Malware Analysis Report

2024-08-06 15:23

Sample ID 240521-b5cjkaee7w
Target MB263350411AE.exe
SHA256 88cb52ac93a1552b61addb60481cacb4fbf6dee7f8d307ff87009e38b8e30088
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

88cb52ac93a1552b61addb60481cacb4fbf6dee7f8d307ff87009e38b8e30088

Threat Level: Known bad

The file MB263350411AE.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Adds Run key to start application

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Drops file in Program Files directory

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-21 01:43

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 01:43

Reported

2024-05-21 01:45

Platform

win7-20240221-en

Max time kernel

118s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Service = "C:\\Program Files (x86)\\DDP Service\\ddpsv.exe" C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 848 set thread context of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DDP Service\ddpsv.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A
File opened for modification C:\Program Files (x86)\DDP Service\ddpsv.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 848 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 848 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 2856 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2856 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2856 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2856 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2856 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2856 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2856 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 2856 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmpCB6A.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpCD5E.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 xpwarzonlin2.ddns.net udp
LV 109.248.151.181:1996 xpwarzonlin2.ddns.net tcp

Files

memory/848-0-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

memory/848-1-0x00000000000F0000-0x0000000000192000-memory.dmp

memory/848-2-0x0000000074A00000-0x00000000750EE000-memory.dmp

memory/848-3-0x0000000000490000-0x00000000004AA000-memory.dmp

memory/848-4-0x0000000000400000-0x0000000000410000-memory.dmp

memory/848-5-0x0000000005320000-0x000000000539A000-memory.dmp

memory/2856-6-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2856-8-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2856-18-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2856-10-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2856-14-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2856-16-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2856-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2856-11-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2856-19-0x0000000074A00000-0x00000000750EE000-memory.dmp

memory/2856-20-0x0000000074A00000-0x00000000750EE000-memory.dmp

memory/848-21-0x0000000074A00000-0x00000000750EE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpCB6A.tmp

MD5 7c43147ac70e592d3acc3e6a27111053
SHA1 53748eb6ebe48adbd036a6ba50bbcaaec652679e
SHA256 23cab1d670839621ad7bf4d674ec424692d8c35f5a377ee8ff8860f64a920f7f
SHA512 e3c480ef85d8cf7f1f5239b93f69202fd95efc3852cf9e1d69555abb17f7fab2f213626af564507cc55c0f573587ebd1137e099b859df7cfee7a37b9326bcf63

C:\Users\Admin\AppData\Local\Temp\tmpCD5E.tmp

MD5 93d357e6194c8eb8d0616a9f592cc4bf
SHA1 5cc3a3d95d82cb88f65cb6dc6c188595fa272808
SHA256 a18de0ef2102d2546c7afd07ad1d7a071a0e59aff0868cf3937a145f24feb713
SHA512 4df079387f6a76e0deb96ab4c11f6cffa62a8b42dc4970e885dab10351fade2d9e933663c141b76409657f85f1bf9dbb533d92dce52dc62598aafc4793743f7f

memory/2856-29-0x00000000003F0000-0x00000000003FA000-memory.dmp

memory/2856-30-0x00000000004D0000-0x00000000004EE000-memory.dmp

memory/2856-31-0x0000000000440000-0x000000000044A000-memory.dmp

memory/2856-34-0x0000000000730000-0x0000000000742000-memory.dmp

memory/2856-35-0x0000000000740000-0x000000000075A000-memory.dmp

memory/2856-36-0x0000000000770000-0x000000000077E000-memory.dmp

memory/2856-37-0x0000000000890000-0x00000000008A2000-memory.dmp

memory/2856-38-0x00000000008A0000-0x00000000008AE000-memory.dmp

memory/2856-39-0x00000000009B0000-0x00000000009BC000-memory.dmp

memory/2856-40-0x0000000002280000-0x0000000002294000-memory.dmp

memory/2856-41-0x00000000022D0000-0x00000000022E0000-memory.dmp

memory/2856-42-0x00000000022E0000-0x00000000022F4000-memory.dmp

memory/2856-43-0x00000000022F0000-0x00000000022FE000-memory.dmp

memory/2856-44-0x00000000043E0000-0x000000000440E000-memory.dmp

memory/2856-45-0x0000000004390000-0x00000000043A4000-memory.dmp

memory/2856-47-0x0000000074A00000-0x00000000750EE000-memory.dmp

memory/2856-48-0x0000000074A00000-0x00000000750EE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-21 01:43

Reported

2024-05-21 01:45

Platform

win10v2004-20240508-en

Max time kernel

136s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsv.exe" C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1124 set thread context of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\DHCP Service\dhcpsv.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A
File created C:\Program Files (x86)\DHCP Service\dhcpsv.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1124 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 1124 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 1124 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 1124 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 1124 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 1124 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 1124 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 1124 wrote to memory of 4212 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe
PID 4212 wrote to memory of 2080 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 4212 wrote to memory of 2080 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 4212 wrote to memory of 2080 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 4212 wrote to memory of 5760 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 4212 wrote to memory of 5760 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe
PID 4212 wrote to memory of 5760 N/A C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe

"C:\Users\Admin\AppData\Local\Temp\MB263350411AE.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7705.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7754.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 xpwarzonlin2.ddns.net udp
LV 109.248.151.181:1996 xpwarzonlin2.ddns.net tcp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 181.151.248.109.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/1124-0-0x000000007486E000-0x000000007486F000-memory.dmp

memory/1124-1-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/1124-2-0x0000000005350000-0x00000000058F4000-memory.dmp

memory/1124-3-0x0000000004DA0000-0x0000000004E32000-memory.dmp

memory/1124-5-0x0000000004D60000-0x0000000004D6A000-memory.dmp

memory/1124-4-0x0000000074860000-0x0000000075010000-memory.dmp

memory/1124-6-0x0000000005000000-0x000000000509C000-memory.dmp

memory/1124-7-0x0000000006470000-0x000000000648A000-memory.dmp

memory/1124-8-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/1124-9-0x00000000062D0000-0x000000000634A000-memory.dmp

memory/4212-10-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MB263350411AE.exe.log

MD5 8ec831f3e3a3f77e4a7b9cd32b48384c
SHA1 d83f09fd87c5bd86e045873c231c14836e76a05c
SHA256 7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA512 26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

memory/4212-13-0x0000000074860000-0x0000000075010000-memory.dmp

memory/1124-14-0x0000000074860000-0x0000000075010000-memory.dmp

memory/4212-15-0x0000000074860000-0x0000000075010000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp7705.tmp

MD5 7c43147ac70e592d3acc3e6a27111053
SHA1 53748eb6ebe48adbd036a6ba50bbcaaec652679e
SHA256 23cab1d670839621ad7bf4d674ec424692d8c35f5a377ee8ff8860f64a920f7f
SHA512 e3c480ef85d8cf7f1f5239b93f69202fd95efc3852cf9e1d69555abb17f7fab2f213626af564507cc55c0f573587ebd1137e099b859df7cfee7a37b9326bcf63

C:\Users\Admin\AppData\Local\Temp\tmp7754.tmp

MD5 a77c223a0fc492dccd6fb9975f7a8766
SHA1 5e813636ae9b8138d78919348a5da3a6e8bd74b5
SHA256 589df7325d42409c50827600fedb240171ee4bdab85916474a37800c2382829e
SHA512 315cea8fde3c594404f5d3c96c710af1214cff6d08ccdb40634a739e108ff810e02624735a2b8c3e3720157b4a55327f317c3c23c3a681b46b9ab0f19060f7c0

memory/4212-23-0x00000000051B0000-0x00000000051BA000-memory.dmp

memory/4212-24-0x00000000062A0000-0x00000000062BE000-memory.dmp

memory/4212-25-0x00000000063D0000-0x00000000063DA000-memory.dmp

memory/4212-28-0x0000000006B30000-0x0000000006B42000-memory.dmp

memory/4212-29-0x0000000006B40000-0x0000000006B5A000-memory.dmp

memory/4212-30-0x0000000006B70000-0x0000000006B7E000-memory.dmp

memory/4212-33-0x0000000006BA0000-0x0000000006BAC000-memory.dmp

memory/4212-32-0x0000000006B90000-0x0000000006B9E000-memory.dmp

memory/4212-34-0x0000000006BB0000-0x0000000006BC4000-memory.dmp

memory/4212-31-0x0000000006B80000-0x0000000006B92000-memory.dmp

memory/4212-35-0x0000000006BC0000-0x0000000006BD0000-memory.dmp

memory/4212-36-0x0000000006BE0000-0x0000000006BF4000-memory.dmp

memory/4212-37-0x0000000006C00000-0x0000000006C0E000-memory.dmp

memory/4212-38-0x0000000006C10000-0x0000000006C3E000-memory.dmp

memory/4212-39-0x0000000006C50000-0x0000000006C64000-memory.dmp

memory/4212-40-0x0000000006E20000-0x0000000006E86000-memory.dmp

memory/4212-42-0x0000000074860000-0x0000000075010000-memory.dmp

memory/4212-43-0x0000000074860000-0x0000000075010000-memory.dmp