Analysis Overview
SHA256
219d74704d5161e7885512a94bf8c8d01561e1314619147be5daecc6c12f0f3c
Threat Level: Known bad
The file kittys.exe was found to be: Known bad.
Malicious Activity Summary
NanoCore
Nanocore family
Checks whether UAC is enabled
Adds Run key to start application
Drops file in Program Files directory
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Scheduled Task/Job: Scheduled Task
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-23 13:22
Signatures
Nanocore family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-23 13:22
Reported
2024-06-23 13:25
Platform
win10v2004-20240226-en
Max time kernel
145s
Max time network
153s
Command Line
Signatures
NanoCore
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Subsystem = "C:\\Program Files (x86)\\SMTP Subsystem\\smtpss.exe" | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\SMTP Subsystem\smtpss.exe | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| File opened for modification | C:\Program Files (x86)\SMTP Subsystem\smtpss.exe | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3580 wrote to memory of 2752 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 3580 wrote to memory of 2752 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 3580 wrote to memory of 2752 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 3580 wrote to memory of 3308 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 3580 wrote to memory of 3308 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 3580 wrote to memory of 3308 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\kittys.exe
"C:\Users\Admin\AppData\Local\Temp\kittys.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "SMTP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFD9A.tmp"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "SMTP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpFF31.tmp"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3940 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 25.24.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | care-somewhere.gl.at.ply.gg | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| GB | 172.217.16.234:443 | chromewebstore.googleapis.com | tcp |
| US | 8.8.8.8:53 | pki.goog | udp |
| US | 8.8.8.8:53 | pki.goog | udp |
| US | 216.239.32.29:80 | pki.goog | tcp |
| US | 8.8.8.8:53 | i.pki.goog | udp |
| US | 8.8.8.8:53 | i.pki.goog | udp |
| GB | 172.217.169.67:80 | i.pki.goog | tcp |
| US | 8.8.8.8:53 | 234.16.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.32.239.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | care-somewhere.gl.at.ply.gg | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 8.8.8.8:53 | 16.24.18.2.in-addr.arpa | udp |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 8.8.8.8:53 | 204.201.50.20.in-addr.arpa | udp |
| N/A | 127.0.0.1:1608 | tcp |
Files
memory/3580-0-0x00000000746D2000-0x00000000746D3000-memory.dmp
memory/3580-1-0x00000000746D0000-0x0000000074C81000-memory.dmp
memory/3580-2-0x00000000746D0000-0x0000000074C81000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpFD9A.tmp
| MD5 | 2ca7f7b3b2a84ff70a4c8e0db6ef6662 |
| SHA1 | 2e7c298ee0ba72b119b691fc071beab10925b3e5 |
| SHA256 | 83f3136dce0c0baa7a52658944206cc4ba7d5efa84038452bff64bbd46023598 |
| SHA512 | c9f7910f2c720abf833888097982f5834dbb8524039dbaa3145b4fa36db0d11fe1f1dbfbf20def88536523349e94d47dc2c6e5ccf2ed906930a3f8294f983f50 |
C:\Users\Admin\AppData\Local\Temp\tmpFF31.tmp
| MD5 | 0339b45ef206f4becc88be0d65e24b9e |
| SHA1 | 6503a1851f4ccd8c80a31f96bd7ae40d962c9fad |
| SHA256 | 3d568a47a8944a47f4aed6982755ac7ff7dda469cc1c81c213ecaa5d89de1f83 |
| SHA512 | c98f4513db34d50510dd986e0d812545c442bd5bef26932032b165759627fab4e00c95fe907ab3416a8a1042bfa77aa516c479f1ff7d1ec2f21ae66df8f72551 |
memory/3580-10-0x00000000746D0000-0x0000000074C81000-memory.dmp
memory/3580-11-0x00000000746D2000-0x00000000746D3000-memory.dmp
memory/3580-12-0x00000000746D0000-0x0000000074C81000-memory.dmp
memory/3580-13-0x00000000746D0000-0x0000000074C81000-memory.dmp
memory/3580-14-0x00000000746D0000-0x0000000074C81000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-23 13:22
Reported
2024-06-23 13:25
Platform
win7-20240221-en
Max time kernel
147s
Max time network
148s
Command Line
Signatures
NanoCore
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NAS Host = "C:\\Program Files (x86)\\NAS Host\\nashost.exe" | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\NAS Host\nashost.exe | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| File opened for modification | C:\Program Files (x86)\NAS Host\nashost.exe | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2820 wrote to memory of 2212 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2820 wrote to memory of 2212 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2820 wrote to memory of 2212 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2820 wrote to memory of 2212 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2820 wrote to memory of 3048 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2820 wrote to memory of 3048 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2820 wrote to memory of 3048 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2820 wrote to memory of 3048 | N/A | C:\Users\Admin\AppData\Local\Temp\kittys.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\kittys.exe
"C:\Users\Admin\AppData\Local\Temp\kittys.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "NAS Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp256B.tmp"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "NAS Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2618.tmp"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | care-somewhere.gl.at.ply.gg | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | care-somewhere.gl.at.ply.gg | udp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| N/A | 127.0.0.1:1608 | tcp | |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
| US | 147.185.221.20:1608 | care-somewhere.gl.at.ply.gg | tcp |
Files
memory/2820-0-0x0000000074C51000-0x0000000074C52000-memory.dmp
memory/2820-1-0x0000000074C50000-0x00000000751FB000-memory.dmp
memory/2820-2-0x0000000074C50000-0x00000000751FB000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp256B.tmp
| MD5 | 2ca7f7b3b2a84ff70a4c8e0db6ef6662 |
| SHA1 | 2e7c298ee0ba72b119b691fc071beab10925b3e5 |
| SHA256 | 83f3136dce0c0baa7a52658944206cc4ba7d5efa84038452bff64bbd46023598 |
| SHA512 | c9f7910f2c720abf833888097982f5834dbb8524039dbaa3145b4fa36db0d11fe1f1dbfbf20def88536523349e94d47dc2c6e5ccf2ed906930a3f8294f983f50 |
C:\Users\Admin\AppData\Local\Temp\tmp2618.tmp
| MD5 | 9f554f602c22cfc20079e966d177fadb |
| SHA1 | 789baa3425849bf239e47c6bcf352e6693a8c337 |
| SHA256 | 4c760d5fe0c06cf4bf554170870f41181c61a217c37eb826903094dda86dd1f1 |
| SHA512 | b83e3e97dbe38ec4c64d9bef65e2521416f2d7434d78d05e66f729a2e0fbfea3f9bc6f6c4abaf76555af89a9565dfc0853d99067be9042dd66ed6246696eecbb |
memory/2820-10-0x0000000074C50000-0x00000000751FB000-memory.dmp