Analysis
-
max time kernel
148s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 18:10
Static task
static1
Behavioral task
behavioral1
Sample
8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe
Resource
win7-20221111-en
General
-
Target
8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe
-
Size
736KB
-
MD5
0aab2e68a3f6117d5cda549950b298be
-
SHA1
cb3c7ed6f9ac7934380c87f4d746f5d830ecbc32
-
SHA256
8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52
-
SHA512
e8817d56433720c5715c91ade2e7d10b89279ebe676d190ba8e3a97494f6235b5ebf2136b2116c265ff771c4119a7d0784ed1e566d9949b43e40c80814cab427
-
SSDEEP
12288:uXtySSKrOrVlYZhTJUqZpB0WKPYTUp0nMyseIn1MNttoxinDaSZVH9KUyfCA444:6SKUylUq3+6Up0MBdn6NDSinDayH/I
Malware Config
Extracted
nanocore
1.2.1.1
jesus-christ.redirectme.net:54557
taskintelguard.ddns.net:54557
521ad638-fffa-42fc-bb1f-12f3a95ec748
-
activate_away_mode
true
-
backup_connection_host
taskintelguard.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2014-09-18T05:15:02.280514336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
54557
-
default_group
Project School
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
521ad638-fffa-42fc-bb1f-12f3a95ec748
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
jesus-christ.redirectme.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.1.1
-
wan_timeout
8000
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1204 set thread context of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1204 wrote to memory of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86 PID 1204 wrote to memory of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86 PID 1204 wrote to memory of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86 PID 1204 wrote to memory of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86 PID 1204 wrote to memory of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86 PID 1204 wrote to memory of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86 PID 1204 wrote to memory of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86 PID 1204 wrote to memory of 3052 1204 8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe"C:\Users\Admin\AppData\Local\Temp\8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe"C:\Users\Admin\AppData\Local\Temp\8e2b57e7984eed75865ac26b9f63f2646b68bce2ba577a5006867a875ad0bc52.exe"2⤵
- Checks whether UAC is enabled
PID:3052
-