Malware Analysis Report

2024-10-19 07:05

Sample ID 240805-d3m9dswaql
Target NanoCore 1.2.2.0_Cracked By Alcatraz3222.rar
SHA256 ceb348dfa61b34bebce021fa783b0afdb874ea7205f75e7fb42b01898439be75
Tags
nanocore discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ceb348dfa61b34bebce021fa783b0afdb874ea7205f75e7fb42b01898439be75

Threat Level: Known bad

The file NanoCore 1.2.2.0_Cracked By Alcatraz3222.rar was found to be: Known bad.

Malicious Activity Summary

nanocore discovery

Nanocore family

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-05 03:32

Signatures

Nanocore family

nanocore

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-05 03:32

Reported

2024-08-05 03:35

Platform

win7-20240729-en

Max time kernel

26s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe

"C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe"

Network

Country Destination Domain Proto
N/A 10.127.0.1:5351 udp
US 8.8.8.8:53 lazyshare.net udp
US 35.212.156.187:80 lazyshare.net tcp

Files

memory/3048-0-0x0000000074401000-0x0000000074402000-memory.dmp

memory/3048-1-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-2-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-3-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-4-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-5-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-6-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-7-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-14-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-15-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-17-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-20-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-21-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-22-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-23-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-24-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-25-0x0000000074400000-0x00000000749AB000-memory.dmp

memory/3048-26-0x0000000074400000-0x00000000749AB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-05 03:32

Reported

2024-08-05 03:33

Platform

win10v2004-20240802-en

Max time kernel

33s

Max time network

35s

Command Line

"C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe

"C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 lazyshare.net udp
US 35.212.156.187:80 lazyshare.net tcp
N/A 10.127.0.1:5351 udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp

Files

memory/4656-0-0x00000000751A2000-0x00000000751A3000-memory.dmp

memory/4656-1-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-2-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-3-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-4-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-5-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-6-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-7-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-8-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-9-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-16-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-19-0x00000000751A2000-0x00000000751A3000-memory.dmp

memory/4656-20-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-22-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-23-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-24-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-25-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-26-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-27-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-28-0x00000000751A0000-0x0000000075751000-memory.dmp

memory/4656-29-0x00000000751A0000-0x0000000075751000-memory.dmp