Analysis

  • max time kernel
    167s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:41

General

  • Target

    b22a3facd3066701d920a131edc9458c01a19148e4cacc4176b87c951609d122.exe

  • Size

    191KB

  • MD5

    a5bf5d304e8d48fa9e200e1aadbc82e9

  • SHA1

    2b8fdf9e1438b45a3d49eef23733d64711372168

  • SHA256

    b22a3facd3066701d920a131edc9458c01a19148e4cacc4176b87c951609d122

  • SHA512

    ecf40385562cdec69dd340214b1552608c3341b1c090bb5b7bdfd9d44fb3ceab9d7b978fbb56c4a8624320fb8ab0718d0b23c405315389996e981b69b4c21a1d

  • SSDEEP

    3072:H5Pto80z+vFMCnOzS9FL9sGR2uRyR7QPMtdVBdaPRHxevWkXyxgCvPUHOREG:HM80mniiLU7QPeruRH4W8yKCkHOREG

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b22a3facd3066701d920a131edc9458c01a19148e4cacc4176b87c951609d122.exe
    "C:\Users\Admin\AppData\Local\Temp\b22a3facd3066701d920a131edc9458c01a19148e4cacc4176b87c951609d122.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks.exe" /create /f /tn "PCI Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmp67A3.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2716
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks.exe" /create /f /tn "PCI Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9144.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp67A3.tmp

    Filesize

    1KB

    MD5

    c17fdff6b86af616cdd10fc2395a127b

    SHA1

    69ceaeed8d31b7eb2ae55475f7afe1bb7826d901

    SHA256

    e7ca011e5681146d8b0dfd85e658be4011b5b52b0f68250b7b138303c6381b28

    SHA512

    cb336dfc91e911296458f2363509e6d966c589fdce2882431d3af3d21e8857fe02d02b51018cc5d6e20fa445c791788fd0f1cc3b07f5cdd89a9cc265d1b0ba0f

  • C:\Users\Admin\AppData\Local\Temp\tmp9144.tmp

    Filesize

    1KB

    MD5

    f7fc5cfe3d4801d5fb389238c3400380

    SHA1

    41751c30225709a60ba8f8049c6e2405d9d6717d

    SHA256

    79a01572b6494f8dc6cd81f182d1566d57b6eaf8592f4e07f1a7eb8eaf89d883

    SHA512

    86fdef1ccb273b2680c8f9645be7fd532cfc1441b2299f72d785d038a228129b0bdca6ddb83e9fd25945f65832fca1668c9f510705fca418e0fdb2d1ed6fc9b0

  • memory/2716-136-0x0000000000000000-mapping.dmp

  • memory/3000-138-0x0000000000000000-mapping.dmp

  • memory/4968-135-0x00007FFFF0A50000-0x00007FFFF1486000-memory.dmp

    Filesize

    10.2MB

  • memory/4968-140-0x000000001CC80000-0x000000001CD80000-memory.dmp

    Filesize

    1024KB

  • memory/4968-141-0x000000001CC80000-0x000000001CD80000-memory.dmp

    Filesize

    1024KB