Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
56fae07d0d9ee560ef2fb4c536868b11.exe
Resource
win7-20240708-en
General
-
Target
56fae07d0d9ee560ef2fb4c536868b11.exe
-
Size
699KB
-
MD5
56fae07d0d9ee560ef2fb4c536868b11
-
SHA1
1ebcf170ce900f63a7238ad710cedbe1cfc712be
-
SHA256
b3ecfad7812c038effe03852fe7794bd52d291a97d858245c48ba8fd8408e131
-
SHA512
d32341d1e6a242a1f093c6ca7efcd73e512e90343dbdafa0efe66881f5d40db1a93dcf6fb64ce3f2bd39ea54457d98421cb54805c6f378fedabc1cefc16ce541
-
SSDEEP
12288:FnMuCLXNc0xC0eQJNPPFW1HJmLCstwCD5Nyk9wYKHsXUB0vioVUp24Ebp:FMfLXNcECriN1W1HJ4UCD7KJB06oVUp
Malware Config
Extracted
nanocore
1.2.2.0
newsddawork.3utilities.com:1620
maxlogs.webhop.me:1620
1fa46b72-10f9-4da3-bc15-84dde165706d
-
activate_away_mode
true
-
backup_connection_host
maxlogs.webhop.me
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-02-17T03:41:10.727034736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1620
-
default_group
NewBin
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
1fa46b72-10f9-4da3-bc15-84dde165706d
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
newsddawork.3utilities.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Service = "C:\\Program Files (x86)\\DPI Service\\dpisv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3400 set thread context of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DPI Service\dpisv.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\DPI Service\dpisv.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 2620 RegSvcs.exe 2620 RegSvcs.exe 2620 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3400 56fae07d0d9ee560ef2fb4c536868b11.exe Token: SeDebugPrivilege 2620 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3400 wrote to memory of 1272 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 85 PID 3400 wrote to memory of 1272 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 85 PID 3400 wrote to memory of 1272 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 85 PID 3400 wrote to memory of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86 PID 3400 wrote to memory of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86 PID 3400 wrote to memory of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86 PID 3400 wrote to memory of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86 PID 3400 wrote to memory of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86 PID 3400 wrote to memory of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86 PID 3400 wrote to memory of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86 PID 3400 wrote to memory of 2620 3400 56fae07d0d9ee560ef2fb4c536868b11.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\56fae07d0d9ee560ef2fb4c536868b11.exe"C:\Users\Admin\AppData\Local\Temp\56fae07d0d9ee560ef2fb4c536868b11.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2620
-