Analysis
-
max time kernel
89s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/12/2022, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
aac74ecd1d07a69d7e7465745c2f4971.exe
Resource
win7-20220812-en
General
-
Target
aac74ecd1d07a69d7e7465745c2f4971.exe
-
Size
1.0MB
-
MD5
aac74ecd1d07a69d7e7465745c2f4971
-
SHA1
cc1f3128c94837256927d2badb043c3c5f906646
-
SHA256
8d978bfba2436ba7ee3393e84322da7fa62626d6de95e4ae4a36e85200814b04
-
SHA512
38c28dabe5a2872a39148f8a8d3b50cbc228e55efc11f05efb6a3c5ab7c149a92e46eb33209d53f60d2e19918519c12cbc9844727fff10923041596b6cea9836
-
SSDEEP
12288:4x92iN1/Sr+pHH8c+9etwWi4ONhWvf49RL7ccWiaVjypmzVf+mDXttarruVBDUJL:q91e+HH80tjcZ7cvVn
Malware Config
Extracted
nanocore
1.2.2.0
resulthostsockinc.duckdns.org:5842
127.0.0.1:5842
5b61d837-3a89-442f-86d5-f27bd8a48bcb
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-10-03T06:52:44.857921836Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5842
-
default_group
ENDING 2022
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
5b61d837-3a89-442f-86d5-f27bd8a48bcb
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
resulthostsockinc.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions aac74ecd1d07a69d7e7465745c2f4971.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools aac74ecd1d07a69d7e7465745c2f4971.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aac74ecd1d07a69d7e7465745c2f4971.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aac74ecd1d07a69d7e7465745c2f4971.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SCSI Service = "C:\\Program Files (x86)\\SCSI Service\\scsisvc.exe" aac74ecd1d07a69d7e7465745c2f4971.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aac74ecd1d07a69d7e7465745c2f4971.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum aac74ecd1d07a69d7e7465745c2f4971.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 aac74ecd1d07a69d7e7465745c2f4971.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1048 set thread context of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\SCSI Service\scsisvc.exe aac74ecd1d07a69d7e7465745c2f4971.exe File opened for modification C:\Program Files (x86)\SCSI Service\scsisvc.exe aac74ecd1d07a69d7e7465745c2f4971.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 672 schtasks.exe 1652 schtasks.exe 1332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 432 powershell.exe 1296 powershell.exe 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 568 aac74ecd1d07a69d7e7465745c2f4971.exe 568 aac74ecd1d07a69d7e7465745c2f4971.exe 568 aac74ecd1d07a69d7e7465745c2f4971.exe 568 aac74ecd1d07a69d7e7465745c2f4971.exe 568 aac74ecd1d07a69d7e7465745c2f4971.exe 568 aac74ecd1d07a69d7e7465745c2f4971.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 568 aac74ecd1d07a69d7e7465745c2f4971.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1048 aac74ecd1d07a69d7e7465745c2f4971.exe Token: SeDebugPrivilege 432 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeDebugPrivilege 568 aac74ecd1d07a69d7e7465745c2f4971.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1296 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 27 PID 1048 wrote to memory of 1296 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 27 PID 1048 wrote to memory of 1296 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 27 PID 1048 wrote to memory of 1296 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 27 PID 1048 wrote to memory of 432 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 30 PID 1048 wrote to memory of 432 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 30 PID 1048 wrote to memory of 432 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 30 PID 1048 wrote to memory of 432 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 30 PID 1048 wrote to memory of 672 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 32 PID 1048 wrote to memory of 672 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 32 PID 1048 wrote to memory of 672 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 32 PID 1048 wrote to memory of 672 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 32 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 1048 wrote to memory of 568 1048 aac74ecd1d07a69d7e7465745c2f4971.exe 34 PID 568 wrote to memory of 1652 568 aac74ecd1d07a69d7e7465745c2f4971.exe 35 PID 568 wrote to memory of 1652 568 aac74ecd1d07a69d7e7465745c2f4971.exe 35 PID 568 wrote to memory of 1652 568 aac74ecd1d07a69d7e7465745c2f4971.exe 35 PID 568 wrote to memory of 1652 568 aac74ecd1d07a69d7e7465745c2f4971.exe 35 PID 568 wrote to memory of 1332 568 aac74ecd1d07a69d7e7465745c2f4971.exe 37 PID 568 wrote to memory of 1332 568 aac74ecd1d07a69d7e7465745c2f4971.exe 37 PID 568 wrote to memory of 1332 568 aac74ecd1d07a69d7e7465745c2f4971.exe 37 PID 568 wrote to memory of 1332 568 aac74ecd1d07a69d7e7465745c2f4971.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\aac74ecd1d07a69d7e7465745c2f4971.exe"C:\Users\Admin\AppData\Local\Temp\aac74ecd1d07a69d7e7465745c2f4971.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\aac74ecd1d07a69d7e7465745c2f4971.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lECtpT.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lECtpT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA42C.tmp"2⤵
- Creates scheduled task(s)
PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\aac74ecd1d07a69d7e7465745c2f4971.exe"C:\Users\Admin\AppData\Local\Temp\aac74ecd1d07a69d7e7465745c2f4971.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SCSI Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA95A.tmp"3⤵
- Creates scheduled task(s)
PID:1652
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SCSI Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpAA84.tmp"3⤵
- Creates scheduled task(s)
PID:1332
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f3238f52740e042f5f841be5d2db6797
SHA1f02353da145cdd301d0870a7863a1831a3f5aff2
SHA2569b1397d8f5265752dcb296964ae5903c1421cfb6bcc81e1978b42193e3d0a4c5
SHA512159baa0ddce090ac52c1dab480dc37fe8fbcef90fdc63f6138010d96e6777dcec6b266d47182deaa33de4dbc6912c41a7395b3c2cd336ec502aebcc45104b100
-
Filesize
1KB
MD529a66380db667055e3d25854a4a9fb72
SHA160049bfa0f6767a28c685e28d0e5987bf6c4c4bd
SHA25651aa029dd483b4d4db2befb2af013f5532aa3b14aef1e474afcccaea0b66fc3e
SHA51248bc9ff869c3d0fc79fd06d95f49ec306d354c901de8ac3cdbeea5850f1e30d7ca6da9084482bc49b67b35473ae736269a621b39174c3514e7b5cb991ec29f49
-
Filesize
1KB
MD54e71faa3a77029484cfaba423d96618f
SHA19c837d050bb43d69dc608af809c292e13bca4718
SHA256c470f45efd2e7c4c5b88534a18965a78dce0f8e154d3e45a9d5569ad0e334bdb
SHA5126d014de41352f2b0b494d94cd58188791e81d4e53578d0722110b6827793b735e19c614877f25c61b26233dea1b5f1998ba1240bdc8fa04c87b7e64a4ca15fe0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5a29c10d999dba02adc15b4f43b310ddb
SHA155dd18b45b4e12e253fab0d8060030f332d766c6
SHA256e8c61c4688b8cc130ef1e652e877706bfab1fead97fac1784ab3ae941312e46f
SHA512944f7ad60ecfd17c56bd9009c9dc92daf5fc1f744e6a9667cbecd13ecf0762dd9b76b05c72d78d3e5171c524d3d846eeb288b55069af74ec8fea42e28cfb913f