Malware Analysis Report

2024-08-06 14:44

Sample ID 240623-qhhjma1grh
Target xmpp.exe
SHA256 5341e6d0abe6278fd72b162c267b82d3af20dbf7c407e24f70b99ea6235fa85d
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5341e6d0abe6278fd72b162c267b82d3af20dbf7c407e24f70b99ea6235fa85d

Threat Level: Known bad

The file xmpp.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

Nanocore family

NanoCore

Adds Run key to start application

Checks whether UAC is enabled

Drops file in Program Files directory

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Scheduled Task/Job: Scheduled Task

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-23 13:15

Signatures

Nanocore family

nanocore

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-23 13:15

Reported

2024-06-23 13:18

Platform

win7-20240611-en

Max time kernel

146s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\xmpp.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Service = "C:\\Program Files (x86)\\DDP Service\\ddpsvc.exe" C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DDP Service\ddpsvc.exe C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A
File opened for modification C:\Program Files (x86)\DDP Service\ddpsvc.exe C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\xmpp.exe

"C:\Users\Admin\AppData\Local\Temp\xmpp.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1999.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1A17.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp

Files

memory/1844-0-0x00000000740E1000-0x00000000740E2000-memory.dmp

memory/1844-1-0x00000000740E0000-0x000000007468B000-memory.dmp

memory/1844-2-0x00000000740E0000-0x000000007468B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp1999.tmp

MD5 f6f3f22a55c23847f3ec537d9d50d61b
SHA1 21d7ee9cbbdc0103676e386f502f7c91a88ae10a
SHA256 23e92430a460ee36367a7239595be60e4fa0cad39688d1dad10b3e5a2788882f
SHA512 f54d5488114af2a87e7cd722a84301161242dc664093ff996a41d9465d7c0702f0aae6fa124a94d64cfee9cedf563e340559189b26baf53fe05ad0814e6de566

C:\Users\Admin\AppData\Local\Temp\tmp1A17.tmp

MD5 2a91b19749346c8f783945a00a5050d7
SHA1 66c61f7802ac5b83aae26f6042575717209bae3e
SHA256 0b0a294877234b2406c573060ff13262da0414485c0954ef8961a9429d9f7fb1
SHA512 c5b044a2bda0ad0d38fb57ffb54611381f05ef6ef2f14481d00c278ecefda2d963ef41b2ef6e2bb16718fb8e5aa859bf2b9f870bf3ba8959c5a6b5b03aa53622

memory/1844-10-0x00000000740E0000-0x000000007468B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-23 13:15

Reported

2024-06-23 13:18

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\xmpp.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Host = "C:\\Program Files (x86)\\DDP Host\\ddphost.exe" C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DDP Host\ddphost.exe C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A
File opened for modification C:\Program Files (x86)\DDP Host\ddphost.exe C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\xmpp.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\xmpp.exe

"C:\Users\Admin\AppData\Local\Temp\xmpp.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp466F.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp46BE.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 8.8.8.8:53 101.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 31.251.17.2.in-addr.arpa udp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
N/A 127.0.0.1:54984 tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 147.185.221.20:54984 care-somewhere.gl.at.ply.gg tcp
US 8.8.8.8:53 168.253.116.51.in-addr.arpa udp

Files

memory/2444-0-0x0000000075342000-0x0000000075343000-memory.dmp

memory/2444-1-0x0000000075340000-0x00000000758F1000-memory.dmp

memory/2444-2-0x0000000075340000-0x00000000758F1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp466F.tmp

MD5 f6f3f22a55c23847f3ec537d9d50d61b
SHA1 21d7ee9cbbdc0103676e386f502f7c91a88ae10a
SHA256 23e92430a460ee36367a7239595be60e4fa0cad39688d1dad10b3e5a2788882f
SHA512 f54d5488114af2a87e7cd722a84301161242dc664093ff996a41d9465d7c0702f0aae6fa124a94d64cfee9cedf563e340559189b26baf53fe05ad0814e6de566

C:\Users\Admin\AppData\Local\Temp\tmp46BE.tmp

MD5 2271642ca970891700e3f48439739ed8
SHA1 cd472df2349f7db9e1e460d0ee28acd97b8a8793
SHA256 7aba66abbcb0b13455609174db23aed495a9adbef0e0acd28baa9c92445eda68
SHA512 4669a4ef8ec28cdb852ffc1401576b1bf9a9d837797d7d92bc88c18b3097404f36854e50167b309706fef400cabc43c876569ce2797ba85eb169a2783b8fe807

memory/2444-10-0x0000000075340000-0x00000000758F1000-memory.dmp

memory/2444-11-0x0000000075342000-0x0000000075343000-memory.dmp

memory/2444-12-0x0000000075340000-0x00000000758F1000-memory.dmp

memory/2444-13-0x0000000075340000-0x00000000758F1000-memory.dmp