Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe
Resource
win7-20240903-en
General
-
Target
PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe
-
Size
232KB
-
MD5
d07af779817b39b6bcbc1fcdf2975251
-
SHA1
488bfa62a2fd93f5b1be98a3bc47c9bed90bfbf6
-
SHA256
3bd22b44d0b4a141383986eeef066479164316ab6dc14ce6c9c95365784e617b
-
SHA512
40dd24bb9159c21470098eb8272dd7c36f0e6c1b2f5a297bc3a5df53d740d758fc978259b7c6df26835f1bf01568a01e9c07e65316b8fe97506e4c170ad43d33
-
SSDEEP
3072:is7WyoaEZqhKH0oLRLlE/BP2Z1WbYb6VkJxWpFTT/0wmFT/3B5oRtHe8iG9/BPmy:3Roa/hK7X82BblY/T/2J5oRDN9JuftOB
Malware Config
Extracted
nanocore
1.2.2.0
swizz666.ddns.net:4141
127.0.0.1:4141
9e2d87fd-dfa6-4561-95f1-b9bc43662991
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
37.235.1.177
-
buffer_size
65535
-
build_time
2019-10-18T17:09:04.973830336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4141
-
default_group
LORDLORD
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
9e2d87fd-dfa6-4561-95f1-b9bc43662991
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
swizz666.ddns.net
-
primary_dns_server
37.235.1.174
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 37.235.1.177 Destination IP 37.235.1.177 Destination IP 37.235.1.174 Destination IP 37.235.1.174 Destination IP 37.235.1.177 Destination IP 37.235.1.174 Destination IP 37.235.1.174 Destination IP 37.235.1.177 Destination IP 37.235.1.177 Destination IP 37.235.1.174 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UDP Manager = "C:\\Program Files (x86)\\UDP Manager\\udpmgr.exe" RegAsm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1620 set thread context of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\UDP Manager\udpmgr.exe RegAsm.exe File opened for modification C:\Program Files (x86)\UDP Manager\udpmgr.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 2524 RegAsm.exe 2524 RegAsm.exe 2524 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2524 RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2524 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30 PID 1620 wrote to memory of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30 PID 1620 wrote to memory of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30 PID 1620 wrote to memory of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30 PID 1620 wrote to memory of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30 PID 1620 wrote to memory of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30 PID 1620 wrote to memory of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30 PID 1620 wrote to memory of 2524 1620 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2524
-