Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
56fae07d0d9ee560ef2fb4c536868b11.exe
Resource
win7-20240708-en
General
-
Target
56fae07d0d9ee560ef2fb4c536868b11.exe
-
Size
699KB
-
MD5
56fae07d0d9ee560ef2fb4c536868b11
-
SHA1
1ebcf170ce900f63a7238ad710cedbe1cfc712be
-
SHA256
b3ecfad7812c038effe03852fe7794bd52d291a97d858245c48ba8fd8408e131
-
SHA512
d32341d1e6a242a1f093c6ca7efcd73e512e90343dbdafa0efe66881f5d40db1a93dcf6fb64ce3f2bd39ea54457d98421cb54805c6f378fedabc1cefc16ce541
-
SSDEEP
12288:FnMuCLXNc0xC0eQJNPPFW1HJmLCstwCD5Nyk9wYKHsXUB0vioVUp24Ebp:FMfLXNcECriN1W1HJ4UCD7KJB06oVUp
Malware Config
Extracted
nanocore
1.2.2.0
newsddawork.3utilities.com:1620
maxlogs.webhop.me:1620
1fa46b72-10f9-4da3-bc15-84dde165706d
-
activate_away_mode
true
-
backup_connection_host
maxlogs.webhop.me
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-02-17T03:41:10.727034736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1620
-
default_group
NewBin
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1fa46b72-10f9-4da3-bc15-84dde165706d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
newsddawork.3utilities.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ARP Manager = "C:\\Program Files (x86)\\ARP Manager\\arpmgr.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2928 set thread context of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\ARP Manager\arpmgr.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\ARP Manager\arpmgr.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2644 RegSvcs.exe 2644 RegSvcs.exe 2644 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2644 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30 PID 2928 wrote to memory of 2644 2928 56fae07d0d9ee560ef2fb4c536868b11.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\56fae07d0d9ee560ef2fb4c536868b11.exe"C:\Users\Admin\AppData\Local\Temp\56fae07d0d9ee560ef2fb4c536868b11.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2644
-