Analysis
-
max time kernel
126s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe
Resource
win7-20231129-en
General
-
Target
26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe
-
Size
296KB
-
MD5
ec03c8da575fa5ee4745506b340968e6
-
SHA1
357374aa9b28d6571ebcf3b535b3cd8fe85eebba
-
SHA256
26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7
-
SHA512
2d01fa27ef375f77db7e3a896877db902ea52578aaa13aaec2aef3ce8a0199b1de56ca70602bac24f4fd2278ed5835e2c373c0626a05e95929deb93abb94137a
-
SSDEEP
6144:ou+rdxKERB7nPpuU8Dh1tUS/fqLaiU6xVB3Y8TTp6VmSyp7jk:gdxK8B7nAU87tabNNTd6VnypU
Malware Config
Extracted
nanocore
1.2.2.0
munan.duckdns.org:3637
munabc.duckdns.org:3637
4d5a1bc9-ba60-4ed4-85d1-96a1836c92b0
-
activate_away_mode
true
-
backup_connection_host
munabc.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-09-24T00:04:44.813706136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
3637
-
default_group
MUNA
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
4d5a1bc9-ba60-4ed4-85d1-96a1836c92b0
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
munan.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2308 DDfiles.exe 1860 DDfiles.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3024 set thread context of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 2308 set thread context of 1664 2308 DDfiles.exe 40 PID 1860 set thread context of 2400 1860 DDfiles.exe 49 -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2532 schtasks.exe 968 schtasks.exe 2624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2128 RegAsm.exe 2128 RegAsm.exe 2128 RegAsm.exe 2128 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2128 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2128 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2128 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 28 PID 3024 wrote to memory of 2708 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 29 PID 3024 wrote to memory of 2708 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 29 PID 3024 wrote to memory of 2708 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 29 PID 3024 wrote to memory of 2708 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 29 PID 3024 wrote to memory of 2256 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 31 PID 3024 wrote to memory of 2256 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 31 PID 3024 wrote to memory of 2256 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 31 PID 3024 wrote to memory of 2256 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 31 PID 3024 wrote to memory of 2020 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 32 PID 3024 wrote to memory of 2020 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 32 PID 3024 wrote to memory of 2020 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 32 PID 3024 wrote to memory of 2020 3024 26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe 32 PID 2256 wrote to memory of 2624 2256 cmd.exe 35 PID 2256 wrote to memory of 2624 2256 cmd.exe 35 PID 2256 wrote to memory of 2624 2256 cmd.exe 35 PID 2256 wrote to memory of 2624 2256 cmd.exe 35 PID 1648 wrote to memory of 2308 1648 taskeng.exe 39 PID 1648 wrote to memory of 2308 1648 taskeng.exe 39 PID 1648 wrote to memory of 2308 1648 taskeng.exe 39 PID 1648 wrote to memory of 2308 1648 taskeng.exe 39 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1664 2308 DDfiles.exe 40 PID 2308 wrote to memory of 1512 2308 DDfiles.exe 41 PID 2308 wrote to memory of 1512 2308 DDfiles.exe 41 PID 2308 wrote to memory of 1512 2308 DDfiles.exe 41 PID 2308 wrote to memory of 1512 2308 DDfiles.exe 41 PID 2308 wrote to memory of 1552 2308 DDfiles.exe 42 PID 2308 wrote to memory of 1552 2308 DDfiles.exe 42 PID 2308 wrote to memory of 1552 2308 DDfiles.exe 42 PID 2308 wrote to memory of 1552 2308 DDfiles.exe 42 PID 2308 wrote to memory of 1424 2308 DDfiles.exe 43 PID 2308 wrote to memory of 1424 2308 DDfiles.exe 43 PID 2308 wrote to memory of 1424 2308 DDfiles.exe 43 PID 2308 wrote to memory of 1424 2308 DDfiles.exe 43 PID 1552 wrote to memory of 2532 1552 cmd.exe 47 PID 1552 wrote to memory of 2532 1552 cmd.exe 47 PID 1552 wrote to memory of 2532 1552 cmd.exe 47 PID 1552 wrote to memory of 2532 1552 cmd.exe 47 PID 1648 wrote to memory of 1860 1648 taskeng.exe 48 PID 1648 wrote to memory of 1860 1648 taskeng.exe 48 PID 1648 wrote to memory of 1860 1648 taskeng.exe 48 PID 1648 wrote to memory of 1860 1648 taskeng.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe"C:\Users\Admin\AppData\Local\Temp\26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\DDfiles"2⤵PID:2708
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe'" /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\26321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7.exe" "C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe"2⤵PID:2020
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A91D7DD-D467-422A-AE41-95C5DA4DC8C4} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exeC:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\DDfiles"3⤵PID:1512
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe'" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe" "C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe"3⤵PID:1424
-
-
-
C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exeC:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2400
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\DDfiles"3⤵PID:1536
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe'" /f3⤵PID:348
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe'" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:968
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe" "C:\Users\Admin\AppData\Roaming\DDfiles\DDfiles.exe"3⤵PID:1544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5ec03c8da575fa5ee4745506b340968e6
SHA1357374aa9b28d6571ebcf3b535b3cd8fe85eebba
SHA25626321ed18abb4d44668e157dcb9a123debe3b7477d95055d20e5f5d997bf60d7
SHA5122d01fa27ef375f77db7e3a896877db902ea52578aaa13aaec2aef3ce8a0199b1de56ca70602bac24f4fd2278ed5835e2c373c0626a05e95929deb93abb94137a