Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-07-2024 20:57

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/client.exe

  • Size

    130KB

  • MD5

    906a949e34472f99ba683eff21907231

  • SHA1

    7c5a57af209597fa6c6bce7d1a8016b936d3b0b6

  • SHA256

    9d3ea5af7dc261bf93c76f55d702a315aa22fb241e4207dc86cd834c262245c8

  • SHA512

    29fd20ae7f1b8bac831c0bb85da4325a62e10961989e14299f5f50776c8f7e669cc1527bf2c3868bd7230e73ac110ba8b1f0491ac0f2923d79d7a2871c7c961d

  • SSDEEP

    3072:pzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HI0AkU:pLV6Bta6dtJmakIM5VU

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\client.exe
    "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\client.exe"
    1⤵
    • Checks whether UAC is enabled
    PID:5064

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5064-0-0x00007FFEFAEE0000-0x00007FFEFB00A000-memory.dmp
    Filesize

    1.2MB

  • memory/5064-1-0x000000001C160000-0x000000001C62E000-memory.dmp
    Filesize

    4.8MB

  • memory/5064-2-0x000000001BB60000-0x000000001BBFC000-memory.dmp
    Filesize

    624KB

  • memory/5064-3-0x000000001C7E0000-0x000000001C886000-memory.dmp
    Filesize

    664KB

  • memory/5064-4-0x000000001BC40000-0x000000001BC48000-memory.dmp
    Filesize

    32KB

  • memory/5064-5-0x00007FFEFAEE0000-0x00007FFEFB00A000-memory.dmp
    Filesize

    1.2MB

  • memory/5064-7-0x000000001CAB0000-0x000000001CABA000-memory.dmp
    Filesize

    40KB

  • memory/5064-8-0x00007FFEFAEE0000-0x00007FFEFB00A000-memory.dmp
    Filesize

    1.2MB