Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
6WWUgqjTcGWPAyI.exe
Resource
win7-20240215-en
General
-
Target
6WWUgqjTcGWPAyI.exe
-
Size
697KB
-
MD5
c4c93bc9f72bed159b6b2eba554d9ff9
-
SHA1
5064d1765a61f37b166eccea7747d27e41332c67
-
SHA256
62ce4e89f91a70f82f5a61bf76c4ab592982f761eef609bd7ea7b196f9415e83
-
SHA512
d313f7791c09e47a832d0934a5e8875f580ac05c0d30f90263c4fa7dc6119cc6e34bdd328d2d1761f2fb82b318ebbacd64b656a5082724b4e181edc04290f409
-
SSDEEP
12288:Fi0pei36RcXKEl4qS5e99HNkaMAU7Bv7zB8tbcCt4pJ:FFpp36+6EWRerNTnU7BT2lco4
Malware Config
Extracted
nanocore
1.2.2.0
december2n.duckdns.org:65140
december2nd.ddns.net:65140
899d14c1-6714-492c-b745-3165bff717a5
-
activate_away_mode
false
-
backup_connection_host
december2nd.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2024-02-27T02:16:51.671967236Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
65140
-
default_group
NO GREE
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
899d14c1-6714-492c-b745-3165bff717a5
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
december2n.duckdns.org
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2644 powershell.exe 2564 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Subsystem = "C:\\Program Files (x86)\\DDP Subsystem\\ddpss.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6WWUgqjTcGWPAyI.exedescription pid process target process PID 2028 set thread context of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe -
Drops file in Program Files directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Program Files (x86)\DDP Subsystem\ddpss.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\DDP Subsystem\ddpss.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2428 schtasks.exe 2152 schtasks.exe 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
6WWUgqjTcGWPAyI.exepowershell.exepowershell.exeRegSvcs.exepid process 2028 6WWUgqjTcGWPAyI.exe 2028 6WWUgqjTcGWPAyI.exe 2028 6WWUgqjTcGWPAyI.exe 2028 6WWUgqjTcGWPAyI.exe 2028 6WWUgqjTcGWPAyI.exe 2028 6WWUgqjTcGWPAyI.exe 2028 6WWUgqjTcGWPAyI.exe 2028 6WWUgqjTcGWPAyI.exe 2028 6WWUgqjTcGWPAyI.exe 2564 powershell.exe 2644 powershell.exe 2460 RegSvcs.exe 2460 RegSvcs.exe 2460 RegSvcs.exe 2460 RegSvcs.exe 2460 RegSvcs.exe 2460 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 2460 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
6WWUgqjTcGWPAyI.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2028 6WWUgqjTcGWPAyI.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2460 RegSvcs.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
6WWUgqjTcGWPAyI.exeRegSvcs.exedescription pid process target process PID 2028 wrote to memory of 2644 2028 6WWUgqjTcGWPAyI.exe powershell.exe PID 2028 wrote to memory of 2644 2028 6WWUgqjTcGWPAyI.exe powershell.exe PID 2028 wrote to memory of 2644 2028 6WWUgqjTcGWPAyI.exe powershell.exe PID 2028 wrote to memory of 2644 2028 6WWUgqjTcGWPAyI.exe powershell.exe PID 2028 wrote to memory of 2564 2028 6WWUgqjTcGWPAyI.exe powershell.exe PID 2028 wrote to memory of 2564 2028 6WWUgqjTcGWPAyI.exe powershell.exe PID 2028 wrote to memory of 2564 2028 6WWUgqjTcGWPAyI.exe powershell.exe PID 2028 wrote to memory of 2564 2028 6WWUgqjTcGWPAyI.exe powershell.exe PID 2028 wrote to memory of 2152 2028 6WWUgqjTcGWPAyI.exe schtasks.exe PID 2028 wrote to memory of 2152 2028 6WWUgqjTcGWPAyI.exe schtasks.exe PID 2028 wrote to memory of 2152 2028 6WWUgqjTcGWPAyI.exe schtasks.exe PID 2028 wrote to memory of 2152 2028 6WWUgqjTcGWPAyI.exe schtasks.exe PID 2028 wrote to memory of 2452 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2452 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2452 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2452 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2452 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2452 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2452 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2028 wrote to memory of 2460 2028 6WWUgqjTcGWPAyI.exe RegSvcs.exe PID 2460 wrote to memory of 2844 2460 RegSvcs.exe schtasks.exe PID 2460 wrote to memory of 2844 2460 RegSvcs.exe schtasks.exe PID 2460 wrote to memory of 2844 2460 RegSvcs.exe schtasks.exe PID 2460 wrote to memory of 2844 2460 RegSvcs.exe schtasks.exe PID 2460 wrote to memory of 2428 2460 RegSvcs.exe schtasks.exe PID 2460 wrote to memory of 2428 2460 RegSvcs.exe schtasks.exe PID 2460 wrote to memory of 2428 2460 RegSvcs.exe schtasks.exe PID 2460 wrote to memory of 2428 2460 RegSvcs.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6WWUgqjTcGWPAyI.exe"C:\Users\Admin\AppData\Local\Temp\6WWUgqjTcGWPAyI.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\6WWUgqjTcGWPAyI.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\aJDyPjUKcXvqr.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aJDyPjUKcXvqr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5E27.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp6058.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp60B7.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5E27.tmpFilesize
1KB
MD5b40a9c1d00ae06c3eceea9dd288cef71
SHA12456d1641fd1476d7092b4233abcc0acabd07ab2
SHA256c7502e3c4b044667b6361505b32e756c65986c55be5a0013f7dd5d57852a0617
SHA512f9fd1af9a4aee6f3649d5cb5c1023e47253068263f2ed2089cf9cc2a8239fbe1dcb1e8aaa8a4adcd649fdbaeb7b218a64952c694ca66ed75065beea6854ca7b3
-
C:\Users\Admin\AppData\Local\Temp\tmp6058.tmpFilesize
1KB
MD58cad1b41587ced0f1e74396794f31d58
SHA111054bf74fcf5e8e412768035e4dae43aa7b710f
SHA2563086d914f6b23268f8a12cb1a05516cd5465c2577e1d1e449f1b45c8e5e8f83c
SHA51299c2ef89029de51a866df932841684b7fc912df21e10e2dd0d09e400203bbdc6cba6319a31780b7bf8b286d2cea8ea3fc7d084348bf2f002ab4f5a34218ccbef
-
C:\Users\Admin\AppData\Local\Temp\tmp60B7.tmpFilesize
1KB
MD58e2d5fba24ae8a54087d8e6cadc188c1
SHA1548555025543b4773b8f36301f5fa5003e1c85dc
SHA256f8a3739cca23897792b42a11a21adcce745201fa19f8d84ec66a6e0c5e519759
SHA5129246583d7b08152cd73dc40254013e1ae4b8c93603dbb1f4e6b82624e14b134c59de6c8039b588f14075602768a388121e985f886322ae5fb9ec2eee94d4ea3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5fbc62ff1209b3ace4fca33293fdd96ba
SHA1d9b1a128695e51d8dd1c01ed7384a73e2ef7cf6f
SHA256e6cf943db737782eead9c965cb0c2bc04fb0aee2c6ef28588288367ecf86ffcc
SHA512e35540aee01f02202f0698ad1070719e91859bad6f20792ba28a6c76116f7785f8d8b2c8b3c1f8f720a634c14e30c13ae4fa31e235af59fba821389f2495309c
-
memory/2028-31-0x00000000749A0000-0x000000007508E000-memory.dmpFilesize
6.9MB
-
memory/2028-1-0x0000000001100000-0x00000000011B4000-memory.dmpFilesize
720KB
-
memory/2028-2-0x00000000749A0000-0x000000007508E000-memory.dmpFilesize
6.9MB
-
memory/2028-3-0x0000000000680000-0x00000000006A2000-memory.dmpFilesize
136KB
-
memory/2028-4-0x00000000005C0000-0x00000000005CC000-memory.dmpFilesize
48KB
-
memory/2028-5-0x0000000000420000-0x0000000000430000-memory.dmpFilesize
64KB
-
memory/2028-6-0x0000000005E20000-0x0000000005E9C000-memory.dmpFilesize
496KB
-
memory/2028-0-0x00000000749AE000-0x00000000749AF000-memory.dmpFilesize
4KB
-
memory/2460-19-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2460-42-0x0000000000800000-0x000000000080A000-memory.dmpFilesize
40KB
-
memory/2460-29-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2460-28-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2460-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2460-23-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2460-25-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2460-21-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2460-39-0x0000000000600000-0x000000000060A000-memory.dmpFilesize
40KB
-
memory/2460-40-0x0000000000610000-0x000000000061C000-memory.dmpFilesize
48KB
-
memory/2460-41-0x0000000000620000-0x000000000063E000-memory.dmpFilesize
120KB
-
memory/2460-30-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2460-46-0x0000000000A00000-0x0000000000A1A000-memory.dmpFilesize
104KB
-
memory/2460-45-0x0000000000820000-0x0000000000832000-memory.dmpFilesize
72KB
-
memory/2460-48-0x0000000000BD0000-0x0000000000BE2000-memory.dmpFilesize
72KB
-
memory/2460-47-0x0000000000AB0000-0x0000000000ABE000-memory.dmpFilesize
56KB
-
memory/2460-49-0x0000000000BE0000-0x0000000000BEE000-memory.dmpFilesize
56KB
-
memory/2460-50-0x0000000000BF0000-0x0000000000BFC000-memory.dmpFilesize
48KB
-
memory/2460-51-0x0000000000C00000-0x0000000000C14000-memory.dmpFilesize
80KB
-
memory/2460-52-0x0000000002140000-0x0000000002150000-memory.dmpFilesize
64KB
-
memory/2460-53-0x0000000002150000-0x0000000002164000-memory.dmpFilesize
80KB
-
memory/2460-55-0x0000000004780000-0x00000000047AE000-memory.dmpFilesize
184KB
-
memory/2460-54-0x00000000042B0000-0x00000000042BE000-memory.dmpFilesize
56KB
-
memory/2460-56-0x00000000046E0000-0x00000000046F4000-memory.dmpFilesize
80KB