Analysis

  • max time kernel
    91s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2023, 12:16 UTC

General

  • Target

    2a4d85fb030591cbfa42bbc72f27607e.exe

  • Size

    836KB

  • MD5

    2a4d85fb030591cbfa42bbc72f27607e

  • SHA1

    701232edaf6aa4a36509644d69b6a7c55443b1b6

  • SHA256

    d7dc5a4583f409639bf8c10eb62fbbc13ac2e1b8f702425e959d47e64463d45f

  • SHA512

    4e17def1c104c95bc784b58dd0b1445050d3489225f27c60ec0253af302f44e04da25c3743606865f85d1940a4ef3b90ed50d58b98ed0a0ccc21a39366a4a4e8

  • SSDEEP

    24576:peia1r8NO9c1xqpB9cbOEx54w6RTc4N34HZ:ps1r8M9WmzcbOEbKE

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

tzitziklishop.ddns.net:1665

127.0.0.1:1665

Mutex

be28fce4-4930-4ffe-96ed-0110cf99b889

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2022-11-05T12:54:30.362923036Z

  • bypass_user_account_control

    false

  • bypass_user_account_control_data

    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

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    1665

  • default_group

    SecureKMT

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    be28fce4-4930-4ffe-96ed-0110cf99b889

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    tzitziklishop.ddns.net

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a4d85fb030591cbfa42bbc72f27607e.exe
    "C:\Users\Admin\AppData\Local\Temp\2a4d85fb030591cbfa42bbc72f27607e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\2a4d85fb030591cbfa42bbc72f27607e.exe
      "C:\Users\Admin\AppData\Local\Temp\2a4d85fb030591cbfa42bbc72f27607e.exe"
      2⤵
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /create /f /tn "DSL Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF2C1.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2500
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /create /f /tn "DSL Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF40A.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:3272

Network

  • flag-unknown
    DNS
    tzitziklishop.ddns.net
    2a4d85fb030591cbfa42bbc72f27607e.exe
    Remote address:
    8.8.8.8:53
    Request
    tzitziklishop.ddns.net
    IN A
    Response
    tzitziklishop.ddns.net
    IN A
    45.12.253.26
  • 72.21.81.240:80
    322 B
    7
  • 72.21.81.240:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 20.50.73.10:443
    322 B
    7
  • 45.12.253.26:1665
    tzitziklishop.ddns.net
    2a4d85fb030591cbfa42bbc72f27607e.exe
    10.8kB
    373.7kB
    201
    343
  • 96.16.53.137:80
    322 B
    7
  • 96.16.53.137:80
    322 B
    7
  • 96.16.53.137:80
    322 B
    7
  • 8.8.8.8:53
    tzitziklishop.ddns.net
    dns
    2a4d85fb030591cbfa42bbc72f27607e.exe
    68 B
    84 B
    1
    1

    DNS Request

    tzitziklishop.ddns.net

    DNS Response

    45.12.253.26

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2a4d85fb030591cbfa42bbc72f27607e.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Temp\tmpF2C1.tmp

    Filesize

    1KB

    MD5

    286af822f3f5aafb1b639770aa158902

    SHA1

    2b37f4650e33de89f356ccb0408b77538fed25dc

    SHA256

    53aa850603eee16af11fea494d9c8b704167d7e6fb214f9af01ef96d5e5fc99e

    SHA512

    9bb20cdc6406ec599816dfa3b5e7bd76e1ec6ac2cb3593a48c6067b97108b986bb60f543e7f4940666b2e7d6677b5607e3bb7b31d4c8325eb9a79759160c52ba

  • C:\Users\Admin\AppData\Local\Temp\tmpF40A.tmp

    Filesize

    1KB

    MD5

    a0bcaf1694d4fcae2c44258530850f35

    SHA1

    99e9ccea3a9dca8d94808f6488fdc37c0b3bfe73

    SHA256

    099c4a82d8e8ddf5ff801a8f08fb5a143834506e936ce846b380a42eb24e888e

    SHA512

    ad3f2fbc09f7d57c24a35a62f00251c93d480e065f3b7fbc7133736cb144a3031fdc9f3e8be8a1c6dcdb8b3def654618faab416f66a28628ab71e55de4df0da3

  • memory/3048-135-0x00000000056C0000-0x00000000056CA000-memory.dmp

    Filesize

    40KB

  • memory/3048-136-0x0000000009120000-0x00000000091BC000-memory.dmp

    Filesize

    624KB

  • memory/3048-132-0x0000000000C40000-0x0000000000D14000-memory.dmp

    Filesize

    848KB

  • memory/3048-134-0x0000000005750000-0x00000000057E2000-memory.dmp

    Filesize

    584KB

  • memory/3048-133-0x0000000005D00000-0x00000000062A4000-memory.dmp

    Filesize

    5.6MB

  • memory/3568-138-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3568-144-0x0000000006DC0000-0x0000000006E26000-memory.dmp

    Filesize

    408KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.