Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
07398dd4c7591ec9f9385e0ea829e4c8.exe
Resource
win7-20231215-en
General
-
Target
07398dd4c7591ec9f9385e0ea829e4c8.exe
-
Size
879KB
-
MD5
07398dd4c7591ec9f9385e0ea829e4c8
-
SHA1
b88174437c2c69fd684a3a196e8dda47869ba90c
-
SHA256
76c9d2b34edaae5d479d69ff362d53fdbdd22a6337fdbdabc5df8df59e11e665
-
SHA512
40d2d6cbe4be8949164518d1dbd8bf169e9c335a1c95943b3872b1d99a814af51869364e8808009bc1fcc162ea4026af1b3bbc0fc7044aca74b8872efbb5aae3
-
SSDEEP
12288:XprnO2DbvPkD5a6sdYUAI2HNCKMrygO5822MT++CcTS8eq3yuxmy7vnt14k:Xc2fFzANN5oO222ECcOq5mkPt2k
Malware Config
Extracted
nanocore
1.2.2.0
1116.hopto.org:1116
185.140.53.9:1116
909dcd33-e0d7-4bd0-87b2-b7fd2611b6b9
-
activate_away_mode
true
-
backup_connection_host
185.140.53.9
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-02-16T08:43:19.524585136Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1116
-
default_group
1116
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
909dcd33-e0d7-4bd0-87b2-b7fd2611b6b9
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
1116.hopto.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/2896-7-0x0000000005900000-0x0000000005912000-memory.dmp CustAttr -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 07398dd4c7591ec9f9385e0ea829e4c8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Host = "C:\\Program Files (x86)\\SMTP Host\\smtphost.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2896 set thread context of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\SMTP Host\smtphost.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\SMTP Host\smtphost.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4692 schtasks.exe 3928 schtasks.exe 180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2928 RegSvcs.exe 2928 RegSvcs.exe 2928 RegSvcs.exe 2928 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2928 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4692 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 104 PID 2896 wrote to memory of 4692 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 104 PID 2896 wrote to memory of 4692 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 104 PID 2896 wrote to memory of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 PID 2896 wrote to memory of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 PID 2896 wrote to memory of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 PID 2896 wrote to memory of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 PID 2896 wrote to memory of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 PID 2896 wrote to memory of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 PID 2896 wrote to memory of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 PID 2896 wrote to memory of 2928 2896 07398dd4c7591ec9f9385e0ea829e4c8.exe 106 PID 2928 wrote to memory of 3928 2928 RegSvcs.exe 107 PID 2928 wrote to memory of 3928 2928 RegSvcs.exe 107 PID 2928 wrote to memory of 3928 2928 RegSvcs.exe 107 PID 2928 wrote to memory of 180 2928 RegSvcs.exe 109 PID 2928 wrote to memory of 180 2928 RegSvcs.exe 109 PID 2928 wrote to memory of 180 2928 RegSvcs.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\07398dd4c7591ec9f9385e0ea829e4c8.exe"C:\Users\Admin\AppData\Local\Temp\07398dd4c7591ec9f9385e0ea829e4c8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NkKklXYrJQvDK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4FF0.tmp"2⤵
- Creates scheduled task(s)
PID:4692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp6906.tmp"3⤵
- Creates scheduled task(s)
PID:3928
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp6DAA.tmp"3⤵
- Creates scheduled task(s)
PID:180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50480f83b76b1016dfc626179f1a72635
SHA1387fe1a9e377544212de0268ba1226d19c2c3518
SHA256fa42ab2aee4ec30fbffffb80acbf3cd0846a75bbfe705904e2873acdbc80290f
SHA51275548b14bbf68ef63ec16afc07ac65fed51c58101e523c86fcd9800fd6f50de1765513d4a113feaac14c747caad27cdc7a8095aff0fc53dde99f41ef3a1c2967
-
Filesize
1KB
MD58cad1b41587ced0f1e74396794f31d58
SHA111054bf74fcf5e8e412768035e4dae43aa7b710f
SHA2563086d914f6b23268f8a12cb1a05516cd5465c2577e1d1e449f1b45c8e5e8f83c
SHA51299c2ef89029de51a866df932841684b7fc912df21e10e2dd0d09e400203bbdc6cba6319a31780b7bf8b286d2cea8ea3fc7d084348bf2f002ab4f5a34218ccbef
-
Filesize
1KB
MD5be81f72fa4dbc827132836ee2af92c96
SHA1fe5ded04ab4932dea6cf414e9e4428f43da70d03
SHA256bb9181b3935b8681a71b578f8166883e61380de6181df82d05f14829323fbf0f
SHA5126abd5a844ab0204d3a803083e71a5d7097b5e85f46d9f80fefa8d06ff8fda11a7d9253d6cf2d51ad8932c1b27fc7cf6fbfc6e95dce75bfe43bf995e71b40e30e