Overview
overview
10Static
static
10NanoCore_1...22.rar
windows10-2004-x64
3NanoCore 1...in.xml
windows10-2004-x64
1NanoCore 1...sqlite
windows10-2004-x64
3NanoCore 1...sqlite
windows10-2004-x64
3NanoCore 1...sqlite
windows10-2004-x64
3NanoCore 1...IO.ncp
windows10-2004-x64
3NanoCore 1...in.ncp
windows10-2004-x64
3NanoCore 1...in.ncp
windows10-2004-x64
3NanoCore 1...ls.ncp
windows10-2004-x64
3NanoCore 1...ck.ncp
windows10-2004-x64
3NanoCore 1...ss.ncp
windows10-2004-x64
3NanoCore 1...in.ncp
windows10-2004-x64
3NanoCore 1...in.ncp
windows10-2004-x64
3NanoCore 1...in.ncp
windows10-2004-x64
3NanoCore 1...in.ncp
windows10-2004-x64
3NanoCore 1...ra.wav
windows10-2004-x64
6NanoCore 1...te.png
windows10-2004-x64
3NanoCore 1...in.png
windows10-2004-x64
3NanoCore 1...en.png
windows10-2004-x64
3NanoCore 1...om.png
windows10-2004-x64
3NanoCore 1...el.png
windows10-2004-x64
3NanoCore 1...og.png
windows10-2004-x64
3NanoCore 1...el.png
windows10-2004-x64
3NanoCore 1...ry.png
windows10-2004-x64
3NanoCore 1...te.dll
windows10-2004-x64
1NanoCore 1...er.log
windows10-2004-x64
1NanoCore 1...nt.exe
windows10-2004-x64
10NanoCore 1...ns.bin
windows10-2004-x64
3NanoCore 1...ic.bin
windows10-2004-x64
3NanoCore 1...gs.bin
windows10-2004-x64
3NanoCore 1...op.dll
windows10-2004-x64
1NanoCore 1...op.dll
windows10-2004-x64
1Analysis
-
max time kernel
178s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 22:40
Behavioral task
behavioral1
Sample
NanoCore_1.2.2.0_Cracked_By_Alcatraz3222.rar
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/ClientPlugin.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Databases/core.sqlite
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Databases/geolocation.sqlite
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Databases/network.sqlite
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/AIO.ncp
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/CorePlugin.ncp
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/DucPlugin.ncp
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/MiscTools.ncp
Resource
win10v2004-20230221-en
Behavioral task
behavioral10
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/NanoBlack.ncp
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/NanoCoreSwiss.ncp
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/NanoProtectPlugin.ncp
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/NetworkPlugin.ncp
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/SurveillanceExPlugin.ncp
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/ToolsPlugin.ncp
Resource
win10v2004-20230221-en
Behavioral task
behavioral16
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/Audio/camera.wav
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/ContextIcons/application_delete.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/ContextIcons/bin.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/ContextIcons/book_open.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/ContextIcons/broom.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/ContextIcons/cancel.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/ContextIcons/cog.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/ContextIcons/control_panel.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral24
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/Resources/ContextIcons/ddr_memory.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/System.Data.SQLite.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral26
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/builder.log
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/client.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/plugins.bin
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/public.bin
Resource
win10v2004-20230221-en
Behavioral task
behavioral30
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/settings.bin
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/x64/SQLite.Interop.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral32
Sample
NanoCore 1.2.2.0_Cracked By Alcatraz3222/x86/SQLite.Interop.dll
Resource
win10v2004-20230221-en
General
-
Target
NanoCore 1.2.2.0_Cracked By Alcatraz3222/ClientPlugin.xml
-
Size
9KB
-
MD5
5d0381a56563b1ca8928e3cf087f1625
-
SHA1
9c9f15ec3bf3f91fae6f327df558d335f790ce3b
-
SHA256
0497b92461c2a9ce3101d9397fb3079f60979164336a16653d282273d3085bcc
-
SHA512
594de3e1313255902524d11b3d7a89d35b2db2713d01f7e725cecc5959227f18ca856059932b809be420bebd478199d48303a71b66fc3e48d835dcac133d3d04
-
SSDEEP
192:E5cL6liTydwvbFO+y2dbEBhVR6SHaP0sJjpCZUV1:ocLBeKw+y/BfASHo0uF7j
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1607794106" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{859BB612-CA9D-11ED-8227-EA594EAC485B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1607794106" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31022762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31022762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386466349" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4864 iexplore.exe 4864 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 4888 wrote to memory of 4864 4888 MSOXMLED.EXE iexplore.exe PID 4888 wrote to memory of 4864 4888 MSOXMLED.EXE iexplore.exe PID 4864 wrote to memory of 1668 4864 iexplore.exe IEXPLORE.EXE PID 4864 wrote to memory of 1668 4864 iexplore.exe IEXPLORE.EXE PID 4864 wrote to memory of 1668 4864 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\ClientPlugin.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\ClientPlugin.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4864 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver5A99.tmpFilesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
memory/4888-133-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB
-
memory/4888-134-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB
-
memory/4888-135-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB
-
memory/4888-136-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB
-
memory/4888-137-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB
-
memory/4888-138-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB
-
memory/4888-139-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB
-
memory/4888-140-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB
-
memory/4888-141-0x00007FFCB6010000-0x00007FFCB6020000-memory.dmpFilesize
64KB