Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
Cracking tutorial/Kidux Leecher v1.0.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cracking tutorial/Kidux Leecher v1.0.1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Cracking tutorial/Spotify Checker.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Cracking tutorial/Spotify Checker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Kidux Proxy Scraper v1.0.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Kidux Proxy Scraper v1.0.1.exe
Resource
win10v2004-20240426-en
General
-
Target
Cracking tutorial/Spotify Checker.exe
-
Size
5.4MB
-
MD5
1481c5c586484f3d5247cde3b1cc63a5
-
SHA1
25ef72d31ac28b95f5709c67e9058d729804ccea
-
SHA256
d84b13737ed85eec8262144d55f9b913dd6c495173a09b92f4729c0313bdf5bc
-
SHA512
3ce947a536ef00096376a45bc627c6c4f8b869456ed2e071ed55f1e21e959e52ee4348d60f01e527911bac2ebd2763b6c8edbd1cc431f39cfd39b305cb1ce340
-
SSDEEP
98304:YAJ+av4amuhNMcNucJu/n/HlxGIiT3MxGg0:nk4mAMcP4/hIw
Malware Config
Extracted
nanocore
1.2.2.0
174.0.39.108:3630
127.0.0.1:3630
c6590fee-559c-4f07-930c-03e097f82346
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-02-07T23:45:22.900084736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
3630
-
default_group
CLIENTS
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
c6590fee-559c-4f07-930c-03e097f82346
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
174.0.39.108
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
50
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Spotify.exepid process 2652 Spotify.exe -
Loads dropped DLL 1 IoCs
Processes:
Spotify Checker.exepid process 3032 Spotify Checker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Spotify Checker.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Subsystem = "C:\\Program Files (x86)\\DDP Subsystem\\ddpss.exe" Spotify Checker.exe -
Processes:
Spotify Checker.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Spotify Checker.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Spotify Checker.exedescription pid process target process PID 3032 set thread context of 2572 3032 Spotify Checker.exe Spotify Checker.exe -
Drops file in Program Files directory 2 IoCs
Processes:
Spotify Checker.exedescription ioc process File created C:\Program Files (x86)\DDP Subsystem\ddpss.exe Spotify Checker.exe File opened for modification C:\Program Files (x86)\DDP Subsystem\ddpss.exe Spotify Checker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Spotify Checker.exeSpotify Checker.exepid process 3032 Spotify Checker.exe 3032 Spotify Checker.exe 3032 Spotify Checker.exe 3032 Spotify Checker.exe 3032 Spotify Checker.exe 2572 Spotify Checker.exe 2572 Spotify Checker.exe 2572 Spotify Checker.exe 2572 Spotify Checker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Spotify Checker.exepid process 2572 Spotify Checker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Spotify Checker.exeSpotify Checker.exedescription pid process Token: SeDebugPrivilege 3032 Spotify Checker.exe Token: SeDebugPrivilege 2572 Spotify Checker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Spotify.exepid process 2652 Spotify.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Spotify Checker.exedescription pid process target process PID 3032 wrote to memory of 2652 3032 Spotify Checker.exe Spotify.exe PID 3032 wrote to memory of 2652 3032 Spotify Checker.exe Spotify.exe PID 3032 wrote to memory of 2652 3032 Spotify Checker.exe Spotify.exe PID 3032 wrote to memory of 2652 3032 Spotify Checker.exe Spotify.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe PID 3032 wrote to memory of 2572 3032 Spotify Checker.exe Spotify Checker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cracking tutorial\Spotify Checker.exe"C:\Users\Admin\AppData\Local\Temp\Cracking tutorial\Spotify Checker.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Spotify.exe"C:\Users\Admin\AppData\Local\Temp\Spotify.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Cracking tutorial\Spotify Checker.exe"C:\Users\Admin\AppData\Local\Temp\Cracking tutorial\Spotify Checker.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\Spotify.exeFilesize
5.1MB
MD50c1f43bd9162c8b774d69a8582718d21
SHA1ad820ae823a02981eafccac9c1f4b290188b292f
SHA256c532533100d63d221440c9a29929c8850f4c154fabba701efd1c9b5ba526f1ac
SHA512670279317e914702371cf2b27016b132c518d94099829e60fe30b558eff8b196af9d0ab51f78e650476ef833e0740b273fce0b2616213e05b359fcf2fa372300
-
memory/2572-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2572-26-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2572-17-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2572-28-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2572-24-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2572-36-0x0000000002520000-0x0000000002560000-memory.dmpFilesize
256KB
-
memory/2572-29-0x0000000002520000-0x0000000002560000-memory.dmpFilesize
256KB
-
memory/2572-18-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2572-20-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2572-16-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2652-10-0x0000000000390000-0x00000000003E9000-memory.dmpFilesize
356KB
-
memory/2652-9-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2652-15-0x0000000000390000-0x00000000003E9000-memory.dmpFilesize
356KB
-
memory/2652-14-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2652-34-0x0000000000400000-0x0000000000930000-memory.dmpFilesize
5.2MB
-
memory/2652-11-0x0000000000400000-0x0000000000930000-memory.dmpFilesize
5.2MB
-
memory/3032-2-0x0000000074A90000-0x000000007503B000-memory.dmpFilesize
5.7MB
-
memory/3032-1-0x0000000074A90000-0x000000007503B000-memory.dmpFilesize
5.7MB
-
memory/3032-0-0x0000000074A91000-0x0000000074A92000-memory.dmpFilesize
4KB
-
memory/3032-12-0x0000000074A90000-0x000000007503B000-memory.dmpFilesize
5.7MB
-
memory/3032-33-0x0000000074A90000-0x000000007503B000-memory.dmpFilesize
5.7MB