Resubmissions
13-08-2024 15:25
240813-sts6ls1eld 713-08-2024 15:24
240813-ss8vns1drf 713-08-2024 15:22
240813-sr9eta1dmb 713-08-2024 15:13
240813-slr9cavhlr 713-08-2024 07:43
240813-jkfpgswelk 10Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 07:43
Behavioral task
behavioral1
Sample
cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe
Resource
win7-20240705-en
General
-
Target
cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe
-
Size
926KB
-
MD5
cc5881eb57b7fcdcca4ce8e4d3dd8e20
-
SHA1
26265ef01f129f75ad2f6e9cccedcf836f09a835
-
SHA256
b4b7ccaf9c79cbedbce42273d701e468c423d5a9c6d175f0a47ec8eb97d8c109
-
SHA512
10c85317d92d8b609cb182413bbe392d65ba82d32c704b65eecf6e90e92bd419cd3a82d0b0a4eae65f5d0b9e6e7736352232686fc68b989a152952256f84ab1d
-
SSDEEP
24576:Hrl6kD68JmloLQfgqu4Dij/f7HcAdmjKt0OkhgL:Ll328U2kfc4Kf7HlFTL
Malware Config
Extracted
nanocore
1.2.2.0
motherpure.duckdns.org:3920
185.214.10.57:3920
bf795df6-2075-40d9-84eb-258bd0bbe097
-
activate_away_mode
false
-
backup_connection_host
185.214.10.57
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-02-22T15:40:23.303555136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
3920
-
default_group
MAY13
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
bf795df6-2075-40d9-84eb-258bd0bbe097
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
motherpure.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
resource yara_rule behavioral1/memory/2764-0-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-1-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-2-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-20-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-21-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-25-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-26-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-27-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-28-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-29-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-30-0x00000000001A0000-0x000000000039A000-memory.dmp upx behavioral1/memory/2764-31-0x00000000001A0000-0x000000000039A000-memory.dmp upx -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2764-1-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-2-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-20-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-21-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-25-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-26-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-27-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-28-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-29-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-30-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/memory/2764-31-0x00000000001A0000-0x000000000039A000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2764 set thread context of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2852 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31 PID 2764 wrote to memory of 2852 2764 cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe"C:\Users\Admin\AppData\Local\Temp\cc5881eb57b7fcdcca4ce8e4d3dd8e20N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2852
-