Malware Analysis Report

2024-08-06 14:45

Sample ID 240623-qal7vavfjn
Target sd.exe
SHA256 1be5176e2bdc3b3434e8dc95c902e0cfaaaf7a23fc8203b413effc121011ad30
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1be5176e2bdc3b3434e8dc95c902e0cfaaaf7a23fc8203b413effc121011ad30

Threat Level: Known bad

The file sd.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

Nanocore family

NanoCore

Adds Run key to start application

Checks whether UAC is enabled

Drops file in Program Files directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious behavior: GetForegroundWindowSpam

Scheduled Task/Job: Scheduled Task

Suspicious use of AdjustPrivilegeToken

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-23 13:03

Signatures

Nanocore family

nanocore

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-23 13:03

Reported

2024-06-23 13:06

Platform

win7-20240220-en

Max time kernel

127s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\sd.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\TCP Subsystem\tcpss.exe C:\Users\Admin\AppData\Local\Temp\sd.exe N/A
File opened for modification C:\Program Files (x86)\TCP Subsystem\tcpss.exe C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4877C421-3161-11EF-9680-DA96D1126947} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2872 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2872 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2872 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2872 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2872 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2872 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2872 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2872 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Windows\SysWOW64\schtasks.exe
PID 2872 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2872 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2872 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2872 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\sd.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2388 wrote to memory of 604 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2388 wrote to memory of 604 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2388 wrote to memory of 604 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2388 wrote to memory of 604 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\sd.exe

"C:\Users\Admin\AppData\Local\Temp\sd.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp29BF.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2A3D.tmp"

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\image.gif

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:38177 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:38177 care-somewhere.gl.at.ply.gg tcp

Files

memory/2872-0-0x0000000074A41000-0x0000000074A42000-memory.dmp

memory/2872-1-0x0000000074A40000-0x0000000074FEB000-memory.dmp

memory/2872-2-0x0000000074A40000-0x0000000074FEB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp29BF.tmp

MD5 f7d890eac080bcc878916c23c4b34c3d
SHA1 efa80352399bfd5c91b958dbc45228560e3a2b7e
SHA256 a7c1ea9b3651907399af17cb4bbaa5696b6a4f0bdcb04640842fa7af3bf0a670
SHA512 a03dfd061d8fe7d01333fbdc641a92d9daa56dd21758ce788ea3a5114de16fcc37acd5f7bb0aaad5b23dc74c50ce51ab80603f429bd61292d81497ce68287085

C:\Users\Admin\AppData\Local\Temp\tmp2A3D.tmp

MD5 4b7ef560289c0f62d0baf6f14f48a57a
SHA1 8331acb90dde588aa3196919f6e847f398fd06d1
SHA256 062844155306130d6fafc4fe10ac9e5ddd2ed462532b729c50cdc979c0d83207
SHA512 ecaa27c4b703d95f9f9b37d8c339982970482e7dab968c2010e0aa644bbfa31973111aafb827565af30c423d1d14e4ff997ec149614e713ff7ef3456894d02d8

memory/2872-13-0x0000000074A40000-0x0000000074FEB000-memory.dmp

memory/2872-14-0x0000000074A40000-0x0000000074FEB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\image.gif

MD5 2883fecb93bd0f19e05b9d397149b2ca
SHA1 9fd918c9d67451a0726189807891949aee538414
SHA256 372886c9978c664cc9e0fc3c74aa89b946c40a8de2e9e848ddf8796f8fcc2303
SHA512 281683324e4458e0d6a8758f9ea3d4471a610dcb8e925c5a0569e93e3c9616c27fdeb0e6c00fa10aabf0c1e0614c13815f2515b0fd9e67b6641e8c8c019a4d28

C:\Users\Admin\AppData\Local\Temp\Cab11BF.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d9b34eee5626247ca8e03e570c119e6b
SHA1 3467822363110e232332c8cf5c9b7755f95edcda
SHA256 f24e15e5433edb4297f360c6e35aa9cdbb93b82d643b0f878c07fb9eae232453
SHA512 0d3a709313bd60a3454a725c74210c3b783908a114038051311e5d24b3b5dd8581cc76cc2b604a10683c1d7c4d144075727fb0be2f0baa62645efb93a6c85e4f

C:\Users\Admin\AppData\Local\Temp\Tar12A3.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f6d12049624e8011dda0351095d0c0ec
SHA1 89462cdc39d277855bc2b461a3a46f999d14cfe7
SHA256 3324277f01c04bfe00fe8bdc1ecfc16fbf365db86b65db558ad00eef72671a03
SHA512 77ce0bc8a0fb4b964a6a23e9038d3a888cba08b24d2404cde8974a6d1aa6478ef72a191831ebcd5f84242cac3c680b7c6551ead26ec90f10ad232911a8ef270d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ae2504678871cb19b84b2401270c06e2
SHA1 75d6a85b06d2ee5fff03aa75205f1581353dc47c
SHA256 a30b4d6b26cdbd919c5e01ec739c3f169808476f13b2f002fe190106a185bc9c
SHA512 a55f1a4215a6ae70e31c8e164fffa881d24029be15879efd4231f6f62eb2c559aad72071578e13093af49cbc5a5abbea9dff26187b74421a3bc3c129c3482bc9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2a86c2293c4ffcc2d72e6ffe6410be39
SHA1 a4489b4da39c8cd46b273f0a2cbe8fa7722534a1
SHA256 8a40bc7e82be520f30466fa8604e1505766d8b18695cba2d00643a7903fe0f8d
SHA512 0f196bea1b4aa1ff4b0e9779da6a3bc44c3b72a38ff7bf0c1509feb69d0c15101a678e40734d692e25d84b1cf2818db08821e6086c989daf543a40425c4e60cb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 543c256ff6613ad4f0b6582833492251
SHA1 dce8a8b3bdaae27ad0dc533b919a241e24e245e3
SHA256 01b92920462597c836a54018fee8c44f926e449e38303b5c53654c36bca8aa99
SHA512 4d47458f1eccff7f71157d129a5dc080dc8b4223c5233809007572936efed392dce433caabbaa058b424afe87d967a1393212963ba619257b0005f5c55f3a41a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5a10634ba1240bf658e5b1410040f3a4
SHA1 ec05afa39b17eb2d110f1a6b44dbeebcecade6df
SHA256 389d3fb3e6a0c5370f11e94be37d6a25e9a8a8415c8a9087b413afafe2df7d78
SHA512 91d0e29de195bd9b68740c779b46fa9e40dd9d84c8e7d772b1c5985f31261f4e279c639dbcb2ba10a1165d24c09eb96444792b552d0495c249e2c855c6719e96

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 05e57fee8c3c21aca202ba17f3db711e
SHA1 0bc0fac315cef4861a1aead69b9d2177882978d1
SHA256 d183a10f388940b3a1e391e81378539997b7521648dc51e0e0619730cfb8f55a
SHA512 2546330811f63af8a29fbdb7f777647c445fec1cc1b8c45ec77c5b1eca3d122aa2bf9f81554eafd735fdaa47d421fb9df1143a3656b46b2d1f94903af3842bd2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c87b5d74244e7edce82b927529cb9104
SHA1 d416a35d3db19ade1ab620ae050700e3f3d1cd97
SHA256 ea49cbf230769ded3a2caccac14cbd3f889c72885eadf5a5d0c75a9dd74e9e73
SHA512 47d4351bda904eaa842b4734e417a800201107e3b321644c1ca5d87609f80dcffeb3d6c8ac23be1f2d77f2525f5ff2555083aa3c249fd478d156d67816ae8bf3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e6a9d1205a77e088eb7835865c7b4b8e
SHA1 f750182fbe0ec5670b9fb225ad10f9da52e22c0f
SHA256 45a11aeae3088be74c3b1929d9b07c151824d657c8049f67375070cac4211bbb
SHA512 ea8e479b494e66601731e2053f42731142714495676af012ec1affb0c617732a3567d76eb53960aaa6a4433eb1aa522805b983025b868ec4c91bdd29a33f7f9c

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-23 13:03

Reported

2024-06-23 13:06

Platform

win10v2004-20240508-en

Max time kernel

144s

Max time network

133s

Command Line

"C:\Users\Admin\AppData\Local\Temp\sd.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LAN Monitor = "C:\\Program Files (x86)\\LAN Monitor\\lanmon.exe" C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\LAN Monitor\lanmon.exe C:\Users\Admin\AppData\Local\Temp\sd.exe N/A
File opened for modification C:\Program Files (x86)\LAN Monitor\lanmon.exe C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\sd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\sd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\sd.exe

"C:\Users\Admin\AppData\Local\Temp\sd.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "LAN Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4631.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "LAN Monitor Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4680.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
N/A 127.0.0.1:38177 tcp
N/A 127.0.0.1:38177 tcp
N/A 127.0.0.1:38177 tcp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
N/A 127.0.0.1:38177 tcp
N/A 127.0.0.1:38177 tcp
N/A 127.0.0.1:38177 tcp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
N/A 127.0.0.1:38177 tcp
N/A 127.0.0.1:38177 tcp

Files

memory/836-0-0x0000000075532000-0x0000000075533000-memory.dmp

memory/836-1-0x0000000075530000-0x0000000075AE1000-memory.dmp

memory/836-2-0x0000000075530000-0x0000000075AE1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp4631.tmp

MD5 f7d890eac080bcc878916c23c4b34c3d
SHA1 efa80352399bfd5c91b958dbc45228560e3a2b7e
SHA256 a7c1ea9b3651907399af17cb4bbaa5696b6a4f0bdcb04640842fa7af3bf0a670
SHA512 a03dfd061d8fe7d01333fbdc641a92d9daa56dd21758ce788ea3a5114de16fcc37acd5f7bb0aaad5b23dc74c50ce51ab80603f429bd61292d81497ce68287085

C:\Users\Admin\AppData\Local\Temp\tmp4680.tmp

MD5 ecf141ec69adbb2a5c3dd5c85cd0ec39
SHA1 0ad224632fa58d103142c05c44a142f3d7208291
SHA256 64d8cfa0b25afee269839cd5fc0b66e5643bc318e5f4d3ce1b9dba2456c83316
SHA512 4821b062d6672f3ed07833cfd7ab9abb533850b451b632d781fbfad8238fcd5ac52855f1f239547ae2d1c1477959f022430302a75cfd3c19a8473af72a1ef201

memory/836-10-0x0000000075530000-0x0000000075AE1000-memory.dmp

memory/836-11-0x0000000075530000-0x0000000075AE1000-memory.dmp

memory/836-12-0x0000000075532000-0x0000000075533000-memory.dmp

memory/836-13-0x0000000075530000-0x0000000075AE1000-memory.dmp

memory/836-14-0x0000000075530000-0x0000000075AE1000-memory.dmp