Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2023 17:51

General

  • Target

    NanoRAT.exe

  • Size

    203KB

  • MD5

    36f6ca9130511f2905b8f6f4816ebc39

  • SHA1

    2ae43f1ec29be73d54554cf846703a713b8b0f30

  • SHA256

    62c2292b71bc1c2ed6fb0c2ef21a477c3af5f75c1d0b158c0696d4272b422ea9

  • SHA512

    26fd3bce7b99b77de32aeb6339cbb85aa140cba978ed2baae3fbfa561e1add9a58ece7e4f0d911726c60a62e47e7f4c013511bca695c148146ea6bbc5884ea6a

  • SSDEEP

    6144:MLV6Bta6dtJmakIM5iitzMM3/mpjxE7pzpTVR:MLV6BtpmkFitoxizpZR

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NanoRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\NanoRAT.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "TCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7FD3.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3720
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "TCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp80CE.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp7FD3.tmp

    Filesize

    1KB

    MD5

    309d551891fa6aefd6be14f14ba6eafd

    SHA1

    5c84f02e13f05f515fd6f05eeb006157eb438663

    SHA256

    1d793cf951218289dad8735571a8598eb3c632115bacf7896c7483309978dcdb

    SHA512

    e62dd3be3c08c55f8bf6247cc540e2e311923ecdb29d7aee27414e87240dbd2aa46da2a14e99bc90454b3e7f2373ea0e7e277ef22730454cd8413224f6220164

  • C:\Users\Admin\AppData\Local\Temp\tmp80CE.tmp

    Filesize

    1KB

    MD5

    4b7ef560289c0f62d0baf6f14f48a57a

    SHA1

    8331acb90dde588aa3196919f6e847f398fd06d1

    SHA256

    062844155306130d6fafc4fe10ac9e5ddd2ed462532b729c50cdc979c0d83207

    SHA512

    ecaa27c4b703d95f9f9b37d8c339982970482e7dab968c2010e0aa644bbfa31973111aafb827565af30c423d1d14e4ff997ec149614e713ff7ef3456894d02d8

  • memory/3720-132-0x0000000000000000-mapping.dmp

  • memory/3848-135-0x0000000000000000-mapping.dmp

  • memory/4288-134-0x00000000748A0000-0x0000000074E51000-memory.dmp

    Filesize

    5.7MB

  • memory/4288-137-0x00000000748A0000-0x0000000074E51000-memory.dmp

    Filesize

    5.7MB