Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 05:09
Static task
static1
Behavioral task
behavioral1
Sample
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe
Resource
win7-20221111-en
General
-
Target
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe
-
Size
426KB
-
MD5
b6ff2225656eb0a4f775aa2db7c3b793
-
SHA1
f534e0459b6417ddb005ff65f86f77969ad4bb4c
-
SHA256
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734
-
SHA512
6b8573dbf98cc05a4d6d15f74cbd9ad193630012fb3c6e25c0d32d0d521a4b588080ef81ef8188652bccf3c1818d69cb6d9eb7ed2c089d150e3dc37b63fe7a95
-
SSDEEP
12288:YFlsf8UNV6KJYljzBHAQ/aq4CINNNNNNNNNNN+NNNNNNNNNNN:wsf1NV6rlHaQ
Malware Config
Extracted
nanocore
1.2.2.0
hacksufod.ddns.net:4500
88.189.104.89:4500
bbe14b67-a1a7-4ffe-89db-38fa25a25fdf
-
activate_away_mode
true
-
backup_connection_host
88.189.104.89
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2015-03-02T21:10:09.139796136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
4500
-
default_group
abop
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
bbe14b67-a1a7-4ffe-89db-38fa25a25fdf
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
hacksufod.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Drops startup file 1 IoCs
Processes:
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IzHJklNN.lnk bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe -
Loads dropped DLL 1 IoCs
Processes:
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exepid process 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe -
Processes:
RegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exedescription pid process target process PID 820 set thread context of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exeRegAsm.exepid process 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe 1480 RegAsm.exe 1480 RegAsm.exe 1480 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegAsm.exepid process 1480 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe Token: SeDebugPrivilege 1480 RegAsm.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exedescription pid process target process PID 820 wrote to memory of 1488 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1488 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1488 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1488 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1488 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1488 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1488 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe PID 820 wrote to memory of 1480 820 bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe"C:\Users\Admin\AppData\Local\Temp\bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\kBSrQ1Vb72t\k6bIXtKR.exeFilesize
426KB
MD5b6ff2225656eb0a4f775aa2db7c3b793
SHA1f534e0459b6417ddb005ff65f86f77969ad4bb4c
SHA256bd35226d183e733a4c4903a1a7310ccae2d00923e3d347ad72c129db3a5b6734
SHA5126b8573dbf98cc05a4d6d15f74cbd9ad193630012fb3c6e25c0d32d0d521a4b588080ef81ef8188652bccf3c1818d69cb6d9eb7ed2c089d150e3dc37b63fe7a95
-
memory/820-54-0x0000000075531000-0x0000000075533000-memory.dmpFilesize
8KB
-
memory/820-55-0x0000000074810000-0x0000000074DBB000-memory.dmpFilesize
5.7MB
-
memory/820-56-0x0000000074810000-0x0000000074DBB000-memory.dmpFilesize
5.7MB
-
memory/1480-64-0x000000000041E792-mapping.dmp
-
memory/1480-60-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1480-61-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1480-63-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1480-58-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1480-66-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1480-68-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1480-70-0x0000000074810000-0x0000000074DBB000-memory.dmpFilesize
5.7MB
-
memory/1480-71-0x0000000074810000-0x0000000074DBB000-memory.dmpFilesize
5.7MB
-
memory/1480-72-0x0000000000896000-0x00000000008A7000-memory.dmpFilesize
68KB
-
memory/1480-57-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1480-74-0x0000000074810000-0x0000000074DBB000-memory.dmpFilesize
5.7MB