50c35fc8566deb

      SHA1

      93d2c215490b9abc362e17a4bab459675828b9e4

      SHA256

      29dac6dc31f1359a11ebc13f86797b40f8d0c98f5f5a044541479926b37391f2

      SHA512

      2549842a0ed61d71e91e9e46e0ef7b2b629a059dd72c969a2a5236dd164c457bfb012efc410a41d5c88c1424d7205096fbba55f67826ae8884462b25f20177c0

    • C:\Users\Admin\AppData\Roaming\winx86.exe
      Filesize

      21.0MB

      MD5

      8d2c812110771a601b50c35fc8566deb

      SHA1

      93d2c215490b9abc362e17a4bab459675828b9e4

      SHA256

      29dac6dc31f1359a11ebc13f86797b40f8d0c98f5f5a044541479926b37391f2

      SHA512

      2549842a0ed61d71e91e9e46e0ef7b2b629a059dd72c969a2a5236dd164c457bfb012efc410a41d5c88c1424d7205096fbba55f67826ae8884462b25f20177c0

    • memory/1320-136-0x0000000000000000-mapping.dmp
    • memory/1320-137-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/4864-132-0x0000000000000000-mapping.dmp