Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 13:39

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/Plugins/DucPlugin.ncp

  • Size

    73KB

  • MD5

    5eca68a8368e0e144b7016e30b85515c

  • SHA1

    0ba48b49974156e5746958aeeb1c2a26c916b3be

  • SHA256

    e2ce89b3e68b003cb27e2c5652ccba073c8938bef194e51830539b2464a3f676

  • SHA512

    ea1d1363fb072a5c646ce070184855588124be42392dc492ce86c88fe93eae78e23f5de4f2df75fb5b0e8d67bf08ff192dd163ed3c62a1ccfb0b8436ae1df644

  • SSDEEP

    1536:u2iS9wNtywVjssrt1dY4vFP0A2vKZKxA6zghoS0Lunqq:uBS2NtywVrTd1J0FvKZKlCye/

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\Plugins\DucPlugin.ncp"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\Plugins\DucPlugin.ncp
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\Plugins\DucPlugin.ncp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8a70b8a7ab68095b2ce1c37f9a2f871c

    SHA1

    4c000929f9044630eeba1708a50c28e13ab9b190

    SHA256

    b75f79e7162420b85f6faa509b64020d531691b47dc414c7eee76e4f5b70ecd7

    SHA512

    5d18236bdca4a43f36cd967f5af598cd052235cc7e59a2da3194fdfe669c5405396e8deff7345c4021d9c5208e02a5110906821da4e101494f2d6caa60cb86ef