Analysis

  • max time kernel
    359s
  • max time network
    369s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 04:24

General

  • Target

    Tone2 NanoHost v1.2.2/NanoHost32bit.exe

  • Size

    3.4MB

  • MD5

    f350e9aad987d54e8c8275cd6fcde6c7

  • SHA1

    aebe3f27a2baf53a7a74f2697485c0f0d66f22dc

  • SHA256

    f8901e2a518df51a0d42f24d91f23834bc615b04210fffb8908bf6c065570063

  • SHA512

    55ad6cd10c0a05f39db73655c84507041e09c2a46467e2a0034ea5c26963058ba99872d2e6c30ed93908d4c3b166d4d5dcc70b3776423854d7360fad6ba7a644

  • SSDEEP

    98304:fqiCUrlRnA/e8Kp+mzk21Ewr+b5l5rimt/kuDEYfYN:SqrlRsg1+nBiCkuDE1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tone2 NanoHost v1.2.2\NanoHost32bit.exe
    "C:\Users\Admin\AppData\Local\Temp\Tone2 NanoHost v1.2.2\NanoHost32bit.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/840-0-0x0000000005020000-0x0000000005021000-memory.dmp

    Filesize

    4KB

  • memory/840-1-0x0000000005030000-0x0000000005032000-memory.dmp

    Filesize

    8KB

  • memory/840-2-0x0000000005020000-0x0000000005021000-memory.dmp

    Filesize

    4KB