Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
1e1afc422bdba3c73ad37db86fc86d1c.exe
Resource
win7-20240705-en
General
-
Target
1e1afc422bdba3c73ad37db86fc86d1c.exe
-
Size
779KB
-
MD5
1e1afc422bdba3c73ad37db86fc86d1c
-
SHA1
7d8fa74ccf56e88aa3a59310a49cc660e7e8c1fc
-
SHA256
535a76b11d8e55c1b67db48a5e19521233c2a877f83b65fb6e7edca3257e4a55
-
SHA512
e32a53af3d886d38fb487908eb1d28b521be1c33dc5e31e6b747b0d80c293d39ce058426caf58f155a78355b49f38bdb8d673242e0833a97bf46fdf9effb14bc
-
SSDEEP
12288:mCc02cBN2iN/22wPCYdURiDssWe7KtPIfoAXttkBb0k85NgmgDiu14GBlT:mCc0nBN1F2RPdCmW6KtwfNteMHg1ikd
Malware Config
Extracted
nanocore
1.2.2.0
newsddawork.3utilities.com:1620
maxlogs.webhop.me:1620
1fa46b72-10f9-4da3-bc15-84dde165706d
-
activate_away_mode
true
-
backup_connection_host
maxlogs.webhop.me
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-02-17T03:41:10.727034736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1620
-
default_group
NewBin
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1fa46b72-10f9-4da3-bc15-84dde165706d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
newsddawork.3utilities.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NAT Service = "C:\\Program Files (x86)\\NAT Service\\natsv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3588 set thread context of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NAT Service\natsv.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\NAT Service\natsv.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4816 RegSvcs.exe 4816 RegSvcs.exe 4816 RegSvcs.exe 4816 RegSvcs.exe 4816 RegSvcs.exe 4816 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4816 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4816 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84 PID 3588 wrote to memory of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84 PID 3588 wrote to memory of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84 PID 3588 wrote to memory of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84 PID 3588 wrote to memory of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84 PID 3588 wrote to memory of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84 PID 3588 wrote to memory of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84 PID 3588 wrote to memory of 4816 3588 1e1afc422bdba3c73ad37db86fc86d1c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e1afc422bdba3c73ad37db86fc86d1c.exe"C:\Users\Admin\AppData\Local\Temp\1e1afc422bdba3c73ad37db86fc86d1c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4816
-