Malware Analysis Report

2024-08-06 14:45

Sample ID 240623-qmd21asanb
Target kittys.exe
SHA256 219d74704d5161e7885512a94bf8c8d01561e1314619147be5daecc6c12f0f3c
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

219d74704d5161e7885512a94bf8c8d01561e1314619147be5daecc6c12f0f3c

Threat Level: Known bad

The file kittys.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Nanocore family

Checks whether UAC is enabled

Adds Run key to start application

Drops file in Program Files directory

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Scheduled Task/Job: Scheduled Task

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-23 13:22

Signatures

Nanocore family

nanocore

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-23 13:22

Reported

2024-06-23 13:25

Platform

win10v2004-20240226-en

Max time kernel

145s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\kittys.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Subsystem = "C:\\Program Files (x86)\\SMTP Subsystem\\smtpss.exe" C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\SMTP Subsystem\smtpss.exe C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A
File opened for modification C:\Program Files (x86)\SMTP Subsystem\smtpss.exe C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\kittys.exe

"C:\Users\Admin\AppData\Local\Temp\kittys.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "SMTP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFD9A.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "SMTP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFF31.tmp"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3940 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 172.217.16.234:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 pki.goog udp
US 8.8.8.8:53 pki.goog udp
US 216.239.32.29:80 pki.goog tcp
US 8.8.8.8:53 i.pki.goog udp
US 8.8.8.8:53 i.pki.goog udp
GB 172.217.169.67:80 i.pki.goog tcp
US 8.8.8.8:53 234.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 29.32.239.216.in-addr.arpa udp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
US 8.8.8.8:53 16.24.18.2.in-addr.arpa udp
N/A 127.0.0.1:1608 tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
US 8.8.8.8:53 204.201.50.20.in-addr.arpa udp
N/A 127.0.0.1:1608 tcp

Files

memory/3580-0-0x00000000746D2000-0x00000000746D3000-memory.dmp

memory/3580-1-0x00000000746D0000-0x0000000074C81000-memory.dmp

memory/3580-2-0x00000000746D0000-0x0000000074C81000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpFD9A.tmp

MD5 2ca7f7b3b2a84ff70a4c8e0db6ef6662
SHA1 2e7c298ee0ba72b119b691fc071beab10925b3e5
SHA256 83f3136dce0c0baa7a52658944206cc4ba7d5efa84038452bff64bbd46023598
SHA512 c9f7910f2c720abf833888097982f5834dbb8524039dbaa3145b4fa36db0d11fe1f1dbfbf20def88536523349e94d47dc2c6e5ccf2ed906930a3f8294f983f50

C:\Users\Admin\AppData\Local\Temp\tmpFF31.tmp

MD5 0339b45ef206f4becc88be0d65e24b9e
SHA1 6503a1851f4ccd8c80a31f96bd7ae40d962c9fad
SHA256 3d568a47a8944a47f4aed6982755ac7ff7dda469cc1c81c213ecaa5d89de1f83
SHA512 c98f4513db34d50510dd986e0d812545c442bd5bef26932032b165759627fab4e00c95fe907ab3416a8a1042bfa77aa516c479f1ff7d1ec2f21ae66df8f72551

memory/3580-10-0x00000000746D0000-0x0000000074C81000-memory.dmp

memory/3580-11-0x00000000746D2000-0x00000000746D3000-memory.dmp

memory/3580-12-0x00000000746D0000-0x0000000074C81000-memory.dmp

memory/3580-13-0x00000000746D0000-0x0000000074C81000-memory.dmp

memory/3580-14-0x00000000746D0000-0x0000000074C81000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-23 13:22

Reported

2024-06-23 13:25

Platform

win7-20240221-en

Max time kernel

147s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\kittys.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NAS Host = "C:\\Program Files (x86)\\NAS Host\\nashost.exe" C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\NAS Host\nashost.exe C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A
File opened for modification C:\Program Files (x86)\NAS Host\nashost.exe C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\kittys.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\kittys.exe

"C:\Users\Admin\AppData\Local\Temp\kittys.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "NAS Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp256B.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "NAS Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2618.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 8.8.8.8:53 care-somewhere.gl.at.ply.gg udp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
N/A 127.0.0.1:1608 tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp
US 147.185.221.20:1608 care-somewhere.gl.at.ply.gg tcp

Files

memory/2820-0-0x0000000074C51000-0x0000000074C52000-memory.dmp

memory/2820-1-0x0000000074C50000-0x00000000751FB000-memory.dmp

memory/2820-2-0x0000000074C50000-0x00000000751FB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp256B.tmp

MD5 2ca7f7b3b2a84ff70a4c8e0db6ef6662
SHA1 2e7c298ee0ba72b119b691fc071beab10925b3e5
SHA256 83f3136dce0c0baa7a52658944206cc4ba7d5efa84038452bff64bbd46023598
SHA512 c9f7910f2c720abf833888097982f5834dbb8524039dbaa3145b4fa36db0d11fe1f1dbfbf20def88536523349e94d47dc2c6e5ccf2ed906930a3f8294f983f50

C:\Users\Admin\AppData\Local\Temp\tmp2618.tmp

MD5 9f554f602c22cfc20079e966d177fadb
SHA1 789baa3425849bf239e47c6bcf352e6693a8c337
SHA256 4c760d5fe0c06cf4bf554170870f41181c61a217c37eb826903094dda86dd1f1
SHA512 b83e3e97dbe38ec4c64d9bef65e2521416f2d7434d78d05e66f729a2e0fbfea3f9bc6f6c4abaf76555af89a9565dfc0853d99067be9042dd66ed6246696eecbb

memory/2820-10-0x0000000074C50000-0x00000000751FB000-memory.dmp