Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2023, 17:31

General

  • Target

    DC1635104FF64D96E711BBE22D2EE026B01D36F10A845.exe

  • Size

    256KB

  • MD5

    6c4c641da1827270afc02e0536a2ebdf

  • SHA1

    e0cb971ecb7660ab3135efec6c944182cbbb89e9

  • SHA256

    dc1635104ff64d96e711bbe22d2ee026b01d36f10a84555f75b1a4634d34108f

  • SHA512

    156aa7ad3e66f76a9f0d7b5d718489d3fb353870ba40d5188e58c952f91e172083501b8e9eb2adeae8293ac61f09d27a6e52a538cbeb63cb668004b5f21f9ecb

  • SSDEEP

    6144:74UxiRC0RTpLFY9bNMXa0TQgotmKH6TjutEKyK:7PiRCGFWSDMD36WF

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DC1635104FF64D96E711BBE22D2EE026B01D36F10A845.exe
    "C:\Users\Admin\AppData\Local\Temp\DC1635104FF64D96E711BBE22D2EE026B01D36F10A845.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2332-0-0x0000000074EC0000-0x000000007546B000-memory.dmp

          Filesize

          5.7MB

        • memory/2332-1-0x00000000002A0000-0x00000000002E0000-memory.dmp

          Filesize

          256KB

        • memory/2332-2-0x0000000074EC0000-0x000000007546B000-memory.dmp

          Filesize

          5.7MB

        • memory/2332-5-0x0000000074EC0000-0x000000007546B000-memory.dmp

          Filesize

          5.7MB

        • memory/2332-6-0x00000000002A0000-0x00000000002E0000-memory.dmp

          Filesize

          256KB