Malware Analysis Report

2024-08-06 14:45

Sample ID 240623-xz868sshqn
Target 17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df
SHA256 17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df

Threat Level: Known bad

The file 17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-23 19:18

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-23 19:18

Reported

2024-06-23 19:21

Platform

win7-20240419-en

Max time kernel

149s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2740 set thread context of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3000 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3000 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3000 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3000 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3000 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3000 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3000 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2740 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Processes

C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe

"C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 sysupdate24.ddns.net udp

Files

memory/3000-0-0x0000000074191000-0x0000000074192000-memory.dmp

memory/3000-1-0x0000000074190000-0x000000007473B000-memory.dmp

memory/3000-2-0x0000000074190000-0x000000007473B000-memory.dmp

memory/3000-3-0x0000000074190000-0x000000007473B000-memory.dmp

\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

MD5 3e6c6d6692d0981267b8b60843e5772b
SHA1 0b04fd0355ba2a9208b94dc041fa8159983ed208
SHA256 8c336cbd7f90d6e632bc127f2cb7285e6dce8a031f68f08b8680b389c0e0e7ff
SHA512 9b57d9f905a3134784155c525ec5d5c61d36d0cbd33f63032ed3a8755c9668e1c890a185abe503f2ed674b2aff1777e9db587165791ee0d0305dddd119bf3bb2

memory/2740-13-0x0000000074190000-0x000000007473B000-memory.dmp

memory/3000-12-0x0000000074190000-0x000000007473B000-memory.dmp

memory/2740-14-0x0000000074190000-0x000000007473B000-memory.dmp

memory/2740-15-0x0000000074190000-0x000000007473B000-memory.dmp

memory/2572-17-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2572-21-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2572-19-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2572-33-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2572-35-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2572-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2572-27-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2572-24-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2740-37-0x0000000074190000-0x000000007473B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-23 19:18

Reported

2024-06-23 19:21

Platform

win10v2004-20240611-en

Max time kernel

147s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 5084 set thread context of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4680 wrote to memory of 5084 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 4680 wrote to memory of 5084 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 4680 wrote to memory of 5084 N/A C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 5084 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 5084 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 5084 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 5084 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 5084 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 5084 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 5084 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 5084 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Processes

C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe

"C:\Users\Admin\AppData\Local\Temp\17af862b1de9a3d28b0d3029320fc78a156614ffbfe8147a2d2a7cc193b708df.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 80.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp

Files

memory/4680-0-0x0000000074E62000-0x0000000074E63000-memory.dmp

memory/4680-1-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/4680-2-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/4680-3-0x0000000074E60000-0x0000000075411000-memory.dmp

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

MD5 605820611185459ecda09c5ffa6c5419
SHA1 bc4a08126668e2f9466a7319749f4ab53352f5e8
SHA256 8d097aeea9878413de5d00c6af30f82186e6e6c082a53a36e6e8470804f10529
SHA512 9d8430e4613bb24dc4fd54a6a347f18fd6138b299c5d79a0f00914e0ce6213298cc3dcea47991e15f77ef0719c9c413c1c3c167fa8468971f50730d7e07a54a3

memory/5084-17-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/5084-19-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/4680-18-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/5084-20-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/3396-21-0x0000000000400000-0x0000000000438000-memory.dmp

memory/3396-23-0x0000000000400000-0x0000000000438000-memory.dmp

memory/3396-22-0x0000000000400000-0x0000000000438000-memory.dmp

memory/3396-26-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/3396-27-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/3396-28-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/3396-30-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/5084-31-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/5084-33-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/3396-34-0x0000000074E60000-0x0000000075411000-memory.dmp

memory/3396-35-0x0000000074E60000-0x0000000075411000-memory.dmp