Analysis

  • max time kernel
    151s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 16:26

General

  • Target

    F0096900000987789.exe

  • Size

    416KB

  • MD5

    264e01e9cae9c9e1967ea892288bc9ae

  • SHA1

    6353515cd0642b46cb95bd028a3d44f273d5e5e9

  • SHA256

    2bdbe25f715e65a6ae288750c0d3236b7edf55b4f43fce3a88b779f01b6101da

  • SHA512

    79985475851347c86ae6e150a045e197f9aaa960a8910694098a550b17d684adafbfabf2f6a55470e31bce8a93707e86991b4ba17a618864b147e0d533243277

  • SSDEEP

    6144:PYa6dVyAI4xoWOgNAIccFhsNCzYK9cnr43CGbhJb+sfQCbZzsPpP8gUnSiGQYsL:PYRrfofg2Uhsycn8YWyPpPbKGVsL

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

79.110.62.170:4445

Mutex

cb222388-60cd-45a6-86e9-345ab11492c9

Attributes
  • activate_away_mode

    true

  • backup_connection_host

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2023-06-30T07:50:17.873975236Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    4445

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    cb222388-60cd-45a6-86e9-345ab11492c9

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    79.110.62.170

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\F0096900000987789.exe
    "C:\Users\Admin\AppData\Local\Temp\F0096900000987789.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\hevnhrxazn.exe
      "C:\Users\Admin\AppData\Local\Temp\hevnhrxazn.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\hevnhrxazn.exe
        "C:\Users\Admin\AppData\Local\Temp\hevnhrxazn.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\NTFS Monitor\ntfsmon.exe

    Filesize

    201KB

    MD5

    bc17e821b2bf7340c20dabf82a5edbee

    SHA1

    38089a83bc5dea7ad162b3c0b3e32eb2239e291d

    SHA256

    6eac0348b8012f2927c8afc32975096e941ff033f72b1369aeb6f85c507cd717

    SHA512

    fd0f1868dc49d42a4408bd4a85404e0a17a271697937445c65d4c8e8cdab01bebdfd81d0f58814d24a1deff18f7b6ee17b9b4933611fb461ec61e694c6736ca8

  • C:\Users\Admin\AppData\Local\Temp\hevnhrxazn.exe

    Filesize

    201KB

    MD5

    bc17e821b2bf7340c20dabf82a5edbee

    SHA1

    38089a83bc5dea7ad162b3c0b3e32eb2239e291d

    SHA256

    6eac0348b8012f2927c8afc32975096e941ff033f72b1369aeb6f85c507cd717

    SHA512

    fd0f1868dc49d42a4408bd4a85404e0a17a271697937445c65d4c8e8cdab01bebdfd81d0f58814d24a1deff18f7b6ee17b9b4933611fb461ec61e694c6736ca8

  • C:\Users\Admin\AppData\Local\Temp\hevnhrxazn.exe

    Filesize

    201KB

    MD5

    bc17e821b2bf7340c20dabf82a5edbee

    SHA1

    38089a83bc5dea7ad162b3c0b3e32eb2239e291d

    SHA256

    6eac0348b8012f2927c8afc32975096e941ff033f72b1369aeb6f85c507cd717

    SHA512

    fd0f1868dc49d42a4408bd4a85404e0a17a271697937445c65d4c8e8cdab01bebdfd81d0f58814d24a1deff18f7b6ee17b9b4933611fb461ec61e694c6736ca8

  • C:\Users\Admin\AppData\Local\Temp\hevnhrxazn.exe

    Filesize

    201KB

    MD5

    bc17e821b2bf7340c20dabf82a5edbee

    SHA1

    38089a83bc5dea7ad162b3c0b3e32eb2239e291d

    SHA256

    6eac0348b8012f2927c8afc32975096e941ff033f72b1369aeb6f85c507cd717

    SHA512

    fd0f1868dc49d42a4408bd4a85404e0a17a271697937445c65d4c8e8cdab01bebdfd81d0f58814d24a1deff18f7b6ee17b9b4933611fb461ec61e694c6736ca8

  • C:\Users\Admin\AppData\Local\Temp\odeznlddb.p

    Filesize

    300KB

    MD5

    238a3b33f9625d9ab33fdfbfa1b52c9b

    SHA1

    d5fa3eef63f6a133a1eb7ef37871ce363e0de63b

    SHA256

    48bfecaa62d330e814755c6bb4878c65107446156ecbe95309ef413c4aedaeab

    SHA512

    8caaa1a17cc989ce565ce410b99e634151e5b5df2fa214fee7caccc67af833ee3c916a14b97338034a0f4eef6e75dc25c6743c41c007d2c8b2a5919a418a8e58

  • \Users\Admin\AppData\Local\Temp\hevnhrxazn.exe

    Filesize

    201KB

    MD5

    bc17e821b2bf7340c20dabf82a5edbee

    SHA1

    38089a83bc5dea7ad162b3c0b3e32eb2239e291d

    SHA256

    6eac0348b8012f2927c8afc32975096e941ff033f72b1369aeb6f85c507cd717

    SHA512

    fd0f1868dc49d42a4408bd4a85404e0a17a271697937445c65d4c8e8cdab01bebdfd81d0f58814d24a1deff18f7b6ee17b9b4933611fb461ec61e694c6736ca8

  • \Users\Admin\AppData\Local\Temp\hevnhrxazn.exe

    Filesize

    201KB

    MD5

    bc17e821b2bf7340c20dabf82a5edbee

    SHA1

    38089a83bc5dea7ad162b3c0b3e32eb2239e291d

    SHA256

    6eac0348b8012f2927c8afc32975096e941ff033f72b1369aeb6f85c507cd717

    SHA512

    fd0f1868dc49d42a4408bd4a85404e0a17a271697937445c65d4c8e8cdab01bebdfd81d0f58814d24a1deff18f7b6ee17b9b4933611fb461ec61e694c6736ca8

  • memory/1704-19-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/1704-21-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/1704-16-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1704-17-0x0000000073BB0000-0x000000007415B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-18-0x0000000073BB0000-0x000000007415B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-11-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1704-20-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/1704-15-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1704-28-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/1704-24-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1704-25-0x0000000073BB0000-0x000000007415B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-26-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/1704-27-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/2020-6-0x00000000000A0000-0x00000000000A2000-memory.dmp

    Filesize

    8KB