Analysis
-
max time kernel
190s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 18:36
Static task
static1
Behavioral task
behavioral1
Sample
dfa13488e17563586e4f0f5348232714.exe
Resource
win7-20230220-en
General
-
Target
dfa13488e17563586e4f0f5348232714.exe
-
Size
19.9MB
-
MD5
dfa13488e17563586e4f0f5348232714
-
SHA1
b28e1dc461365486b8e2355dd5be9ab363c3685a
-
SHA256
7ade8e9cc5023375d100ff66a55971fe3b7a06e73edaec66ed0595b9f252b52e
-
SHA512
5c5341e90a6da791c4b81476a6a169b75cd963eb366ef36bacfc94ac0cd78c6d721bb66fd7569e11beab41f6b39523a20161d184f18deea7b8912b70b08d8f70
-
SSDEEP
12288:S8SnG5jbNCUZLHVaaj7uTPUn0S6M8RLO4VsypU:SjnG5lCEGTBM8RLTz
Malware Config
Extracted
nanocore
1.2.2.0
kala007.duckdns.org:3436
kala1.duckdns.org:3436
5f09d95a-c1a6-4d61-afee-3e828645a504
-
activate_away_mode
true
-
backup_connection_host
kala1.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-10-10T22:47:40.772130236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
3436
-
default_group
MunaBc
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
5f09d95a-c1a6-4d61-afee-3e828645a504
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
kala007.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1124 easeus.exe 1796 easeus.exe 4536 easeus.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4476 set thread context of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 1124 set thread context of 1112 1124 easeus.exe 98 PID 1796 set thread context of 1060 1796 easeus.exe 107 PID 4536 set thread context of 3756 4536 easeus.exe 118 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4792 schtasks.exe 3216 schtasks.exe 2648 schtasks.exe 2992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4508 RegAsm.exe 4508 RegAsm.exe 4508 RegAsm.exe 4508 RegAsm.exe 4508 RegAsm.exe 4508 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4508 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4508 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 4476 wrote to memory of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 4476 wrote to memory of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 4476 wrote to memory of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 4476 wrote to memory of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 4476 wrote to memory of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 4476 wrote to memory of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 4476 wrote to memory of 4508 4476 dfa13488e17563586e4f0f5348232714.exe 86 PID 4476 wrote to memory of 4116 4476 dfa13488e17563586e4f0f5348232714.exe 87 PID 4476 wrote to memory of 4116 4476 dfa13488e17563586e4f0f5348232714.exe 87 PID 4476 wrote to memory of 4116 4476 dfa13488e17563586e4f0f5348232714.exe 87 PID 4476 wrote to memory of 1760 4476 dfa13488e17563586e4f0f5348232714.exe 89 PID 4476 wrote to memory of 1760 4476 dfa13488e17563586e4f0f5348232714.exe 89 PID 4476 wrote to memory of 1760 4476 dfa13488e17563586e4f0f5348232714.exe 89 PID 4476 wrote to memory of 1180 4476 dfa13488e17563586e4f0f5348232714.exe 90 PID 4476 wrote to memory of 1180 4476 dfa13488e17563586e4f0f5348232714.exe 90 PID 4476 wrote to memory of 1180 4476 dfa13488e17563586e4f0f5348232714.exe 90 PID 1760 wrote to memory of 2648 1760 cmd.exe 93 PID 1760 wrote to memory of 2648 1760 cmd.exe 93 PID 1760 wrote to memory of 2648 1760 cmd.exe 93 PID 1124 wrote to memory of 1112 1124 easeus.exe 98 PID 1124 wrote to memory of 1112 1124 easeus.exe 98 PID 1124 wrote to memory of 1112 1124 easeus.exe 98 PID 1124 wrote to memory of 1112 1124 easeus.exe 98 PID 1124 wrote to memory of 1112 1124 easeus.exe 98 PID 1124 wrote to memory of 1112 1124 easeus.exe 98 PID 1124 wrote to memory of 1112 1124 easeus.exe 98 PID 1124 wrote to memory of 1112 1124 easeus.exe 98 PID 1124 wrote to memory of 4528 1124 easeus.exe 99 PID 1124 wrote to memory of 4528 1124 easeus.exe 99 PID 1124 wrote to memory of 4528 1124 easeus.exe 99 PID 1124 wrote to memory of 4788 1124 easeus.exe 101 PID 1124 wrote to memory of 4788 1124 easeus.exe 101 PID 1124 wrote to memory of 4788 1124 easeus.exe 101 PID 1124 wrote to memory of 1524 1124 easeus.exe 102 PID 1124 wrote to memory of 1524 1124 easeus.exe 102 PID 1124 wrote to memory of 1524 1124 easeus.exe 102 PID 4788 wrote to memory of 2992 4788 cmd.exe 105 PID 4788 wrote to memory of 2992 4788 cmd.exe 105 PID 4788 wrote to memory of 2992 4788 cmd.exe 105 PID 1796 wrote to memory of 1060 1796 easeus.exe 107 PID 1796 wrote to memory of 1060 1796 easeus.exe 107 PID 1796 wrote to memory of 1060 1796 easeus.exe 107 PID 1796 wrote to memory of 1060 1796 easeus.exe 107 PID 1796 wrote to memory of 1060 1796 easeus.exe 107 PID 1796 wrote to memory of 1060 1796 easeus.exe 107 PID 1796 wrote to memory of 1060 1796 easeus.exe 107 PID 1796 wrote to memory of 1060 1796 easeus.exe 107 PID 1796 wrote to memory of 1456 1796 easeus.exe 108 PID 1796 wrote to memory of 1456 1796 easeus.exe 108 PID 1796 wrote to memory of 1456 1796 easeus.exe 108 PID 1796 wrote to memory of 4884 1796 easeus.exe 109 PID 1796 wrote to memory of 4884 1796 easeus.exe 109 PID 1796 wrote to memory of 4884 1796 easeus.exe 109 PID 1796 wrote to memory of 3088 1796 easeus.exe 110 PID 1796 wrote to memory of 3088 1796 easeus.exe 110 PID 1796 wrote to memory of 3088 1796 easeus.exe 110 PID 4884 wrote to memory of 4792 4884 cmd.exe 114 PID 4884 wrote to memory of 4792 4884 cmd.exe 114 PID 4884 wrote to memory of 4792 4884 cmd.exe 114 PID 4536 wrote to memory of 3756 4536 easeus.exe 118 PID 4536 wrote to memory of 3756 4536 easeus.exe 118 PID 4536 wrote to memory of 3756 4536 easeus.exe 118 PID 4536 wrote to memory of 3756 4536 easeus.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfa13488e17563586e4f0f5348232714.exe"C:\Users\Admin\AppData\Local\Temp\dfa13488e17563586e4f0f5348232714.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\easeus"2⤵PID:4116
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\easeus\easeus.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\easeus\easeus.exe'" /f3⤵
- Creates scheduled task(s)
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\dfa13488e17563586e4f0f5348232714.exe" "C:\Users\Admin\AppData\Roaming\easeus\easeus.exe"2⤵PID:1180
-
-
C:\Users\Admin\AppData\Roaming\easeus\easeus.exeC:\Users\Admin\AppData\Roaming\easeus\easeus.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\easeus"2⤵PID:4528
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\easeus\easeus.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\easeus\easeus.exe'" /f3⤵
- Creates scheduled task(s)
PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\easeus\easeus.exe" "C:\Users\Admin\AppData\Roaming\easeus\easeus.exe"2⤵PID:1524
-
-
C:\Users\Admin\AppData\Roaming\easeus\easeus.exeC:\Users\Admin\AppData\Roaming\easeus\easeus.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1060
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\easeus"2⤵PID:1456
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\easeus\easeus.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\easeus\easeus.exe'" /f3⤵
- Creates scheduled task(s)
PID:4792
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\easeus\easeus.exe" "C:\Users\Admin\AppData\Roaming\easeus\easeus.exe"2⤵PID:3088
-
-
C:\Users\Admin\AppData\Roaming\easeus\easeus.exeC:\Users\Admin\AppData\Roaming\easeus\easeus.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3756
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\easeus"2⤵PID:2872
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\easeus\easeus.exe'" /f2⤵PID:3396
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\easeus\easeus.exe'" /f3⤵
- Creates scheduled task(s)
PID:3216
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\easeus\easeus.exe" "C:\Users\Admin\AppData\Roaming\easeus\easeus.exe"2⤵PID:3164
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD584e77a587d94307c0ac1357eb4d3d46f
SHA183cc900f9401f43d181207d64c5adba7a85edc1e
SHA256e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99
SHA512aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691
-
Filesize
897B
MD5e3c2358e1546ed28a017b95c885c61c0
SHA1157235400ab82c991d10291e0ce1b663523eee9c
SHA25666f06275710b143c30bdc3e821f7d9643675a980a2308332ec4844d1211a9fd7
SHA512cbfc11eee0ce61d184543b33698e3bb6987a6ada3573b1575021626ef200d01308a7469d55e29574dc9b89cfdb1d11a250e1e8c2e3898899af90fa3dcc452a0f
-
Filesize
19.9MB
MD5dfa13488e17563586e4f0f5348232714
SHA1b28e1dc461365486b8e2355dd5be9ab363c3685a
SHA2567ade8e9cc5023375d100ff66a55971fe3b7a06e73edaec66ed0595b9f252b52e
SHA5125c5341e90a6da791c4b81476a6a169b75cd963eb366ef36bacfc94ac0cd78c6d721bb66fd7569e11beab41f6b39523a20161d184f18deea7b8912b70b08d8f70
-
Filesize
19.9MB
MD5dfa13488e17563586e4f0f5348232714
SHA1b28e1dc461365486b8e2355dd5be9ab363c3685a
SHA2567ade8e9cc5023375d100ff66a55971fe3b7a06e73edaec66ed0595b9f252b52e
SHA5125c5341e90a6da791c4b81476a6a169b75cd963eb366ef36bacfc94ac0cd78c6d721bb66fd7569e11beab41f6b39523a20161d184f18deea7b8912b70b08d8f70
-
Filesize
19.9MB
MD5dfa13488e17563586e4f0f5348232714
SHA1b28e1dc461365486b8e2355dd5be9ab363c3685a
SHA2567ade8e9cc5023375d100ff66a55971fe3b7a06e73edaec66ed0595b9f252b52e
SHA5125c5341e90a6da791c4b81476a6a169b75cd963eb366ef36bacfc94ac0cd78c6d721bb66fd7569e11beab41f6b39523a20161d184f18deea7b8912b70b08d8f70
-
Filesize
19.9MB
MD5dfa13488e17563586e4f0f5348232714
SHA1b28e1dc461365486b8e2355dd5be9ab363c3685a
SHA2567ade8e9cc5023375d100ff66a55971fe3b7a06e73edaec66ed0595b9f252b52e
SHA5125c5341e90a6da791c4b81476a6a169b75cd963eb366ef36bacfc94ac0cd78c6d721bb66fd7569e11beab41f6b39523a20161d184f18deea7b8912b70b08d8f70