Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
0963bc4f2ef5031a2d6c9848951a8740N.exe
Resource
win7-20240704-en
General
-
Target
0963bc4f2ef5031a2d6c9848951a8740N.exe
-
Size
281KB
-
MD5
0963bc4f2ef5031a2d6c9848951a8740
-
SHA1
3bcf4db3aee7d41f8633aefe6b1be24c4ca0adfa
-
SHA256
909e82bca80a6c377b2ea644d17c9c20d2eda279b95327191fcd21dac6067d25
-
SHA512
3249ccd49dd93b18ec659a5f8ab6ea96c57ec5288d2aeea7d07c3a0743c6d9405ff6427d0adb4c6508470e9e1233e42e96df2e70f74fabd464fac816f37bf88a
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfT:boSeGUA5YZazpXUmZhZ6SS
Malware Config
Extracted
nanocore
1.2.2.0
sysupdate24.ddns.net:45400
ae82ab7f-db07-49ee-9d2b-76075d76f37f
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65535
-
build_time
2020-04-24T17:41:53.492468936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
45400
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ae82ab7f-db07-49ee-9d2b-76075d76f37f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
sysupdate24.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 0963bc4f2ef5031a2d6c9848951a8740N.exe -
Executes dropped EXE 2 IoCs
pid Process 2644 a1punf5t2of.exe 824 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 0963bc4f2ef5031a2d6c9848951a8740N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a1punf5t2of.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 824 2644 a1punf5t2of.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0963bc4f2ef5031a2d6c9848951a8740N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 824 a1punf5t2of.exe 824 a1punf5t2of.exe 824 a1punf5t2of.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 824 a1punf5t2of.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 824 a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4168 wrote to memory of 2644 4168 0963bc4f2ef5031a2d6c9848951a8740N.exe 96 PID 4168 wrote to memory of 2644 4168 0963bc4f2ef5031a2d6c9848951a8740N.exe 96 PID 4168 wrote to memory of 2644 4168 0963bc4f2ef5031a2d6c9848951a8740N.exe 96 PID 2644 wrote to memory of 824 2644 a1punf5t2of.exe 97 PID 2644 wrote to memory of 824 2644 a1punf5t2of.exe 97 PID 2644 wrote to memory of 824 2644 a1punf5t2of.exe 97 PID 2644 wrote to memory of 824 2644 a1punf5t2of.exe 97 PID 2644 wrote to memory of 824 2644 a1punf5t2of.exe 97 PID 2644 wrote to memory of 824 2644 a1punf5t2of.exe 97 PID 2644 wrote to memory of 824 2644 a1punf5t2of.exe 97 PID 2644 wrote to memory of 824 2644 a1punf5t2of.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\0963bc4f2ef5031a2d6c9848951a8740N.exe"C:\Users\Admin\AppData\Local\Temp\0963bc4f2ef5031a2d6c9848951a8740N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD575278c8555d1eda7b3e57bacdb685339
SHA11eb861f2b4f65090d21f1f6f0176a50a37a37abe
SHA25638e37ac9bee90231c6c400e89fe7bfb5a59a27d778a6ec976cbfa5e827b077e9
SHA512f403f8109da1cec17e449a5df77e67fe6156be3211a1d4b46947e61ab062d76d3d97213a34972fc2e4f0e29ac1b4861add6ebd667dea6942ac8bce390d264187