Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 21:31
Static task
static1
Behavioral task
behavioral1
Sample
70228020EFAF6AAD87454D706109984F.exe
Resource
win7-20231129-en
General
-
Target
70228020EFAF6AAD87454D706109984F.exe
-
Size
611KB
-
MD5
70228020efaf6aad87454d706109984f
-
SHA1
a5da35544f66b83f13058a291c8c635e6acbd1f2
-
SHA256
61e7d79adc7462d205a363d9a925f3cb994ffc42c1aad00edc034501b2be5a6d
-
SHA512
0c51536b42c52ef9b64a6c3398c9a714b29efe579ca6f237f4923f94c12e28e8e974cdafb2b0de149dc36c5c003183133bc245691a7c9848467d85501d9334c0
-
SSDEEP
12288:JZGoR7Xx3CGXZEnZ7fQ1NNIVKuYCCrNumCto06x4CAdcu75:JwoJx3CGX45fQ9OKCs2t1j7
Malware Config
Extracted
nanocore
1.2.2.0
tzitziklishop.ddns.net:1664
a8149936-a86b-4f11-bfb6-a8924392ca9c
-
activate_away_mode
true
-
backup_connection_host
tzitziklishop.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-10-20T07:52:30.532677436Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1664
-
default_group
2024
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
a8149936-a86b-4f11-bfb6-a8924392ca9c
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
tzitziklishop.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Service = "C:\\Program Files (x86)\\WAN Service\\wansv.exe" 70228020EFAF6AAD87454D706109984F.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 70228020EFAF6AAD87454D706109984F.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1856 set thread context of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WAN Service\wansv.exe 70228020EFAF6AAD87454D706109984F.exe File opened for modification C:\Program Files (x86)\WAN Service\wansv.exe 70228020EFAF6AAD87454D706109984F.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5104 schtasks.exe 4496 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4320 70228020EFAF6AAD87454D706109984F.exe 4320 70228020EFAF6AAD87454D706109984F.exe 4320 70228020EFAF6AAD87454D706109984F.exe 4320 70228020EFAF6AAD87454D706109984F.exe 4320 70228020EFAF6AAD87454D706109984F.exe 4320 70228020EFAF6AAD87454D706109984F.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4320 70228020EFAF6AAD87454D706109984F.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4320 70228020EFAF6AAD87454D706109984F.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 PID 1856 wrote to memory of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 PID 1856 wrote to memory of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 PID 1856 wrote to memory of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 PID 1856 wrote to memory of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 PID 1856 wrote to memory of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 PID 1856 wrote to memory of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 PID 1856 wrote to memory of 4320 1856 70228020EFAF6AAD87454D706109984F.exe 102 PID 4320 wrote to memory of 4496 4320 70228020EFAF6AAD87454D706109984F.exe 101 PID 4320 wrote to memory of 4496 4320 70228020EFAF6AAD87454D706109984F.exe 101 PID 4320 wrote to memory of 4496 4320 70228020EFAF6AAD87454D706109984F.exe 101 PID 4320 wrote to memory of 5104 4320 70228020EFAF6AAD87454D706109984F.exe 99 PID 4320 wrote to memory of 5104 4320 70228020EFAF6AAD87454D706109984F.exe 99 PID 4320 wrote to memory of 5104 4320 70228020EFAF6AAD87454D706109984F.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\70228020EFAF6AAD87454D706109984F.exe"C:\Users\Admin\AppData\Local\Temp\70228020EFAF6AAD87454D706109984F.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\70228020EFAF6AAD87454D706109984F.exe"C:\Users\Admin\AppData\Local\Temp\70228020EFAF6AAD87454D706109984F.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WAN Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9E25.tmp"1⤵
- Creates scheduled task(s)
PID:5104
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WAN Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9DE6.tmp"1⤵
- Creates scheduled task(s)
PID:4496