Analysis Overview
SHA256
1929f090046f4af22edd3ad430212bd054015cef995ce911ef7d61119452cd2b
Threat Level: Known bad
The file skid.exe was found to be: Known bad.
Malicious Activity Summary
NanoCore
Nanocore family
Adds Run key to start application
Checks whether UAC is enabled
Drops file in Program Files directory
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Scheduled Task/Job: Scheduled Task
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-23 13:18
Signatures
Nanocore family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-23 13:18
Reported
2024-06-23 13:20
Platform
win7-20240220-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
NanoCore
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files (x86)\TCP Subsystem\tcpss.exe | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| File created | C:\Program Files (x86)\TCP Subsystem\tcpss.exe | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2280 wrote to memory of 2480 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2280 wrote to memory of 2480 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2280 wrote to memory of 2480 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2280 wrote to memory of 2480 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2280 wrote to memory of 2624 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2280 wrote to memory of 2624 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2280 wrote to memory of 2624 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2280 wrote to memory of 2624 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\skid.exe
"C:\Users\Admin\AppData\Local\Temp\skid.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "TCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFF46.tmp"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "TCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFFD3.tmp"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | care-somewhere.gl.at.ply.gg | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
Files
memory/2280-0-0x0000000074571000-0x0000000074572000-memory.dmp
memory/2280-1-0x0000000074570000-0x0000000074B1B000-memory.dmp
memory/2280-2-0x0000000074570000-0x0000000074B1B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpFF46.tmp
| MD5 | d03c4f78287a8c2ba11b867d222f3592 |
| SHA1 | bb1f39da40cff5636a67833a90114093394acd52 |
| SHA256 | aaef2431c0a7c272ddef710c8b25aea6afda0aaa2a9b06419b9ee5168d91bf35 |
| SHA512 | e49c5390cdf50432514974542fa0e10872b67bc69c2119174ecbac0b0fa6fd7d3d7ce179e9a47e51681dece3cffd0d6b9d11d2aa106a8e3a1aaf7252455e53ae |
C:\Users\Admin\AppData\Local\Temp\tmpFFD3.tmp
| MD5 | 4b7ef560289c0f62d0baf6f14f48a57a |
| SHA1 | 8331acb90dde588aa3196919f6e847f398fd06d1 |
| SHA256 | 062844155306130d6fafc4fe10ac9e5ddd2ed462532b729c50cdc979c0d83207 |
| SHA512 | ecaa27c4b703d95f9f9b37d8c339982970482e7dab968c2010e0aa644bbfa31973111aafb827565af30c423d1d14e4ff997ec149614e713ff7ef3456894d02d8 |
memory/2280-10-0x0000000074570000-0x0000000074B1B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-23 13:18
Reported
2024-06-23 13:20
Platform
win10v2004-20240611-en
Max time kernel
149s
Max time network
149s
Command Line
Signatures
NanoCore
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsv.exe" | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\DHCP Service\dhcpsv.exe | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| File opened for modification | C:\Program Files (x86)\DHCP Service\dhcpsv.exe | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1836 wrote to memory of 2372 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 1836 wrote to memory of 2372 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 1836 wrote to memory of 2372 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 1836 wrote to memory of 4144 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 1836 wrote to memory of 4144 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 1836 wrote to memory of 4144 | N/A | C:\Users\Admin\AppData\Local\Temp\skid.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\skid.exe
"C:\Users\Admin\AppData\Local\Temp\skid.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DHCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp395F.tmp"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DHCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp39AE.tmp"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | care-somewhere.gl.at.ply.gg | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 25.24.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.251.17.2.in-addr.arpa | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | udp |
Files
memory/1836-0-0x0000000074D02000-0x0000000074D03000-memory.dmp
memory/1836-1-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/1836-2-0x0000000074D00000-0x00000000752B1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp395F.tmp
| MD5 | d03c4f78287a8c2ba11b867d222f3592 |
| SHA1 | bb1f39da40cff5636a67833a90114093394acd52 |
| SHA256 | aaef2431c0a7c272ddef710c8b25aea6afda0aaa2a9b06419b9ee5168d91bf35 |
| SHA512 | e49c5390cdf50432514974542fa0e10872b67bc69c2119174ecbac0b0fa6fd7d3d7ce179e9a47e51681dece3cffd0d6b9d11d2aa106a8e3a1aaf7252455e53ae |
C:\Users\Admin\AppData\Local\Temp\tmp39AE.tmp
| MD5 | a77c223a0fc492dccd6fb9975f7a8766 |
| SHA1 | 5e813636ae9b8138d78919348a5da3a6e8bd74b5 |
| SHA256 | 589df7325d42409c50827600fedb240171ee4bdab85916474a37800c2382829e |
| SHA512 | 315cea8fde3c594404f5d3c96c710af1214cff6d08ccdb40634a739e108ff810e02624735a2b8c3e3720157b4a55327f317c3c23c3a681b46b9ab0f19060f7c0 |
memory/1836-10-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/1836-11-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/1836-12-0x0000000074D02000-0x0000000074D03000-memory.dmp
memory/1836-13-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/1836-14-0x0000000074D00000-0x00000000752B1000-memory.dmp