Resubmissions

08-07-2024 18:48

240708-xfyamatapr 10

08-07-2024 18:25

240708-w2l9tascqp 10

Analysis

  • max time kernel
    62s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 18:48

General

  • Target

    BloodFMx64x.exe

  • Size

    21.9MB

  • MD5

    702ab1cadcca9c85d9d3e577d28371c6

  • SHA1

    606addfb7b10515f41e61e5832fdf45abc483bee

  • SHA256

    9f8c98828eecab0beeb2f6db642a2820ba10160379663756cc7723d7df1f7de6

  • SHA512

    7f4304ff36f1a5c9302ecd67d9bc1b3b9e3e15733819d904642856d2b740b827abb8cff7368f3c99e74520bf87fc247297bf6f4b97443a4ac5100ceb9142ce79

  • SSDEEP

    393216:iu7L/sQ1DKmr2pu0tTtdQuslRl99oWOv+9ge6DRXAbejH:iCL0Q1DKmr2puI5dQuqDorvSghRwbO

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

45.74.8.132:1604

127.0.0.1:1604

mygabs.ddns.net:1337

127.0.0.1:1337

Mutex

f8d99e2f-2572-4d85-92e4-cf383d156342

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2024-03-05T17:57:06.415874336Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    1604

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    f8d99e2f-2572-4d85-92e4-cf383d156342

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    45.74.8.132

  • primary_dns_server

    8.8.8.8

  • request_elevation

    false

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BloodFMx64x.exe
    "C:\Users\Admin\AppData\Local\Temp\BloodFMx64x.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\BLOODFMX.EXE
      "C:\Users\Admin\AppData\Local\Temp\BLOODFMX.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1956
    • C:\Users\Admin\AppData\Local\Temp\HOME X64 BUILD.EXE
      "C:\Users\Admin\AppData\Local\Temp\HOME X64 BUILD.EXE"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious behavior: SetClipboardViewer
      • Suspicious use of AdjustPrivilegeToken
      PID:2904
    • C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE
      "C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Runs regedit.exe
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Delete /tn NYAN /F
        3⤵
          PID:1648
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE" /sc minute /mo 1
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2284
        • C:\Users\Admin\AppData\Local\Temp\Client.exe
          "C:\Users\Admin\AppData\Local\Temp\Client.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:952
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Delete /tn NYAN /F
            4⤵
              PID:2424
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 1
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:1352
        • C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE
          "C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3048
          • C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE
            "C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2824
        • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
          "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
          2⤵
          • Executes dropped EXE
          PID:2876
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {07BBFEE0-04EE-4DFB-9A76-C5D51630CB8A} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Users\Admin\AppData\Local\Temp\Client.exe
          C:\Users\Admin\AppData\Local\Temp\Client.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1532
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Delete /tn NYAN /F
            3⤵
              PID:2088
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 1
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:3060

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Execution

        Scheduled Task/Job

        1
        T1053

        Scheduled Task

        1
        T1053.005

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Scheduled Task/Job

        1
        T1053

        Scheduled Task

        1
        T1053.005

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Scheduled Task/Job

        1
        T1053

        Scheduled Task

        1
        T1053.005

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI30482\api-ms-win-core-file-l1-2-0.dll
          Filesize

          11KB

          MD5

          a8b0327931fd2c863693634b3081e6a0

          SHA1

          d66cd78c124e931667b6079d5bc5adf55a644293

          SHA256

          1fa836b3704b29e7ad1ea1b0b457f62aae4435c6a1d745707631552a2f83d5f6

          SHA512

          1b8331ac9b17d3553a5c7b4572f826bb232b339c28f6c9a31a870097c7612587cd1dbe59fe294501ce11cf5bba973d83784108309617b6f7104f2aae8f723961

        • C:\Users\Admin\AppData\Local\Temp\_MEI30482\api-ms-win-core-file-l2-1-0.dll
          Filesize

          11KB

          MD5

          eb4c279c8386d4f30aab6d76feec3e5a

          SHA1

          0c611e8f56591f64841b846df7d5c07fd75b55a4

          SHA256

          56bc7d3dd48d9cb209195f71be67d0a90ca929a8d4e6ae5a481f3ab0345da294

          SHA512

          1869b0c843df05ba849e79aa15b25855aa5c2c2e5a932c0de650b83c8abe2371585731b0213061b8f4d781a87b352ad3a09bf8555fcf0f9422a0bcc1a9062781

        • C:\Users\Admin\AppData\Local\Temp\_MEI30482\api-ms-win-core-localization-l1-2-0.dll
          Filesize

          14KB

          MD5

          a94626cbc9c0e1b62619a8cf49504ff8

          SHA1

          047e2b1f21f1258242238043143f1d892538bbc3

          SHA256

          a36792281c0aaab929635bb1f40ee3627225e7e35e6a199c188f3f782c7e6c27

          SHA512

          b208602f33f02c92df718e4c009e6e8055e538c9451ef6f9682ce21db5258d799c09f689aae2879470a934b60b4f3d44ea82704933fa40f2ff408cf42bd1c534

        • C:\Users\Admin\AppData\Local\Temp\_MEI30482\api-ms-win-core-processthreads-l1-1-1.dll
          Filesize

          12KB

          MD5

          b16e6798ad40000698a09276961fc2c3

          SHA1

          b5184d9bdb1f5e7cfe17b2ec305c8554362067de

          SHA256

          f8b7122ca5e1d473818940fea4d1155af429463038ba61953908fbbbb7a8d613

          SHA512

          a4737a2236eb35e1b4935a5e333c7f1c51588852a8daf654fd2e7ca6e945e40df9d001394c2f3e3a9d023b8d4e34e9753f6472ed58df245b104623d7dbde7423

        • C:\Users\Admin\AppData\Local\Temp\_MEI30482\api-ms-win-core-timezone-l1-1-0.dll
          Filesize

          11KB

          MD5

          f0f891d08e0e358327b323b38f3ffca2

          SHA1

          eb20f147c53f86c59603f5edbf60f936f768fb1b

          SHA256

          9c8461929b61e0fd269ce735d699e7e3b6c0159d3e2659f60d681290abf9eac5

          SHA512

          94e13c4d09ff35c2ded7fd2649b3542aade1414f05772e2034af7723f2622e662e8c0bb67e1eb288e230f8ae183d8f1296c2a134b7ae061a452fa3f7423d7694

        • C:\Users\Admin\AppData\Local\Temp\_MEI30482\python310.dll
          Filesize

          4.3MB

          MD5

          deaf0c0cc3369363b800d2e8e756a402

          SHA1

          3085778735dd8badad4e39df688139f4eed5f954

          SHA256

          156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d

          SHA512

          5cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989

        • C:\Users\Admin\AppData\Local\Temp\_MEI30482\ucrtbase.dll
          Filesize

          1011KB

          MD5

          7e39d82adf5da0b51a968c764e0e15c1

          SHA1

          79e75ccde95798f21a34e5650b29dbebe79c1b43

          SHA256

          d67926328a72816d2944d7c88df6ff4bfccd41a9ce39af0309a0639829d0e7fb

          SHA512

          1c58d53c40535f80f482a5f406ef5bf9c2f963b9db5969c37ef47b0c59522a1a9bde3f3589538a7ae7d99d567a43170b384761e572c740010feb86894ce7322a

        • C:\Users\Admin\AppData\Roaming\5349CA0F-AEC5-405F-83E0-AA034653CB76\run.dat
          Filesize

          8B

          MD5

          c634e7efa50612ddac85025614245ed3

          SHA1

          2abd9a58bf4cd3e6a5428e33e2c7c9356812c6b2

          SHA256

          1ae30be5b28a8a3edd489730a5b115b02b23a7667e3497bfe4710bdf75ef6480

          SHA512

          75eeef19b79eee1ca0c74e55486ea982c87b3df6389c98b965956c1112d2760fc256896b6844e2cc70449c6fa8bbc861d0af46581639884f338158498eadfa9b

        • \Users\Admin\AppData\Local\Temp\BLOODFMX.EXE
          Filesize

          202KB

          MD5

          e73a6209451022ef1697860fe3a67753

          SHA1

          98b7e9f68167a3e6d768a50c2b4610ced53d1c6d

          SHA256

          b35f2d047c35b3f0d6feefade7cd1e69d9bf25340ddbd7be937cba0ee68317a7

          SHA512

          2f61121005d1283ee37569ffb491f4de0cc882cfa95b38b1c585b0a421455b469e041d14341d0bc086638dd44c6a57486c6776f373dea441bf819cd75fda411b

        • \Users\Admin\AppData\Local\Temp\HOME X64 BUILD.EXE
          Filesize

          202KB

          MD5

          6048ded327cec10d49240206f6eeea39

          SHA1

          a1f4905f99654d0042e03b1eb85f190055cb5862

          SHA256

          52e993009984fb3cbd9189b44d25e24e1cc27f7042b132a6d5691a34a64ac8b9

          SHA512

          b2c77b1d2a614c75110c57e2c56d8dbe0b9db4f9b9fe6bc65eda57c3b4eadc9ce36d8a41fd65cfbeb583641837b53b33c1a95246d9a765707cbc7c8663fff3ce

        • \Users\Admin\AppData\Local\Temp\REGEDIT.EXE
          Filesize

          165KB

          MD5

          8853d52e63139ea98d401aedaca361dc

          SHA1

          9052fa1383930da8fe69b1d85ad06050cef0ed8e

          SHA256

          e23251179fc24709c6909763d9db607fc035fcfd38fd429c04a7f2d2d395a779

          SHA512

          3081595b34c0294525c3573ae81537b36b6cda1e5dce7af000baeea6c2a6f25adb122079117417fe48f77d010f8566222e0ae6200b8f2e1db3e8a9b5c61fa86f

        • \Users\Admin\AppData\Local\Temp\SCHIOST.EXE
          Filesize

          18.0MB

          MD5

          4817b3f9ced0d3aa3322b3a764fdccb5

          SHA1

          1bac5e7f5b8122fa89f595ae60dd7b4c00c86a48

          SHA256

          354c7dba94787431be1f65c97499055980ffd96acf99e2f77616150515c3e1d0

          SHA512

          dd4a4ba244ac49b3eb9540fd02c9e10f5bdf774abc0f2f7d5f180084060ee878239340a7b80e265ee6ed926d7357ff00d999ef80e936f3fc7ccfb15d08d0d639

        • \Users\Admin\AppData\Local\Temp\SVCHOST.EXE
          Filesize

          3.1MB

          MD5

          79e7f4a70bb7966605e64367da0d4839

          SHA1

          0f0c54bfac6933d3e7ecef5f5d40b00d7faeb1f5

          SHA256

          97c27121a07217e52d701604bf3f5ec33125fbb7cc5cff58571007f2054f775f

          SHA512

          37a9dffe3c3fe677d8ce967ec2138f3d04f6fa4ce7d3ac04bf8867e88ba5b739521cc69f37467f596626d8f08fa3ed0bf3f0556c9f2e5164189a6bc6d088523d

        • memory/1956-27-0x0000000000230000-0x0000000000270000-memory.dmp
          Filesize

          256KB

        • memory/1956-349-0x0000000000230000-0x0000000000270000-memory.dmp
          Filesize

          256KB