Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 11:08
Behavioral task
behavioral1
Sample
Shipment For Pickup.exe
Resource
win7-20240220-en
General
-
Target
Shipment For Pickup.exe
-
Size
912KB
-
MD5
1076379914dd47c1cd1207ac8505ae90
-
SHA1
37c66271605f8c24a783df69519e67c9ab06395b
-
SHA256
45d84e84e02a244ba45a371290ea833858f9a380fc145f8d0b7a89ea95956b5a
-
SHA512
7fa7d19811c462010e00cc39cb3e09fb9a3a82068fd3a7b7e86c04592f71ae6fb8aa8a353b7ce2ec5531a3eedbd8bd1c84ac487c8e9b8c524af95f089794c195
-
SSDEEP
24576:mBXu9HGaVHYK48pT/rwNJxy/p5L6UXf9:mw9VH1pT/i8H3X
Malware Config
Extracted
nanocore
1.2.2.0
testwork.kozow.com:8906
bd6fc7b5-d48b-4e23-98f7-784bd3ef305c
-
activate_away_mode
true
-
backup_connection_host
testwork.kozow.com
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-02-16T16:47:25.218235636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
8906
-
default_group
star
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
bd6fc7b5-d48b-4e23-98f7-784bd3ef305c
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
testwork.kozow.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Drops startup file 1 IoCs
Processes:
Shipment For Pickup.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SettingSyncHost.url Shipment For Pickup.exe -
Processes:
resource yara_rule behavioral1/memory/1940-0-0x00000000009B0000-0x0000000000BA4000-memory.dmp upx behavioral1/memory/1940-18-0x00000000009B0000-0x0000000000BA4000-memory.dmp upx behavioral1/memory/1940-19-0x00000000009B0000-0x0000000000BA4000-memory.dmp upx behavioral1/memory/1940-29-0x00000000009B0000-0x0000000000BA4000-memory.dmp upx -
Processes:
RegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1940-18-0x00000000009B0000-0x0000000000BA4000-memory.dmp autoit_exe behavioral1/memory/1940-19-0x00000000009B0000-0x0000000000BA4000-memory.dmp autoit_exe behavioral1/memory/1940-29-0x00000000009B0000-0x0000000000BA4000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Shipment For Pickup.exedescription pid process target process PID 1940 set thread context of 2188 1940 Shipment For Pickup.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Shipment For Pickup.exepid process 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegAsm.exepid process 2188 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 2188 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Shipment For Pickup.exepid process 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Shipment For Pickup.exepid process 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe 1940 Shipment For Pickup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Shipment For Pickup.exedescription pid process target process PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe PID 1940 wrote to memory of 2188 1940 Shipment For Pickup.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipment For Pickup.exe"C:\Users\Admin\AppData\Local\Temp\Shipment For Pickup.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2188