Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
38f9027db5db0e80bf54fd0b58834c4e41832fcb5823de688e73b8729c320252.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38f9027db5db0e80bf54fd0b58834c4e41832fcb5823de688e73b8729c320252.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
lbkefhzm.exe
Resource
win7-20240705-en
General
-
Target
lbkefhzm.exe
-
Size
194KB
-
MD5
df94c0e13e9170afcde2c5fed16a3600
-
SHA1
1190674c6027614ba60ae23d44f469707ec500fc
-
SHA256
2610d8a1362ee28e59bc811d63e8d5c63e6021f94635be9a6c0921c6e62c98b2
-
SHA512
85a0ff0bf2824ac55430dddf967a02ebfc9145159255b148cced9aafc277b66dbc02fad97270fcb7b96a81b378a14ebd10d642884f05347b6278a5f6025a98f0
-
SSDEEP
3072:yDM3BbjHUffrVYDdJuNFS+gwRiz+iGxKmlGsEgSYRIuAg0FujwZ3UMk53:yDIKr0Pu7SPy4+i3MAOGI3
Malware Config
Extracted
nanocore
1.2.2.0
multipleentry90dayscontroller.homingbeacon.net:54980
6df769ca-fa90-4d27-be6c-663c699e6628
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-07-28T11:56:28.201018636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
54980
-
default_group
K59
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
6df769ca-fa90-4d27-be6c-663c699e6628
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
multipleentry90dayscontroller.homingbeacon.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwsscwwgp = "C:\\Users\\Admin\\AppData\\Roaming\\lhhqavvfo\\okttpyiien.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\lbkefhzm.exe\"" lbkefhzm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Subsystem = "C:\\Program Files (x86)\\WAN Subsystem\\wanss.exe" lbkefhzm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lbkefhzm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3524 set thread context of 2612 3524 lbkefhzm.exe 87 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WAN Subsystem\wanss.exe lbkefhzm.exe File opened for modification C:\Program Files (x86)\WAN Subsystem\wanss.exe lbkefhzm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbkefhzm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbkefhzm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2612 lbkefhzm.exe 2612 lbkefhzm.exe 2612 lbkefhzm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2612 lbkefhzm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3524 lbkefhzm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2612 lbkefhzm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2612 3524 lbkefhzm.exe 87 PID 3524 wrote to memory of 2612 3524 lbkefhzm.exe 87 PID 3524 wrote to memory of 2612 3524 lbkefhzm.exe 87 PID 3524 wrote to memory of 2612 3524 lbkefhzm.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\lbkefhzm.exe"C:\Users\Admin\AppData\Local\Temp\lbkefhzm.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\lbkefhzm.exe"C:\Users\Admin\AppData\Local\Temp\lbkefhzm.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2612
-