Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:42

General

  • Target

    132a36be9c7dc024233a459eee26cf4b19dd881c3b4b2ec8e66c92198a6bfdb1.exe

  • Size

    158KB

  • MD5

    b32334f49df9ef848b4bc3083e0c89a9

  • SHA1

    901d0541e50113c0eec4fd178d3a172c8b11e761

  • SHA256

    132a36be9c7dc024233a459eee26cf4b19dd881c3b4b2ec8e66c92198a6bfdb1

  • SHA512

    935896d4d62959c19df30c73ee1f578e305fc85c8790f9bf9923557e556f41a29bbcf399c9cb38746bf111b5e7ed25cb58178033125750b1cddd2fcfd6470ceb

  • SSDEEP

    3072:C5Pto80z+vFMCnOzS9FL9sGR2uRyR7QPMtdV5pcWNbzbjQ:CM80mniiLU7QPer5prlzXQ

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\132a36be9c7dc024233a459eee26cf4b19dd881c3b4b2ec8e66c92198a6bfdb1.exe
    "C:\Users\Admin\AppData\Local\Temp\132a36be9c7dc024233a459eee26cf4b19dd881c3b4b2ec8e66c92198a6bfdb1.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-54-0x000007FEF3940000-0x000007FEF4363000-memory.dmp

    Filesize

    10.1MB

  • memory/2036-55-0x000007FEF28A0000-0x000007FEF3936000-memory.dmp

    Filesize

    16.6MB

  • memory/2036-56-0x0000000000A86000-0x0000000000AA5000-memory.dmp

    Filesize

    124KB