Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 09:12
Static task
static1
Behavioral task
behavioral1
Sample
shipping document.exe
Resource
win7-20240508-en
General
-
Target
shipping document.exe
-
Size
258KB
-
MD5
612dbb3e0e9540bd711321f239e6ae59
-
SHA1
2f3f519aa1dda89459173f4d4df7b1a9edeb545f
-
SHA256
68035b3c8c61cb3fd66d50c97af1167418e84d169aa6424364d1effa09598497
-
SHA512
c8358bc80ba266e6ea7369ae29251e7d6ed30eb83ba1ed28b0369cd2bd7f515373eab55838194ac0e12095c4c4359237ba359d3a2f8cbd3f5b1a3feda4b4edaf
-
SSDEEP
6144:DT9Tn0sHnkKY3gJ3oQrU3gFE4qt2/gMq0f06:DRT0sHi3g/IgqZ2/J
Malware Config
Extracted
nanocore
1.2.2.0
dengsman.duckdns.org:30201
127.0.0.1:30201
68929715-1cd3-418e-9481-b31bf6322d48
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
37.235.1.177
-
buffer_size
65535
-
build_time
2018-04-15T16:24:33.310279636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
30201
-
default_group
dengs
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
68929715-1cd3-418e-9481-b31bf6322d48
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
dengsman.duckdns.org
-
primary_dns_server
37.235.1.174
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
tmp.exesvhost.exepid process 2064 tmp.exe 2648 svhost.exe -
Loads dropped DLL 4 IoCs
Processes:
shipping document.exepid process 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe -
Unexpected DNS network traffic destination 7 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 37.235.1.174 Destination IP 37.235.1.174 Destination IP 37.235.1.177 Destination IP 37.235.1.177 Destination IP 37.235.1.174 Destination IP 37.235.1.174 Destination IP 37.235.1.177 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ARP Host = "C:\\Program Files (x86)\\ARP Host\\arphost.exe" tmp.exe -
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
shipping document.exedescription pid process target process PID 616 set thread context of 2648 616 shipping document.exe svhost.exe -
Drops file in Program Files directory 2 IoCs
Processes:
tmp.exedescription ioc process File created C:\Program Files (x86)\ARP Host\arphost.exe tmp.exe File opened for modification C:\Program Files (x86)\ARP Host\arphost.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\FolderN\vname.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
shipping document.exetmp.exepid process 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe 2064 tmp.exe 2064 tmp.exe 2064 tmp.exe 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe 616 shipping document.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
tmp.exepid process 2064 tmp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
shipping document.exetmp.exedescription pid process Token: SeDebugPrivilege 616 shipping document.exe Token: 33 616 shipping document.exe Token: SeIncBasePriorityPrivilege 616 shipping document.exe Token: SeDebugPrivilege 2064 tmp.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
shipping document.execmd.exedescription pid process target process PID 616 wrote to memory of 1804 616 shipping document.exe cmd.exe PID 616 wrote to memory of 1804 616 shipping document.exe cmd.exe PID 616 wrote to memory of 1804 616 shipping document.exe cmd.exe PID 616 wrote to memory of 1804 616 shipping document.exe cmd.exe PID 1804 wrote to memory of 2800 1804 cmd.exe reg.exe PID 1804 wrote to memory of 2800 1804 cmd.exe reg.exe PID 1804 wrote to memory of 2800 1804 cmd.exe reg.exe PID 1804 wrote to memory of 2800 1804 cmd.exe reg.exe PID 616 wrote to memory of 2064 616 shipping document.exe tmp.exe PID 616 wrote to memory of 2064 616 shipping document.exe tmp.exe PID 616 wrote to memory of 2064 616 shipping document.exe tmp.exe PID 616 wrote to memory of 2064 616 shipping document.exe tmp.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe PID 616 wrote to memory of 2648 616 shipping document.exe svhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\shipping document.exe"C:\Users\Admin\AppData\Local\Temp\shipping document.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\vname.exe.lnk" /f3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\FolderN\vname.exeFilesize
258KB
MD5612dbb3e0e9540bd711321f239e6ae59
SHA12f3f519aa1dda89459173f4d4df7b1a9edeb545f
SHA25668035b3c8c61cb3fd66d50c97af1167418e84d169aa6424364d1effa09598497
SHA512c8358bc80ba266e6ea7369ae29251e7d6ed30eb83ba1ed28b0369cd2bd7f515373eab55838194ac0e12095c4c4359237ba359d3a2f8cbd3f5b1a3feda4b4edaf
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
85KB
MD52e5f1cf69f92392f8829fc9c9263ae9b
SHA197b9ca766bbbdaa8c9ec960dc41b598f7fad82a5
SHA25651985a57e085d8b17042f0cdc1f905380b792854733eb3275fd8fce4e3bb886b
SHA512f7e096dd9d0fa3a3c04c01bf229c4b344798a4c8b7b848588c1d78cb9fadfa9b1d0fd53c1fe74d191d5561e9eb551a4a3fc918363f119ea60024dd3d67c83883
-
\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
202KB
MD5780148d708a0dc38f4236938077bd24b
SHA1a48c8e96c1138f01ffcbe32c0bc9c8fd455d5398
SHA2561f71343d779b3d212243a90fc59658406b53a05b5f34fecb7bda4d6d36a2b713
SHA51254840659439f2acfecf07af7a0a3fcf928537a1b7fea40dbfd11d31d4903ebe2df86a14dd33ada78b5f3e1961bb7bca7bafd9e512abd60f0e0f8233b607964bb
-
memory/616-1-0x0000000074080000-0x000000007462B000-memory.dmpFilesize
5.7MB
-
memory/616-2-0x0000000074080000-0x000000007462B000-memory.dmpFilesize
5.7MB
-
memory/616-48-0x0000000074080000-0x000000007462B000-memory.dmpFilesize
5.7MB
-
memory/616-0-0x0000000074081000-0x0000000074082000-memory.dmpFilesize
4KB
-
memory/2064-45-0x0000000074080000-0x000000007462B000-memory.dmpFilesize
5.7MB
-
memory/2064-44-0x0000000074080000-0x000000007462B000-memory.dmpFilesize
5.7MB
-
memory/2064-23-0x0000000074080000-0x000000007462B000-memory.dmpFilesize
5.7MB
-
memory/2064-49-0x0000000074080000-0x000000007462B000-memory.dmpFilesize
5.7MB
-
memory/2648-42-0x0000000000080000-0x00000000000B8000-memory.dmpFilesize
224KB
-
memory/2648-39-0x0000000000080000-0x00000000000B8000-memory.dmpFilesize
224KB
-
memory/2648-35-0x0000000000080000-0x00000000000B8000-memory.dmpFilesize
224KB
-
memory/2648-24-0x0000000000080000-0x00000000000B8000-memory.dmpFilesize
224KB
-
memory/2648-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2648-30-0x0000000000080000-0x00000000000B8000-memory.dmpFilesize
224KB
-
memory/2648-28-0x0000000000080000-0x00000000000B8000-memory.dmpFilesize
224KB
-
memory/2648-26-0x0000000000080000-0x00000000000B8000-memory.dmpFilesize
224KB