Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
General
-
Target
sample.exe
-
Size
2.1MB
-
MD5
ae177e42c4c6e273cb4219fff5e94981
-
SHA1
9b4c628e9aa7a81ada28dd4ba2490cef3a5ccede
-
SHA256
562fc3234e53c14974bd59e5008f264438e67849ddaf11f06c4687fdd2da5311
-
SHA512
b34261b51110f1b055fe6cd283d51620fc1c0d0cd25c87587cc434ea04074aa0ed1ad43f270383453b76b69db3cbf5708a21cf10948f874123d5fef09348ceba
-
SSDEEP
24576:LE1qXbolTK38T67YCE3DY1oNowiK33tQPtY6Zqx8dYkRQ53Ula4mJ8ZQI+QSD11a:LEMoVl3zWwx0qxnkRGcQI+1ZvWH
Malware Config
Extracted
nanocore
1.2.2.0
syoll.duckdns.org:1604
91a498dd-ff55-4709-b992-a5ee7715c9a2
-
activate_away_mode
false
-
backup_connection_host
syoll.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-03-14T21:41:26.733185836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1604
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
91a498dd-ff55-4709-b992-a5ee7715c9a2
-
mutex_timeout
4985
-
prevent_system_sleep
false
-
primary_connection_host
syoll.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
false
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XVlBzgbaiC.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" XVlBzgbaiC.exe -
Executes dropped EXE 3 IoCs
pid Process 2020 XVlBzgbaiC.exe 1976 XVlBzgbaiC.exe 1052 core.exe -
Loads dropped DLL 5 IoCs
pid Process 1060 sample.exe 1060 sample.exe 2020 XVlBzgbaiC.exe 2020 XVlBzgbaiC.exe 2020 XVlBzgbaiC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IMAP Service = "C:\\Program Files (x86)\\IMAP Service\\imapsvc.exe" XVlBzgbaiC.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XVlBzgbaiC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XVlBzgbaiC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XVlBzgbaiC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2020 set thread context of 1976 2020 XVlBzgbaiC.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\IMAP Service\imapsvc.exe XVlBzgbaiC.exe File opened for modification C:\Program Files (x86)\IMAP Service\imapsvc.exe XVlBzgbaiC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 XVlBzgbaiC.exe 2020 XVlBzgbaiC.exe 1052 core.exe 1976 XVlBzgbaiC.exe 1976 XVlBzgbaiC.exe 1976 XVlBzgbaiC.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe 1052 core.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1976 XVlBzgbaiC.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2020 XVlBzgbaiC.exe Token: SeDebugPrivilege 1052 core.exe Token: SeDebugPrivilege 1976 XVlBzgbaiC.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2020 1060 sample.exe 28 PID 1060 wrote to memory of 2020 1060 sample.exe 28 PID 1060 wrote to memory of 2020 1060 sample.exe 28 PID 1060 wrote to memory of 2020 1060 sample.exe 28 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1976 2020 XVlBzgbaiC.exe 30 PID 2020 wrote to memory of 1052 2020 XVlBzgbaiC.exe 31 PID 2020 wrote to memory of 1052 2020 XVlBzgbaiC.exe 31 PID 2020 wrote to memory of 1052 2020 XVlBzgbaiC.exe 31 PID 2020 wrote to memory of 1052 2020 XVlBzgbaiC.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XVlBzgbaiC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exeC:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe2⤵
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\core.exe"C:\Users\Admin\AppData\Local\Temp\core.exe" -woohoo 1976 C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2
-
Filesize
414KB
MD586ad55d4fc8cbbb78d3f71b9784fffc2
SHA13f30d552413241e42626aa9372a2bfd9a016e375
SHA25687ea5a682d91c46a58146860d95bb4d704d684324530244c574be21b3981fd7a
SHA512fe4a1599a9b0b9d78a9fadfbce50ab5f8dbc6b5b6199e02bde119af859b63580e6b7f7a7df72692c7d5acee8a2646b9cc57dd64b6be19736e0dbb60433fe3af2