Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
Accelya NDC SPRK.scr.exe
Resource
win7-20240708-en
General
-
Target
Accelya NDC SPRK.scr.exe
-
Size
1.0MB
-
MD5
15bd4ca6b9d238c9eca4159e5ac550c7
-
SHA1
b184f22c346fc02f7eb98d979434cb5ee945cb05
-
SHA256
8bdde20f5655fa32fc546f3b4e66b3b2a2872c0e55a73c377245808ffd218829
-
SHA512
e16c4be80024ae7bba60679801d68df24f5ead6167974f93a97db585adb285f23292404b7a93c45711d014e3f925336180d25e3e898d4a9fe6d611c1466a6074
-
SSDEEP
24576:Mnpn/lsoEJvYWVX7UiLS2z+Q++D00BKidflm3ilPm:MnpnN3oYALU12z+UDjBKQl4v
Malware Config
Extracted
nanocore
1.2.2.0
e-businessloader.mywire.org:5230
127.0.0.1:5230
0be0e5d9-4209-4f88-b4fe-27e7b678a0b5
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-03-16T21:32:38.702958636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5230
-
default_group
e-business
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
0be0e5d9-4209-4f88-b4fe-27e7b678a0b5
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
e-businessloader.mywire.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1460 created 3484 1460 Accelya NDC SPRK.scr.exe 56 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Amtjh = "C:\\Users\\Admin\\AppData\\Roaming\\Amtjh.exe" Accelya NDC SPRK.scr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1460 set thread context of 4532 1460 Accelya NDC SPRK.scr.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Accelya NDC SPRK.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1460 Accelya NDC SPRK.scr.exe 4532 InstallUtil.exe 4532 InstallUtil.exe 4532 InstallUtil.exe 4532 InstallUtil.exe 4532 InstallUtil.exe 4532 InstallUtil.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4532 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1460 Accelya NDC SPRK.scr.exe Token: SeDebugPrivilege 1460 Accelya NDC SPRK.scr.exe Token: SeDebugPrivilege 4532 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1460 wrote to memory of 4532 1460 Accelya NDC SPRK.scr.exe 86 PID 1460 wrote to memory of 4532 1460 Accelya NDC SPRK.scr.exe 86 PID 1460 wrote to memory of 4532 1460 Accelya NDC SPRK.scr.exe 86 PID 1460 wrote to memory of 4532 1460 Accelya NDC SPRK.scr.exe 86 PID 1460 wrote to memory of 4532 1460 Accelya NDC SPRK.scr.exe 86 PID 1460 wrote to memory of 4532 1460 Accelya NDC SPRK.scr.exe 86 PID 1460 wrote to memory of 4532 1460 Accelya NDC SPRK.scr.exe 86 PID 1460 wrote to memory of 4532 1460 Accelya NDC SPRK.scr.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\Accelya NDC SPRK.scr.exe"C:\Users\Admin\AppData\Local\Temp\Accelya NDC SPRK.scr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4532
-