Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
1017fcdd21ff4ee2a5ac3d90b680d2fe.exe
Resource
win7-20230220-en
General
-
Target
1017fcdd21ff4ee2a5ac3d90b680d2fe.exe
-
Size
627KB
-
MD5
1017fcdd21ff4ee2a5ac3d90b680d2fe
-
SHA1
b9e040314eb74c24ad9f42ce37032ad238a37649
-
SHA256
a898127d2c98fda1751d317cdf3a1d85f79de8fe762edb2415ec04e7c1c53a6f
-
SHA512
a14a8ba5d52b4e206fe25dd7f889061baf6d56f2fface2121254bf3b3ba24062d342d0f196347af6055261961b1a9b56a8b8b52c3f65843ed3c32e30644384db
-
SSDEEP
12288:pToPWBv/cpGrU3yJDwlNm2n+d6twT2/FRXJbIMp8NDSjt/:pTbBv5rUGGm5UtwT29EMp8J+/
Malware Config
Extracted
nanocore
1.2.2.0
justkowir.duckdns.org:8550
513a9907-f4ca-4a36-8f25-fcb7088c00a5
-
activate_away_mode
true
-
backup_connection_host
justkowir.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-01-03T15:53:14.690945336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
8550
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
513a9907-f4ca-4a36-8f25-fcb7088c00a5
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
justkowir.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 1017fcdd21ff4ee2a5ac3d90b680d2fe.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 fpipnlvahva.exe -
Loads dropped DLL 1 IoCs
pid Process 3600 fpipnlvahva.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iimn = "C:\\Users\\Admin\\AppData\\Roaming\\riyheotkjtu\\amrhioao.exe" fpipnlvahva.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fpipnlvahva.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2892 set thread context of 3600 2892 fpipnlvahva.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 224 2892 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3600 fpipnlvahva.exe 3600 fpipnlvahva.exe 3600 fpipnlvahva.exe 3600 fpipnlvahva.exe 3600 fpipnlvahva.exe 3600 fpipnlvahva.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3600 fpipnlvahva.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3600 fpipnlvahva.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2892 2228 1017fcdd21ff4ee2a5ac3d90b680d2fe.exe 86 PID 2228 wrote to memory of 2892 2228 1017fcdd21ff4ee2a5ac3d90b680d2fe.exe 86 PID 2228 wrote to memory of 2892 2228 1017fcdd21ff4ee2a5ac3d90b680d2fe.exe 86 PID 2892 wrote to memory of 3600 2892 fpipnlvahva.exe 88 PID 2892 wrote to memory of 3600 2892 fpipnlvahva.exe 88 PID 2892 wrote to memory of 3600 2892 fpipnlvahva.exe 88 PID 2892 wrote to memory of 3600 2892 fpipnlvahva.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1017fcdd21ff4ee2a5ac3d90b680d2fe.exe"C:\Users\Admin\AppData\Local\Temp\1017fcdd21ff4ee2a5ac3d90b680d2fe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\fpipnlvahva.exe"C:\Users\Admin\AppData\Local\Temp\fpipnlvahva.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\fpipnlvahva.exe"C:\Users\Admin\AppData\Local\Temp\fpipnlvahva.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 6043⤵
- Program crash
PID:224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2892 -ip 28921⤵PID:1140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5653b6698f08c05f61382fd9abb47d3ff
SHA15b5a6dbe0f2a4dfe96a942e59e7530e398735526
SHA256a8ead7b3bbd1c745ddf6bdd56754abef6c0b1e5c89c307a9a96271cf60b8a204
SHA512f7e12a7fba40c14df31e52f25c763bd665e67ae3cf1d225fa102a7b1617fa3d4738cdcda3a9d0d6102abedd69be12c048d208d6e2a568257e86315e74c4d413d
-
Filesize
56KB
MD587db5b2fefc7222378a104d7f19a2fe6
SHA13b8cee98e2c9995b1f272a440a579292ad1494fb
SHA2560a35fca48936fd55902f1c27b15232bb77dc3b8ddaf51717d537c7d51480c5e0
SHA5125f63bbf8e89228e8e6d2c906caf1699ef8029c285066520728077b926dc15943d88a7551e404e67e8b3070204ec6615a77ee46ceae1e2f3cc574a6e16302a3c4
-
Filesize
56KB
MD587db5b2fefc7222378a104d7f19a2fe6
SHA13b8cee98e2c9995b1f272a440a579292ad1494fb
SHA2560a35fca48936fd55902f1c27b15232bb77dc3b8ddaf51717d537c7d51480c5e0
SHA5125f63bbf8e89228e8e6d2c906caf1699ef8029c285066520728077b926dc15943d88a7551e404e67e8b3070204ec6615a77ee46ceae1e2f3cc574a6e16302a3c4
-
Filesize
56KB
MD587db5b2fefc7222378a104d7f19a2fe6
SHA13b8cee98e2c9995b1f272a440a579292ad1494fb
SHA2560a35fca48936fd55902f1c27b15232bb77dc3b8ddaf51717d537c7d51480c5e0
SHA5125f63bbf8e89228e8e6d2c906caf1699ef8029c285066520728077b926dc15943d88a7551e404e67e8b3070204ec6615a77ee46ceae1e2f3cc574a6e16302a3c4
-
Filesize
56KB
MD587db5b2fefc7222378a104d7f19a2fe6
SHA13b8cee98e2c9995b1f272a440a579292ad1494fb
SHA2560a35fca48936fd55902f1c27b15232bb77dc3b8ddaf51717d537c7d51480c5e0
SHA5125f63bbf8e89228e8e6d2c906caf1699ef8029c285066520728077b926dc15943d88a7551e404e67e8b3070204ec6615a77ee46ceae1e2f3cc574a6e16302a3c4
-
Filesize
280KB
MD54b6c6f48f5821d454e178621b0e1ac81
SHA131ea40a6563dc7b0007faf50de68e2f52dded053
SHA256d8d01e1f71f56f8d39386e5346efac30fe9480370974127e409d61b648cd7afd
SHA51288487b71d1558a0dce462b71244452db14c37878ff44dde9935d304b23c6cf9c73f38795ddcfbbaf0d9e9cc9f7ce585d054f2b24e7ba7610119ba7f240ef75ce