Analysis

  • max time kernel
    190s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:41

General

  • Target

    b22a3facd3066701d920a131edc9458c01a19148e4cacc4176b87c951609d122.exe

  • Size

    191KB

  • MD5

    a5bf5d304e8d48fa9e200e1aadbc82e9

  • SHA1

    2b8fdf9e1438b45a3d49eef23733d64711372168

  • SHA256

    b22a3facd3066701d920a131edc9458c01a19148e4cacc4176b87c951609d122

  • SHA512

    ecf40385562cdec69dd340214b1552608c3341b1c090bb5b7bdfd9d44fb3ceab9d7b978fbb56c4a8624320fb8ab0718d0b23c405315389996e981b69b4c21a1d

  • SSDEEP

    3072:H5Pto80z+vFMCnOzS9FL9sGR2uRyR7QPMtdVBdaPRHxevWkXyxgCvPUHOREG:HM80mniiLU7QPeruRH4W8yKCkHOREG

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b22a3facd3066701d920a131edc9458c01a19148e4cacc4176b87c951609d122.exe
    "C:\Users\Admin\AppData\Local\Temp\b22a3facd3066701d920a131edc9458c01a19148e4cacc4176b87c951609d122.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /create /f /tn "ISS Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmp499F.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:780
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /create /f /tn "ISS Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp731F.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:992

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp499F.tmp
    Filesize

    1KB

    MD5

    c17fdff6b86af616cdd10fc2395a127b

    SHA1

    69ceaeed8d31b7eb2ae55475f7afe1bb7826d901

    SHA256

    e7ca011e5681146d8b0dfd85e658be4011b5b52b0f68250b7b138303c6381b28

    SHA512

    cb336dfc91e911296458f2363509e6d966c589fdce2882431d3af3d21e8857fe02d02b51018cc5d6e20fa445c791788fd0f1cc3b07f5cdd89a9cc265d1b0ba0f

  • memory/780-57-0x0000000000000000-mapping.dmp
  • memory/992-59-0x0000000000000000-mapping.dmp
  • memory/1696-54-0x000007FEF47D0000-0x000007FEF51F3000-memory.dmp
    Filesize

    10.1MB

  • memory/1696-55-0x000007FEF3730000-0x000007FEF47C6000-memory.dmp
    Filesize

    16.6MB

  • memory/1696-56-0x0000000002026000-0x0000000002045000-memory.dmp
    Filesize

    124KB

  • memory/1696-60-0x0000000002026000-0x0000000002045000-memory.dmp
    Filesize

    124KB