Malware Analysis Report

2024-08-06 14:46

Sample ID 240617-l74qyawdkh
Target database.exe
SHA256 b028ad09ac9caf249787f0e4963521577fe73e6c586ebef9684cd2ae2125f536
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b028ad09ac9caf249787f0e4963521577fe73e6c586ebef9684cd2ae2125f536

Threat Level: Known bad

The file database.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

Nanocore family

NanoCore

Adds Run key to start application

Checks whether UAC is enabled

Drops file in Program Files directory

Unsigned PE

Kills process with taskkill

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Runs ping.exe

Creates scheduled task(s)

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-17 10:11

Signatures

Nanocore family

nanocore

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-17 10:11

Reported

2024-06-17 10:12

Platform

win10-20240404-en

Max time kernel

51s

Max time network

53s

Command Line

"C:\Users\Admin\AppData\Local\Temp\database.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsvc.exe" C:\Users\Admin\AppData\Local\Temp\database.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\database.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DHCP Service\dhcpsvc.exe C:\Users\Admin\AppData\Local\Temp\database.exe N/A
File opened for modification C:\Program Files (x86)\DHCP Service\dhcpsvc.exe C:\Users\Admin\AppData\Local\Temp\database.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\database.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\database.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\database.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4240 wrote to memory of 4936 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 4936 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 4936 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\schtasks.exe
PID 4240 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\cmd.exe
PID 4240 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\cmd.exe
PID 4240 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\database.exe C:\Windows\SysWOW64\cmd.exe
PID 4008 wrote to memory of 1244 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 4008 wrote to memory of 1244 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 4008 wrote to memory of 1244 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 4008 wrote to memory of 3324 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 4008 wrote to memory of 3324 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 4008 wrote to memory of 3324 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\database.exe

"C:\Users\Admin\AppData\Local\Temp\database.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp60FC.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp613B.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /delete /f /tn "DHCP Service"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /delete /f /tn "DHCP Service Task"

C:\Windows\SysWOW64\cmd.exe

"cmd.exe" /C taskkill /f /im "database.exe" & ping -n 1 -w 3000 1.1.1.1 & type nul > "C:\Users\Admin\AppData\Local\Temp\database.exe" & del /f /q "C:\Users\Admin\AppData\Local\Temp\database.exe"

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im "database.exe"

C:\Windows\SysWOW64\PING.EXE

ping -n 1 -w 3000 1.1.1.1

Network

Country Destination Domain Proto
US 8.8.8.8:53 local-quote.gl.at.ply.gg udp
US 147.185.221.20:26704 local-quote.gl.at.ply.gg tcp
US 8.8.8.8:53 20.221.185.147.in-addr.arpa udp
US 8.8.8.8:53 local-quote.gl.at.ply.gg udp
US 147.185.221.20:26704 local-quote.gl.at.ply.gg tcp

Files

memory/4240-0-0x0000000073FA1000-0x0000000073FA2000-memory.dmp

memory/4240-1-0x0000000073FA0000-0x0000000074550000-memory.dmp

memory/4240-2-0x0000000073FA0000-0x0000000074550000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp60FC.tmp

MD5 f487f9c5a10df7c8c6d9e3bececd3b2f
SHA1 878846af520dc46c5e745849e6d9f78380871315
SHA256 310d758eeac0a5b4128a03f16e25d46b8aa030f2d7b4643b80c6c8ccddecc684
SHA512 3fbf32d2bea237fea3201732eed904b223acaea64c8f0294b55725a3ef60f40417092754daf91cb6f423cdfeb5686055f51b91339d99422e500c8e8bb5786204

C:\Users\Admin\AppData\Local\Temp\tmp613B.tmp

MD5 7f4b37265a0a4b0fea67999d11d911e8
SHA1 1b8e13e6a27c3768c30cf713b79eaa8a757e1349
SHA256 39b16b3a00b6b43c6820357127228c0768a577153014ce7b0ea3c585244dc08b
SHA512 ef97ccfb663555aedc7fdc4b3ac4cd6536c80a778b4ec3bc6124a09544733988de1dac1e6a3714b0d6e8713e3523e0732d5dfcf674f2c5e1f3eadacb0c8e5e03

memory/4240-10-0x0000000073FA0000-0x0000000074550000-memory.dmp

memory/4240-21-0x0000000073FA0000-0x0000000074550000-memory.dmp