Analysis Overview
SHA256
8802fb63419902bbd4f9679966f483c755f503b2f0a4345b59b1669a9c025a73
Threat Level: Known bad
The file 5a42e2442b79943419bf0e39ad7be827.bin was found to be: Known bad.
Malicious Activity Summary
NanoCore
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Adds Run key to start application
Suspicious use of SetThreadContext
Drops file in Program Files directory
Enumerates physical storage devices
Unsigned PE
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-26 02:40
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-26 02:40
Reported
2024-06-26 02:43
Platform
win7-20240220-en
Max time kernel
118s
Max time network
150s
Command Line
Signatures
NanoCore
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2932 set thread context of 2448 | N/A | C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\TCP Subsystem\tcpss.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| File opened for modification | C:\Program Files (x86)\TCP Subsystem\tcpss.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Enumerates physical storage devices
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe
"C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zzTmYAoKh.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zzTmYAoKh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp311E.tmp"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | newsddawork.3utilities.com | udp |
| US | 104.243.242.163:1620 | newsddawork.3utilities.com | tcp |
Files
memory/2932-0-0x0000000074AAE000-0x0000000074AAF000-memory.dmp
memory/2932-1-0x00000000000F0000-0x000000000018C000-memory.dmp
memory/2932-2-0x0000000074AA0000-0x000000007518E000-memory.dmp
memory/2932-3-0x00000000047B0000-0x0000000004842000-memory.dmp
memory/2932-4-0x0000000000740000-0x0000000000752000-memory.dmp
memory/2932-5-0x00000000007D0000-0x00000000007D8000-memory.dmp
memory/2932-6-0x00000000007E0000-0x00000000007EC000-memory.dmp
memory/2932-7-0x00000000053C0000-0x000000000543A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp311E.tmp
| MD5 | 408af4db7221cf0e486909a3251725f8 |
| SHA1 | facf550e8ba10fb34c194811159af470f564dba9 |
| SHA256 | b3a7b37e1758b292828bf9889337345fd4bc1b245b623f544c094e8efb485468 |
| SHA512 | 03e8c890d30ee2fcfac4c7d7f9c347d5147afa6389070f0fa85da789217fcc7ec68fe9efbcf443eb567292fa39d33fe47c6fccac3d7d87260b2690c530857d37 |
memory/2448-15-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2448-17-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2448-25-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2448-27-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2448-24-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2448-23-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
memory/2448-21-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2448-19-0x0000000000400000-0x0000000000438000-memory.dmp
memory/2932-28-0x0000000074AA0000-0x000000007518E000-memory.dmp
memory/2448-31-0x00000000003D0000-0x00000000003DA000-memory.dmp
memory/2448-32-0x00000000003E0000-0x00000000003FE000-memory.dmp
memory/2448-33-0x0000000000440000-0x000000000044A000-memory.dmp
memory/2448-39-0x0000000000550000-0x0000000000562000-memory.dmp
memory/2448-40-0x0000000000560000-0x000000000056C000-memory.dmp
memory/2448-41-0x0000000000580000-0x000000000058E000-memory.dmp
memory/2448-43-0x0000000000620000-0x0000000000630000-memory.dmp
memory/2448-42-0x0000000000590000-0x00000000005A4000-memory.dmp
memory/2448-38-0x0000000000530000-0x000000000053E000-memory.dmp
memory/2448-37-0x0000000000510000-0x000000000052A000-memory.dmp
memory/2448-36-0x00000000004B0000-0x00000000004C2000-memory.dmp
memory/2448-44-0x0000000000630000-0x0000000000644000-memory.dmp
memory/2448-46-0x0000000000B80000-0x0000000000BAE000-memory.dmp
memory/2448-45-0x0000000000720000-0x000000000072E000-memory.dmp
memory/2448-47-0x0000000000880000-0x0000000000894000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-26 02:40
Reported
2024-06-26 02:43
Platform
win10v2004-20240611-en
Max time kernel
134s
Max time network
153s
Command Line
Signatures
NanoCore
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Subsystem = "C:\\Program Files (x86)\\DDP Subsystem\\ddpss.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1540 set thread context of 5036 | N/A | C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\DDP Subsystem\ddpss.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| File opened for modification | C:\Program Files (x86)\DDP Subsystem\ddpss.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Enumerates physical storage devices
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe
"C:\Users\Admin\AppData\Local\Temp\b449b20b95c94cd1dc77a0edbd7eb8c183392ff0bbb53f2ca374d129f5ace20a.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4112,i,12594301322143882025,16832588342008839449,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:8
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zzTmYAoKh.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zzTmYAoKh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp470.tmp"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | newsddawork.3utilities.com | udp |
| US | 104.243.242.163:1620 | newsddawork.3utilities.com | tcp |
| US | 8.8.8.8:53 | 163.242.243.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 35.15.31.184.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
memory/1540-0-0x0000000074D0E000-0x0000000074D0F000-memory.dmp
memory/1540-1-0x0000000000830000-0x00000000008CC000-memory.dmp
memory/1540-2-0x0000000005970000-0x0000000005F14000-memory.dmp
memory/1540-3-0x00000000052F0000-0x0000000005382000-memory.dmp
memory/1540-4-0x0000000074D00000-0x00000000754B0000-memory.dmp
memory/1540-5-0x00000000052E0000-0x00000000052EA000-memory.dmp
memory/1540-6-0x0000000005550000-0x00000000055EC000-memory.dmp
memory/1540-7-0x0000000006450000-0x000000000697C000-memory.dmp
memory/1540-8-0x0000000006FF0000-0x0000000007082000-memory.dmp
memory/1540-9-0x00000000056F0000-0x0000000005702000-memory.dmp
memory/1540-10-0x0000000005960000-0x0000000005968000-memory.dmp
memory/1540-11-0x0000000006430000-0x000000000643C000-memory.dmp
memory/1540-12-0x0000000006B90000-0x0000000006C0A000-memory.dmp
memory/4704-17-0x0000000005040000-0x0000000005076000-memory.dmp
memory/4704-20-0x0000000074D00000-0x00000000754B0000-memory.dmp
memory/4704-19-0x0000000005820000-0x0000000005E48000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp470.tmp
| MD5 | 085ca02bb98c3ccf537f9125475f1683 |
| SHA1 | 4c486dc32e74837c9708ff710ee3b646b5fcf58c |
| SHA256 | 302fe1fb61ce332fe558b99295fb51885d2cee8a8c06503c0316d46e5016b882 |
| SHA512 | 4154e584f7f1d7cfe9d8eb8441531d09137621d6795273e8927223cc83b504b4f5e0139eafda0bcdf58f722ba4457610e605cc47fd0b7772fe9f29dd3a74c2d5 |
memory/4704-21-0x0000000074D00000-0x00000000754B0000-memory.dmp
memory/4704-22-0x0000000074D00000-0x00000000754B0000-memory.dmp
memory/5036-23-0x0000000000400000-0x0000000000438000-memory.dmp
memory/4704-26-0x0000000005FA0000-0x0000000006006000-memory.dmp
memory/4704-25-0x0000000005EC0000-0x0000000005F26000-memory.dmp
memory/4704-24-0x0000000005720000-0x0000000005742000-memory.dmp
memory/5036-28-0x0000000074D00000-0x00000000754B0000-memory.dmp
memory/4704-29-0x0000000006010000-0x0000000006364000-memory.dmp
memory/1540-30-0x0000000074D00000-0x00000000754B0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0cxclxgw.khd.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4704-40-0x00000000065F0000-0x000000000660E000-memory.dmp
memory/4704-41-0x0000000006B70000-0x0000000006BBC000-memory.dmp
memory/5036-44-0x0000000005150000-0x000000000515A000-memory.dmp
memory/5036-45-0x0000000005410000-0x000000000542E000-memory.dmp
memory/5036-46-0x0000000005F20000-0x0000000005F2A000-memory.dmp
memory/4704-47-0x0000000007800000-0x0000000007832000-memory.dmp
memory/4704-48-0x00000000755B0000-0x00000000755FC000-memory.dmp
memory/4704-58-0x0000000006B40000-0x0000000006B5E000-memory.dmp
memory/4704-59-0x0000000007840000-0x00000000078E3000-memory.dmp
memory/4704-61-0x0000000007F70000-0x00000000085EA000-memory.dmp
memory/4704-62-0x0000000007910000-0x000000000792A000-memory.dmp
memory/4704-63-0x00000000079A0000-0x00000000079AA000-memory.dmp
memory/4704-64-0x0000000007BB0000-0x0000000007C46000-memory.dmp
memory/4704-65-0x0000000007B30000-0x0000000007B41000-memory.dmp
memory/4704-66-0x0000000007B60000-0x0000000007B6E000-memory.dmp
memory/4704-67-0x0000000007B70000-0x0000000007B84000-memory.dmp
memory/4704-68-0x0000000007C70000-0x0000000007C8A000-memory.dmp
memory/4704-69-0x0000000007C50000-0x0000000007C58000-memory.dmp
memory/4704-72-0x0000000074D00000-0x00000000754B0000-memory.dmp
memory/5036-85-0x0000000006AD0000-0x0000000006AE4000-memory.dmp
memory/5036-84-0x0000000006AA0000-0x0000000006ACE000-memory.dmp
memory/5036-83-0x0000000006A90000-0x0000000006A9E000-memory.dmp
memory/5036-82-0x0000000006A70000-0x0000000006A84000-memory.dmp
memory/5036-81-0x0000000006A50000-0x0000000006A60000-memory.dmp
memory/5036-80-0x0000000006A40000-0x0000000006A54000-memory.dmp
memory/5036-79-0x0000000006A30000-0x0000000006A3E000-memory.dmp
memory/5036-78-0x0000000006A20000-0x0000000006A2C000-memory.dmp
memory/5036-77-0x0000000006A10000-0x0000000006A22000-memory.dmp
memory/5036-76-0x0000000006A00000-0x0000000006A0E000-memory.dmp
memory/5036-75-0x00000000069D0000-0x00000000069EA000-memory.dmp
memory/5036-74-0x00000000069C0000-0x00000000069D2000-memory.dmp
memory/5036-87-0x0000000074D00000-0x00000000754B0000-memory.dmp