Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 13:39

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/AIO.ncp

  • Size

    17KB

  • MD5

    60c274ccb344da9e3d77449f6068d253

  • SHA1

    ab25eddf3ddb61ef52104a01e5c9b8a23451c764

  • SHA256

    0a59aaee013c57f3b6190d683160d88ca1c5868565cbf5acbb7b17d3e925c602

  • SHA512

    9600d852b56557f31a5a18a6aa2cb76cf4fabf36ae32bbeccf82677f64737542234e2fb06ac8d917f9839120320b7db212d76e8dea24445f13096d86a474b9c9

  • SSDEEP

    384:tBB6il6AmsofAub5qtzvqdY2Tdpf5Tbb9:t5ARsYb5q1qaKb9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\Plugins\AIO.ncp"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\Plugins\AIO.ncp
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\Plugins\AIO.ncp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    cb415db9237af809a1f261271bb591ad

    SHA1

    f7c2b91f3b3fb138096a8084b7f873a1351df43e

    SHA256

    0359e8584d6b37cf4f01782e9e9da780418eae06a112c4f0926e31383d06b000

    SHA512

    79e3019c17116dbaadf3c5549e5415a70ae301d014f8a5f3b2c8ba97eaecbd0ab9ad3c3047df7ecf7cc8fb73370b27cf2573637e9fc03c2430bc86f2a6ff17d5