Analysis
-
max time kernel
44s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:44
Static task
static1
Behavioral task
behavioral1
Sample
388124944ca8922d055b3c8df0a519a7.exe
Resource
win7-20231129-en
General
-
Target
388124944ca8922d055b3c8df0a519a7.exe
-
Size
784KB
-
MD5
388124944ca8922d055b3c8df0a519a7
-
SHA1
0750c4918bf40d5f37ad6fb43036b528c6863518
-
SHA256
d53818d8abf94f8cf94e2f5eec3dbc530ef8cb28f4dd3d3ebe57235669e1d86f
-
SHA512
39b1d2e88f48a0a17b49cac7c91c466997210121de8a0a049d5d2d63ea846f516253545af8cc0975d82d3ddad40280a5a857a23db6d1372eeba5bf9ceaf69c86
-
SSDEEP
12288:ZRHJA7PADFTPuIHoePgEybQoLe/m6hfBSah7Lrc:ZFJ6mbH45zGmOBSaF
Malware Config
Extracted
nanocore
1.2.2.0
nwokesienna.duckdns.org:4335
127.0.0.1:4335
832ade64-22fc-4d1b-8667-18f9d137b5db
-
activate_away_mode
false
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-06-12T17:40:51.008345636Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4335
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
832ade64-22fc-4d1b-8667-18f9d137b5db
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
nwokesienna.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
false
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NAT Subsystem = "C:\\Program Files (x86)\\NAT Subsystem\\natss.exe" 388124944ca8922d055b3c8df0a519a7.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 388124944ca8922d055b3c8df0a519a7.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3896 set thread context of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NAT Subsystem\natss.exe 388124944ca8922d055b3c8df0a519a7.exe File opened for modification C:\Program Files (x86)\NAT Subsystem\natss.exe 388124944ca8922d055b3c8df0a519a7.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3504 schtasks.exe 2352 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1660 388124944ca8922d055b3c8df0a519a7.exe 1660 388124944ca8922d055b3c8df0a519a7.exe 1660 388124944ca8922d055b3c8df0a519a7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1660 388124944ca8922d055b3c8df0a519a7.exe Token: SeDebugPrivilege 1660 388124944ca8922d055b3c8df0a519a7.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3896 wrote to memory of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 PID 3896 wrote to memory of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 PID 3896 wrote to memory of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 PID 3896 wrote to memory of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 PID 3896 wrote to memory of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 PID 3896 wrote to memory of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 PID 3896 wrote to memory of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 PID 3896 wrote to memory of 1660 3896 388124944ca8922d055b3c8df0a519a7.exe 103 PID 1660 wrote to memory of 3504 1660 388124944ca8922d055b3c8df0a519a7.exe 102 PID 1660 wrote to memory of 3504 1660 388124944ca8922d055b3c8df0a519a7.exe 102 PID 1660 wrote to memory of 3504 1660 388124944ca8922d055b3c8df0a519a7.exe 102 PID 1660 wrote to memory of 2352 1660 388124944ca8922d055b3c8df0a519a7.exe 105 PID 1660 wrote to memory of 2352 1660 388124944ca8922d055b3c8df0a519a7.exe 105 PID 1660 wrote to memory of 2352 1660 388124944ca8922d055b3c8df0a519a7.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\388124944ca8922d055b3c8df0a519a7.exe"C:\Users\Admin\AppData\Local\Temp\388124944ca8922d055b3c8df0a519a7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\388124944ca8922d055b3c8df0a519a7.exe"C:\Users\Admin\AppData\Local\Temp\388124944ca8922d055b3c8df0a519a7.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAT Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFF02.tmp"3⤵
- Creates scheduled task(s)
PID:2352
-
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAT Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFED2.tmp"1⤵
- Creates scheduled task(s)
PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\388124944ca8922d055b3c8df0a519a7.exe.log
Filesize1KB
MD531f95c36ee4b5ac1ffcbdc89b3bcabc0
SHA1d38fddab78283c1cc05cc55652222cd7e5a484aa
SHA25688486792973340aafc9db775eadfaa849d05a5e2ed25a38e67febcdf70213ce6
SHA5129acb665346143d8622613d047502a65615ea369db94281b20cb5bea6dac18f397f8c0144e8d4a201d94cd36b229ad9a31ce4a4a11e1fdcd19e6496a035032072
-
Filesize
1KB
MD5a9577c4611f3b445310069d36bbe043d
SHA16c18aaddade96d0e5578399c1d703f4f2545c08f
SHA2562bc6373a802e3cd7ae325b17847e0fda1efa33950a222459f5daf92c60691e62
SHA512ef638cf19105267450069304febfb99b277405588c4d3c6cf3cbd69d1dedbd25e35eab110182e84f96e86fba1a8ce145da353e28f6b041129051d885f8473609
-
Filesize
1KB
MD5c58d37cb49c18f1d7cece3c78ac2f407
SHA1769ed0ea9d5269e1cec7234eaac77da129cc0463
SHA25652cdb418384a912c5b7071c92d7761f0d12250f07dbbb31876eb2e8d65acbae7
SHA5122efcb3eaf050d56ad3d483112303a1543f9fc457119fbca7d81b45d5619c0f1ba706ce96644d4e2055c1b5ada7af13f071495287a775ce234d9125633bf02775