Malware Analysis Report

2024-08-06 14:45

Sample ID 240623-qkdnfswakp
Target kitty.exe
SHA256 bffc649f9caaeb25d0ee5c19cebc71a5b2494271255a1e143bc0849494ae9cd2
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bffc649f9caaeb25d0ee5c19cebc71a5b2494271255a1e143bc0849494ae9cd2

Threat Level: Known bad

The file kitty.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

Nanocore family

NanoCore

Adds Run key to start application

Checks whether UAC is enabled

Drops file in Program Files directory

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Scheduled Task/Job: Scheduled Task

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-23 13:18

Signatures

Nanocore family

nanocore

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-23 13:18

Reported

2024-06-23 13:21

Platform

win7-20231129-en

Max time kernel

147s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\kitty.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Service = "C:\\Program Files (x86)\\TCP Service\\tcpsv.exe" C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\TCP Service\tcpsv.exe C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A
File opened for modification C:\Program Files (x86)\TCP Service\tcpsv.exe C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\kitty.exe

"C:\Users\Admin\AppData\Local\Temp\kitty.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp676.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp6F4.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp

Files

memory/2128-0-0x0000000074951000-0x0000000074952000-memory.dmp

memory/2128-1-0x0000000074950000-0x0000000074EFB000-memory.dmp

memory/2128-2-0x0000000074950000-0x0000000074EFB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp676.tmp

MD5 1fb868da8972c98303d5b8a1640a3052
SHA1 dff1a9e1f187ed867895078523b569fbbac825c3
SHA256 8e74325e8c8f5432a80a71efc90ba52ad493c65a9ea258c46b5a0e8ba9e113aa
SHA512 b9a3a07f2404c119cc1e392ba9605d269e6f9b9d20ec202abeefe302ef2ef70c74ed0c04a5ba10a750ab84cbde4d35aafbe8cfb448abd089d3573e624539fc4e

C:\Users\Admin\AppData\Local\Temp\tmp6F4.tmp

MD5 93fc3117767507c9889abd12dc667d22
SHA1 1096e4cfa0c35756e3c3fb866c1e4c1e59115df9
SHA256 684997dd4ce15031cec8f2f93933b1d41d7bf5cbbff655dd64377b07055c449a
SHA512 e403348ee77bd3e7c45245dd5dae81c3ea130d5cf342f630982772ce5f75548b292013480e2831d68cf51349b64afde4589d4eec94b567d20f0a01e3b9549bdc

memory/2128-10-0x0000000074950000-0x0000000074EFB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-23 13:18

Reported

2024-06-23 13:21

Platform

win10v2004-20240508-en

Max time kernel

144s

Max time network

131s

Command Line

"C:\Users\Admin\AppData\Local\Temp\kitty.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsv.exe" C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DHCP Service\dhcpsv.exe C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A
File opened for modification C:\Program Files (x86)\DHCP Service\dhcpsv.exe C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\kitty.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\kitty.exe

"C:\Users\Admin\AppData\Local\Temp\kitty.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4556.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp45A5.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp

Files

memory/3424-0-0x0000000074C12000-0x0000000074C13000-memory.dmp

memory/3424-1-0x0000000074C10000-0x00000000751C1000-memory.dmp

memory/3424-2-0x0000000074C10000-0x00000000751C1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp4556.tmp

MD5 1fb868da8972c98303d5b8a1640a3052
SHA1 dff1a9e1f187ed867895078523b569fbbac825c3
SHA256 8e74325e8c8f5432a80a71efc90ba52ad493c65a9ea258c46b5a0e8ba9e113aa
SHA512 b9a3a07f2404c119cc1e392ba9605d269e6f9b9d20ec202abeefe302ef2ef70c74ed0c04a5ba10a750ab84cbde4d35aafbe8cfb448abd089d3573e624539fc4e

C:\Users\Admin\AppData\Local\Temp\tmp45A5.tmp

MD5 a77c223a0fc492dccd6fb9975f7a8766
SHA1 5e813636ae9b8138d78919348a5da3a6e8bd74b5
SHA256 589df7325d42409c50827600fedb240171ee4bdab85916474a37800c2382829e
SHA512 315cea8fde3c594404f5d3c96c710af1214cff6d08ccdb40634a739e108ff810e02624735a2b8c3e3720157b4a55327f317c3c23c3a681b46b9ab0f19060f7c0

memory/3424-10-0x0000000074C10000-0x00000000751C1000-memory.dmp

memory/3424-11-0x0000000074C12000-0x0000000074C13000-memory.dmp

memory/3424-12-0x0000000074C10000-0x00000000751C1000-memory.dmp

memory/3424-13-0x0000000074C10000-0x00000000751C1000-memory.dmp