Analysis
-
max time kernel
172s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
070ded692dcb232ff11b7a051395b84e.exe
Resource
win7-20231215-en
General
-
Target
070ded692dcb232ff11b7a051395b84e.exe
-
Size
605KB
-
MD5
070ded692dcb232ff11b7a051395b84e
-
SHA1
b43df3def6b8fccec021175dbeac2cf2c8dc54e8
-
SHA256
440ed593899ceed47d5af5efc4d7e8cfd9816b394be42227f041f1e6cb88964f
-
SHA512
06c30a4d9e6f531834c91ab8fbef5ea2004bef4b8ba0e81fa806759f89fc0b7c09c5addcbe2316cb7bd864b16f4e9c39284278962615aeb950bded705b29cc88
-
SSDEEP
12288:mQzp+gczyhNSvRbBQHR4qz91hI0zSaNsvz+yuWDVId21NaI+E8tyvXMZlo71xNbe:mWo7HNdTGM3BhjmFXoBB3
Malware Config
Extracted
nanocore
1.2.2.0
xp18.ddns.net:1012
ef6b2072-3b38-4899-b925-378df7ad2d73
-
activate_away_mode
true
-
backup_connection_host
xp18.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-04-23T05:59:24.479035036Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1012
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ef6b2072-3b38-4899-b925-378df7ad2d73
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
xp18.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UDP Subsystem = "C:\\Program Files (x86)\\UDP Subsystem\\udpss.exe" 070ded692dcb232ff11b7a051395b84e.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 070ded692dcb232ff11b7a051395b84e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3608 set thread context of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\UDP Subsystem\udpss.exe 070ded692dcb232ff11b7a051395b84e.exe File opened for modification C:\Program Files (x86)\UDP Subsystem\udpss.exe 070ded692dcb232ff11b7a051395b84e.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3404 schtasks.exe 1364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4440 070ded692dcb232ff11b7a051395b84e.exe 4440 070ded692dcb232ff11b7a051395b84e.exe 4440 070ded692dcb232ff11b7a051395b84e.exe 4440 070ded692dcb232ff11b7a051395b84e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4440 070ded692dcb232ff11b7a051395b84e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4440 070ded692dcb232ff11b7a051395b84e.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3608 wrote to memory of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 PID 3608 wrote to memory of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 PID 3608 wrote to memory of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 PID 3608 wrote to memory of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 PID 3608 wrote to memory of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 PID 3608 wrote to memory of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 PID 3608 wrote to memory of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 PID 3608 wrote to memory of 4440 3608 070ded692dcb232ff11b7a051395b84e.exe 103 PID 4440 wrote to memory of 3404 4440 070ded692dcb232ff11b7a051395b84e.exe 106 PID 4440 wrote to memory of 3404 4440 070ded692dcb232ff11b7a051395b84e.exe 106 PID 4440 wrote to memory of 3404 4440 070ded692dcb232ff11b7a051395b84e.exe 106 PID 4440 wrote to memory of 1364 4440 070ded692dcb232ff11b7a051395b84e.exe 108 PID 4440 wrote to memory of 1364 4440 070ded692dcb232ff11b7a051395b84e.exe 108 PID 4440 wrote to memory of 1364 4440 070ded692dcb232ff11b7a051395b84e.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\070ded692dcb232ff11b7a051395b84e.exe"C:\Users\Admin\AppData\Local\Temp\070ded692dcb232ff11b7a051395b84e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\070ded692dcb232ff11b7a051395b84e.exe"{path}"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UDP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9FF4.tmp"3⤵
- Creates scheduled task(s)
PID:3404
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UDP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA0C0.tmp"3⤵
- Creates scheduled task(s)
PID:1364
-
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bd28d64bc9f9d615c2434befef5590dc
SHA1d4541e0e1af44734530552212641514e0352601e
SHA25672fb564224c42df0753463efdfbd592a3a5acd72cbae0168a1597a98e62c11e0
SHA512c237469736021dc707a45ac0729ee15056cf557a2baa43524066ac2c68441b118e2bf6f5697358dccdaaf7c3f753e7b6d8cbd2a4d3798f7823525479766d8b7a
-
Filesize
1KB
MD5c4aecdef99eba873119e79616df3f4b0
SHA1b1b3af52655fb633eed909dfed05b64fbbfac37c
SHA25624fd0d87bea36a024449a95f808aaa174e4ed9003cb8a427b67c02411b8a2e0b
SHA512e3f44b07267fccf4f5abd4efe80f2b037ddadc4cb898bdfca9d21ac5d79fcac828950065c2060d3ce125ee971fc3096183afee5287ba9951fbbda7257d8ed8d4