Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 11:41
Static task
static1
Behavioral task
behavioral1
Sample
1764b9bbfae2fb51e5d429b38ab2a608.exe
Resource
win7-20231215-en
General
-
Target
1764b9bbfae2fb51e5d429b38ab2a608.exe
-
Size
669KB
-
MD5
1764b9bbfae2fb51e5d429b38ab2a608
-
SHA1
63478b83fd8c548a13e1811dc545166cfe640225
-
SHA256
22c1b6ff6835e90dbb3773779e25a637dbc147ac28ec5dd23b76a2e3eb9e5d3c
-
SHA512
0c8a3772610e04d0d6769743260240512f67bd76b0ac258db78514a5e0f96ec83ce3bcf27ff9a20dec74bd3f637b85ecb4ce22f69e682c0852b7615dc2a11291
-
SSDEEP
12288:QnVpn8YXr7siDvUvly/ue2+dMDemgLJt/smIAD51LnjS:QpXUiAvl6g4mqfUmb1LnjS
Malware Config
Extracted
nanocore
1.2.2.0
aje.ddns.net:9991
95795f41-f87a-457f-bd26-b82b159f6c71
-
activate_away_mode
true
-
backup_connection_host
aje.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2015-01-30T15:41:22.615452836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
9991
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
95795f41-f87a-457f-bd26-b82b159f6c71
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
aje.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LAN Service = "C:\\Program Files (x86)\\LAN Service\\lansv.exe" 1764b9bbfae2fb51e5d429b38ab2a608.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1764b9bbfae2fb51e5d429b38ab2a608.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\LAN Service\lansv.exe 1764b9bbfae2fb51e5d429b38ab2a608.exe File opened for modification C:\Program Files (x86)\LAN Service\lansv.exe 1764b9bbfae2fb51e5d429b38ab2a608.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2420 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2744 1764b9bbfae2fb51e5d429b38ab2a608.exe 2744 1764b9bbfae2fb51e5d429b38ab2a608.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 1764b9bbfae2fb51e5d429b38ab2a608.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2744 1764b9bbfae2fb51e5d429b38ab2a608.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2420 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 19 PID 2496 wrote to memory of 2420 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 19 PID 2496 wrote to memory of 2420 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 19 PID 2496 wrote to memory of 2420 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 19 PID 2496 wrote to memory of 2384 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 23 PID 2496 wrote to memory of 2384 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 23 PID 2496 wrote to memory of 2384 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 23 PID 2496 wrote to memory of 2384 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 23 PID 2496 wrote to memory of 2320 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 22 PID 2496 wrote to memory of 2320 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 22 PID 2496 wrote to memory of 2320 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 22 PID 2496 wrote to memory of 2320 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 22 PID 2496 wrote to memory of 2740 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 21 PID 2496 wrote to memory of 2740 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 21 PID 2496 wrote to memory of 2740 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 21 PID 2496 wrote to memory of 2740 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 21 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20 PID 2496 wrote to memory of 2744 2496 1764b9bbfae2fb51e5d429b38ab2a608.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Update\Windows" /XML "C:\Users\Admin\AppData\Local\Temp\568735050.xml"2⤵
- Creates scheduled task(s)
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"2⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"2⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"C:\Users\Admin\AppData\Local\Temp\1764b9bbfae2fb51e5d429b38ab2a608.exe"2⤵PID:2384
-