Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
16-02-2023 11:41
Static task
static1
Behavioral task
behavioral1
Sample
Portail commercial.exe
Resource
win7-20220901-en
General
-
Target
Portail commercial.exe
-
Size
2.4MB
-
MD5
146bfd0243ed2d774ac9c6668e52c479
-
SHA1
d716bd0f15dcf5da625f649ddb720d1d007243c4
-
SHA256
1b1b465907d70a5be723778e15933b70e5ba1154f0f5e4c023194065c8baeb7f
-
SHA512
2b8877de3a1bb025933b920ad032ee738cabf61643a6ca294ae54039d288477569600237eec21091458a0f393fcf42c8dc9fc23f004e9d552b5dcded9b3a9a96
-
SSDEEP
49152:i5MGYDz/oX2xZmsty1XXT+N3mbCJdSl6YevAt6S6wQnMZSxYN6+tDq:iiGYDz/l7y1Xa5mqs6Y2pFeZH6gDq
Malware Config
Extracted
nanocore
1.2.2.0
hamzzagolozar.loseyourip.com:14981
f76e5199-b9b0-45ae-b449-2e38e6b112aa
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-07-01T00:24:26.401438736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
14981
-
default_group
SEGUN
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
f76e5199-b9b0-45ae-b449-2e38e6b112aa
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
hamzzagolozar.loseyourip.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
bitrat
1.38
bitratluckshinjisix130.freeddns.org:7011
-
communication_password
4688fcb37886b8fed122f9514ecbb5ea
-
tor_process
tor
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1744 Ldfyngljpaccess.exe 968 Ldfyngljpaccess.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 Portail commercial.exe 1744 Ldfyngljpaccess.exe -
resource yara_rule behavioral1/memory/968-107-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/968-109-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/968-110-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/968-113-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/968-115-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/968-114-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/968-117-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/968-120-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/968-121-0x00000000001B0000-0x00000000001BA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\sxtensionsx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Net\\sxtensionsx.exe\"" Portail commercial.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Extensionsx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensionsx.exe\"" Ldfyngljpaccess.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Portail commercial.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 968 Ldfyngljpaccess.exe 968 Ldfyngljpaccess.exe 968 Ldfyngljpaccess.exe 968 Ldfyngljpaccess.exe 968 Ldfyngljpaccess.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1228 set thread context of 1128 1228 Portail commercial.exe 30 PID 1744 set thread context of 968 1744 Ldfyngljpaccess.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 456 powershell.exe 792 powershell.exe 1128 Portail commercial.exe 1128 Portail commercial.exe 1128 Portail commercial.exe 1128 Portail commercial.exe 1128 Portail commercial.exe 1128 Portail commercial.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1128 Portail commercial.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 1228 Portail commercial.exe Token: SeDebugPrivilege 792 powershell.exe Token: SeDebugPrivilege 1128 Portail commercial.exe Token: SeDebugPrivilege 1744 Ldfyngljpaccess.exe Token: SeDebugPrivilege 968 Ldfyngljpaccess.exe Token: SeShutdownPrivilege 968 Ldfyngljpaccess.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 968 Ldfyngljpaccess.exe 968 Ldfyngljpaccess.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1228 wrote to memory of 456 1228 Portail commercial.exe 27 PID 1228 wrote to memory of 456 1228 Portail commercial.exe 27 PID 1228 wrote to memory of 456 1228 Portail commercial.exe 27 PID 1228 wrote to memory of 456 1228 Portail commercial.exe 27 PID 1228 wrote to memory of 1744 1228 Portail commercial.exe 29 PID 1228 wrote to memory of 1744 1228 Portail commercial.exe 29 PID 1228 wrote to memory of 1744 1228 Portail commercial.exe 29 PID 1228 wrote to memory of 1744 1228 Portail commercial.exe 29 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1228 wrote to memory of 1128 1228 Portail commercial.exe 30 PID 1744 wrote to memory of 792 1744 Ldfyngljpaccess.exe 31 PID 1744 wrote to memory of 792 1744 Ldfyngljpaccess.exe 31 PID 1744 wrote to memory of 792 1744 Ldfyngljpaccess.exe 31 PID 1744 wrote to memory of 792 1744 Ldfyngljpaccess.exe 31 PID 1744 wrote to memory of 968 1744 Ldfyngljpaccess.exe 33 PID 1744 wrote to memory of 968 1744 Ldfyngljpaccess.exe 33 PID 1744 wrote to memory of 968 1744 Ldfyngljpaccess.exe 33 PID 1744 wrote to memory of 968 1744 Ldfyngljpaccess.exe 33 PID 1744 wrote to memory of 968 1744 Ldfyngljpaccess.exe 33 PID 1744 wrote to memory of 968 1744 Ldfyngljpaccess.exe 33 PID 1744 wrote to memory of 968 1744 Ldfyngljpaccess.exe 33 PID 1744 wrote to memory of 968 1744 Ldfyngljpaccess.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Portail commercial.exe"C:\Users\Admin\AppData\Local\Temp\Portail commercial.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\Ldfyngljpaccess.exe"C:\Users\Admin\AppData\Local\Temp\Ldfyngljpaccess.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\Ldfyngljpaccess.exeC:\Users\Admin\AppData\Local\Temp\Ldfyngljpaccess.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Portail commercial.exe"C:\Users\Admin\AppData\Local\Temp\Portail commercial.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c067642ee75a78d31964d7951c0673ee
SHA16eda0e0896e1517e10dd8a4e4202704860b0514a
SHA2564824cf3c52d037cccdaf9d7422b393a7e0a769b27b92c899484048cef7876bad
SHA5123ae2af350df6806ed7127fe2ff843c08429d4a38755899425e49e1019beab0af765766a668884673819768a21a5b01caa0498f4875997a6d08b47048038cbcc0
-
Filesize
1.9MB
MD5c067642ee75a78d31964d7951c0673ee
SHA16eda0e0896e1517e10dd8a4e4202704860b0514a
SHA2564824cf3c52d037cccdaf9d7422b393a7e0a769b27b92c899484048cef7876bad
SHA5123ae2af350df6806ed7127fe2ff843c08429d4a38755899425e49e1019beab0af765766a668884673819768a21a5b01caa0498f4875997a6d08b47048038cbcc0
-
Filesize
1.9MB
MD5c067642ee75a78d31964d7951c0673ee
SHA16eda0e0896e1517e10dd8a4e4202704860b0514a
SHA2564824cf3c52d037cccdaf9d7422b393a7e0a769b27b92c899484048cef7876bad
SHA5123ae2af350df6806ed7127fe2ff843c08429d4a38755899425e49e1019beab0af765766a668884673819768a21a5b01caa0498f4875997a6d08b47048038cbcc0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD51a0fb999923f6524b68d37d5a397263b
SHA1a0ac0cf47437aee417bb1d55b0a0ab99187199fb
SHA256529c2bcdeb7f9e3a4e05b205b3753d2c87e060591acaec6138c117dd73c3bf71
SHA512c3079ca13b3b8240bf809c51f079bfd1c37d3af9a122cf4bffcfb6fda5e66392c297672075a17468e544e1398701b19cf23945f479787918f8ab37321584ab0c
-
Filesize
1.9MB
MD5c067642ee75a78d31964d7951c0673ee
SHA16eda0e0896e1517e10dd8a4e4202704860b0514a
SHA2564824cf3c52d037cccdaf9d7422b393a7e0a769b27b92c899484048cef7876bad
SHA5123ae2af350df6806ed7127fe2ff843c08429d4a38755899425e49e1019beab0af765766a668884673819768a21a5b01caa0498f4875997a6d08b47048038cbcc0
-
Filesize
1.9MB
MD5c067642ee75a78d31964d7951c0673ee
SHA16eda0e0896e1517e10dd8a4e4202704860b0514a
SHA2564824cf3c52d037cccdaf9d7422b393a7e0a769b27b92c899484048cef7876bad
SHA5123ae2af350df6806ed7127fe2ff843c08429d4a38755899425e49e1019beab0af765766a668884673819768a21a5b01caa0498f4875997a6d08b47048038cbcc0