Malware Analysis Report

2024-08-06 15:23

Sample ID 240521-b34v2aee3y
Target MB263350411AE.exe
SHA256 88cb52ac93a1552b61addb60481cacb4fbf6dee7f8d307ff87009e38b8e30088
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

88cb52ac93a1552b61addb60481cacb4fbf6dee7f8d307ff87009e38b8e30088

Threat Level: Known bad

The file MB263350411AE.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Checks whether UAC is enabled

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Program Files directory

Unsigned PE

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-21 01:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 01:41

Reported

2024-05-21 01:43

Platform

win7-20231129-en

Max time kernel

118s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Service = "C:\\Program Files (x86)\\TCP Service\\tcpsv.exe" C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3060 set thread context of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\TCP Service\tcpsv.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A
File opened for modification C:\Program Files (x86)\TCP Service\tcpsv.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3060 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2988 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2988 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2988 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2988 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2988 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2988 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2988 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2988 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4911.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4A2B.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 xpwarzonlin2.ddns.net udp
LV 109.248.151.181:1996 xpwarzonlin2.ddns.net tcp

Files

memory/3060-0-0x000000007498E000-0x000000007498F000-memory.dmp

memory/3060-1-0x0000000000AA0000-0x0000000000B42000-memory.dmp

memory/3060-2-0x0000000074980000-0x000000007506E000-memory.dmp

memory/3060-3-0x0000000000700000-0x000000000071A000-memory.dmp

memory/3060-4-0x00000000004D0000-0x00000000004E0000-memory.dmp

memory/3060-5-0x0000000004950000-0x00000000049CA000-memory.dmp

memory/2988-7-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2988-8-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2988-15-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2988-20-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2988-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2988-12-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2988-10-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2988-21-0x0000000074980000-0x000000007506E000-memory.dmp

memory/2988-17-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2988-22-0x0000000074980000-0x000000007506E000-memory.dmp

memory/3060-23-0x0000000074980000-0x000000007506E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp4911.tmp

MD5 7c43147ac70e592d3acc3e6a27111053
SHA1 53748eb6ebe48adbd036a6ba50bbcaaec652679e
SHA256 23cab1d670839621ad7bf4d674ec424692d8c35f5a377ee8ff8860f64a920f7f
SHA512 e3c480ef85d8cf7f1f5239b93f69202fd95efc3852cf9e1d69555abb17f7fab2f213626af564507cc55c0f573587ebd1137e099b859df7cfee7a37b9326bcf63

C:\Users\Admin\AppData\Local\Temp\tmp4A2B.tmp

MD5 93fc3117767507c9889abd12dc667d22
SHA1 1096e4cfa0c35756e3c3fb866c1e4c1e59115df9
SHA256 684997dd4ce15031cec8f2f93933b1d41d7bf5cbbff655dd64377b07055c449a
SHA512 e403348ee77bd3e7c45245dd5dae81c3ea130d5cf342f630982772ce5f75548b292013480e2831d68cf51349b64afde4589d4eec94b567d20f0a01e3b9549bdc

memory/2988-31-0x0000000000440000-0x000000000044A000-memory.dmp

memory/2988-32-0x0000000000450000-0x000000000046E000-memory.dmp

memory/2988-33-0x00000000004B0000-0x00000000004BA000-memory.dmp

memory/2988-36-0x00000000005E0000-0x00000000005F2000-memory.dmp

memory/2988-37-0x00000000005F0000-0x000000000060A000-memory.dmp

memory/2988-38-0x00000000006A0000-0x00000000006AE000-memory.dmp

memory/2988-40-0x00000000009A0000-0x00000000009AE000-memory.dmp

memory/2988-39-0x0000000000700000-0x0000000000712000-memory.dmp

memory/2988-41-0x00000000009B0000-0x00000000009BC000-memory.dmp

memory/2988-42-0x0000000000A70000-0x0000000000A84000-memory.dmp

memory/2988-43-0x0000000000A80000-0x0000000000A90000-memory.dmp

memory/2988-44-0x0000000000A90000-0x0000000000AA4000-memory.dmp

memory/2988-45-0x00000000021C0000-0x00000000021CE000-memory.dmp

memory/2988-46-0x0000000004430000-0x000000000445E000-memory.dmp

memory/2988-47-0x0000000002320000-0x0000000002334000-memory.dmp

memory/2988-49-0x0000000074980000-0x000000007506E000-memory.dmp

memory/2988-50-0x0000000074980000-0x000000007506E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-21 01:41

Reported

2024-05-21 01:43

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

157s

Command Line

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AGP Service = "C:\\Program Files (x86)\\AGP Service\\agpsv.exe" C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2796 set thread context of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\AGP Service\agpsv.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A
File opened for modification C:\Program Files (x86)\AGP Service\agpsv.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2796 wrote to memory of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2796 wrote to memory of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2796 wrote to memory of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2796 wrote to memory of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2796 wrote to memory of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2796 wrote to memory of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2796 wrote to memory of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2796 wrote to memory of 3000 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 3000 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 3000 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 3000 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 3000 wrote to memory of 1816 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 3000 wrote to memory of 1816 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 3000 wrote to memory of 1816 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "AGP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7F61.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "AGP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp802D.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 xpwarzonlin2.ddns.net udp
LV 109.248.151.181:1996 xpwarzonlin2.ddns.net tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 181.151.248.109.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 52.111.229.43:443 tcp

Files

memory/2796-0-0x000000007464E000-0x000000007464F000-memory.dmp

memory/2796-1-0x0000000000A10000-0x0000000000AB2000-memory.dmp

memory/2796-2-0x00000000059C0000-0x0000000005F64000-memory.dmp

memory/2796-3-0x00000000054B0000-0x0000000005542000-memory.dmp

memory/2796-4-0x0000000005640000-0x000000000564A000-memory.dmp

memory/2796-5-0x0000000005740000-0x00000000057DC000-memory.dmp

memory/2796-6-0x0000000074640000-0x0000000074DF0000-memory.dmp

memory/2796-7-0x0000000005980000-0x000000000599A000-memory.dmp

memory/2796-8-0x00000000059A0000-0x00000000059B0000-memory.dmp

memory/2796-9-0x0000000006EA0000-0x0000000006F1A000-memory.dmp

memory/3000-10-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MB263350411AE.exe.log

MD5 8ec831f3e3a3f77e4a7b9cd32b48384c
SHA1 d83f09fd87c5bd86e045873c231c14836e76a05c
SHA256 7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA512 26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

memory/3000-13-0x0000000074640000-0x0000000074DF0000-memory.dmp

memory/2796-14-0x0000000074640000-0x0000000074DF0000-memory.dmp

memory/3000-15-0x0000000074640000-0x0000000074DF0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp7F61.tmp

MD5 7c43147ac70e592d3acc3e6a27111053
SHA1 53748eb6ebe48adbd036a6ba50bbcaaec652679e
SHA256 23cab1d670839621ad7bf4d674ec424692d8c35f5a377ee8ff8860f64a920f7f
SHA512 e3c480ef85d8cf7f1f5239b93f69202fd95efc3852cf9e1d69555abb17f7fab2f213626af564507cc55c0f573587ebd1137e099b859df7cfee7a37b9326bcf63

C:\Users\Admin\AppData\Local\Temp\tmp802D.tmp

MD5 7a81ae69c04c8d95261eb5f490b7f869
SHA1 9f4f484d306fea15b2e7f9f16db660833bb1f8ce
SHA256 ce3933e772f663a834335cc2071e5e7b2d49a065b51d84a259054b8ef663e785
SHA512 8260ab83106752a488e164bbed63ef334d34399bc9a5c09a0cfceba6aef48eafe5c64e4dfbd353ac3edfff2523b16c2b0287d34833a293c4436e068fae656de8

memory/3000-23-0x0000000004F50000-0x0000000004F5A000-memory.dmp

memory/3000-24-0x00000000050A0000-0x00000000050BE000-memory.dmp

memory/3000-25-0x0000000006040000-0x000000000604A000-memory.dmp

memory/3000-28-0x00000000067A0000-0x00000000067B2000-memory.dmp

memory/3000-29-0x00000000067B0000-0x00000000067CA000-memory.dmp

memory/3000-30-0x00000000067E0000-0x00000000067EE000-memory.dmp

memory/3000-33-0x0000000006810000-0x000000000681C000-memory.dmp

memory/3000-32-0x0000000006800000-0x000000000680E000-memory.dmp

memory/3000-34-0x0000000006820000-0x0000000006834000-memory.dmp

memory/3000-31-0x00000000067F0000-0x0000000006802000-memory.dmp

memory/3000-35-0x0000000006830000-0x0000000006840000-memory.dmp

memory/3000-36-0x0000000006850000-0x0000000006864000-memory.dmp

memory/3000-37-0x0000000006870000-0x000000000687E000-memory.dmp

memory/3000-38-0x00000000069C0000-0x00000000069EE000-memory.dmp

memory/3000-39-0x0000000006A00000-0x0000000006A14000-memory.dmp

memory/3000-40-0x0000000006AA0000-0x0000000006B06000-memory.dmp

memory/3000-42-0x0000000074640000-0x0000000074DF0000-memory.dmp

memory/3000-43-0x0000000074640000-0x0000000074DF0000-memory.dmp