Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
070ded692dcb232ff11b7a051395b84e.exe
Resource
win7-20231215-en
General
-
Target
070ded692dcb232ff11b7a051395b84e.exe
-
Size
605KB
-
MD5
070ded692dcb232ff11b7a051395b84e
-
SHA1
b43df3def6b8fccec021175dbeac2cf2c8dc54e8
-
SHA256
440ed593899ceed47d5af5efc4d7e8cfd9816b394be42227f041f1e6cb88964f
-
SHA512
06c30a4d9e6f531834c91ab8fbef5ea2004bef4b8ba0e81fa806759f89fc0b7c09c5addcbe2316cb7bd864b16f4e9c39284278962615aeb950bded705b29cc88
-
SSDEEP
12288:mQzp+gczyhNSvRbBQHR4qz91hI0zSaNsvz+yuWDVId21NaI+E8tyvXMZlo71xNbe:mWo7HNdTGM3BhjmFXoBB3
Malware Config
Extracted
nanocore
1.2.2.0
xp18.ddns.net:1012
ef6b2072-3b38-4899-b925-378df7ad2d73
-
activate_away_mode
true
-
backup_connection_host
xp18.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-04-23T05:59:24.479035036Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1012
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ef6b2072-3b38-4899-b925-378df7ad2d73
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
xp18.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PCI Service = "C:\\Program Files (x86)\\PCI Service\\pcisvc.exe" 070ded692dcb232ff11b7a051395b84e.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 070ded692dcb232ff11b7a051395b84e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2088 set thread context of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\PCI Service\pcisvc.exe 070ded692dcb232ff11b7a051395b84e.exe File opened for modification C:\Program Files (x86)\PCI Service\pcisvc.exe 070ded692dcb232ff11b7a051395b84e.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3012 schtasks.exe 528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2864 070ded692dcb232ff11b7a051395b84e.exe 2864 070ded692dcb232ff11b7a051395b84e.exe 2864 070ded692dcb232ff11b7a051395b84e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 070ded692dcb232ff11b7a051395b84e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 070ded692dcb232ff11b7a051395b84e.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2088 wrote to memory of 2864 2088 070ded692dcb232ff11b7a051395b84e.exe 30 PID 2864 wrote to memory of 3012 2864 070ded692dcb232ff11b7a051395b84e.exe 31 PID 2864 wrote to memory of 3012 2864 070ded692dcb232ff11b7a051395b84e.exe 31 PID 2864 wrote to memory of 3012 2864 070ded692dcb232ff11b7a051395b84e.exe 31 PID 2864 wrote to memory of 3012 2864 070ded692dcb232ff11b7a051395b84e.exe 31 PID 2864 wrote to memory of 528 2864 070ded692dcb232ff11b7a051395b84e.exe 34 PID 2864 wrote to memory of 528 2864 070ded692dcb232ff11b7a051395b84e.exe 34 PID 2864 wrote to memory of 528 2864 070ded692dcb232ff11b7a051395b84e.exe 34 PID 2864 wrote to memory of 528 2864 070ded692dcb232ff11b7a051395b84e.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\070ded692dcb232ff11b7a051395b84e.exe"C:\Users\Admin\AppData\Local\Temp\070ded692dcb232ff11b7a051395b84e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\070ded692dcb232ff11b7a051395b84e.exe"{path}"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "PCI Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF557.tmp"3⤵
- Creates scheduled task(s)
PID:3012
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "PCI Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFA57.tmp"3⤵
- Creates scheduled task(s)
PID:528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bd28d64bc9f9d615c2434befef5590dc
SHA1d4541e0e1af44734530552212641514e0352601e
SHA25672fb564224c42df0753463efdfbd592a3a5acd72cbae0168a1597a98e62c11e0
SHA512c237469736021dc707a45ac0729ee15056cf557a2baa43524066ac2c68441b118e2bf6f5697358dccdaaf7c3f753e7b6d8cbd2a4d3798f7823525479766d8b7a
-
Filesize
1KB
MD5a4f6fa4537e2dcf0d3e2802c0f070a4d
SHA103545095bfeddd7656b5b8547ab84a810324a94f
SHA256192ac26e1895b267149bde35c55327f4a441693495239da5899062924d45bd11
SHA512a4293123d718b0511a8301a7f536e403cecf8bc89f25f9dc4692b293eb8a554a8eb67993a26fe0e96792b6eb3573b34e9b270777cafe95c2383268da6d40fd2e