Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe
Resource
win7-20240903-en
General
-
Target
PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe
-
Size
232KB
-
MD5
d07af779817b39b6bcbc1fcdf2975251
-
SHA1
488bfa62a2fd93f5b1be98a3bc47c9bed90bfbf6
-
SHA256
3bd22b44d0b4a141383986eeef066479164316ab6dc14ce6c9c95365784e617b
-
SHA512
40dd24bb9159c21470098eb8272dd7c36f0e6c1b2f5a297bc3a5df53d740d758fc978259b7c6df26835f1bf01568a01e9c07e65316b8fe97506e4c170ad43d33
-
SSDEEP
3072:is7WyoaEZqhKH0oLRLlE/BP2Z1WbYb6VkJxWpFTT/0wmFT/3B5oRtHe8iG9/BPmy:3Roa/hK7X82BblY/T/2J5oRDN9JuftOB
Malware Config
Extracted
nanocore
1.2.2.0
swizz666.ddns.net:4141
127.0.0.1:4141
9e2d87fd-dfa6-4561-95f1-b9bc43662991
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
37.235.1.177
-
buffer_size
65535
-
build_time
2019-10-18T17:09:04.973830336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4141
-
default_group
LORDLORD
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
9e2d87fd-dfa6-4561-95f1-b9bc43662991
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
swizz666.ddns.net
-
primary_dns_server
37.235.1.174
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 37.235.1.177 Destination IP 37.235.1.177 Destination IP 37.235.1.174 Destination IP 37.235.1.177 Destination IP 37.235.1.174 Destination IP 37.235.1.174 Destination IP 37.235.1.177 Destination IP 37.235.1.177 Destination IP 37.235.1.174 Destination IP 37.235.1.174 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Subsystem = "C:\\Program Files (x86)\\WPA Subsystem\\wpass.exe" RegAsm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4336 set thread context of 4536 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 83 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WPA Subsystem\wpass.exe RegAsm.exe File created C:\Program Files (x86)\WPA Subsystem\wpass.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4536 RegAsm.exe 4536 RegAsm.exe 4536 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4536 RegAsm.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4536 RegAsm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4336 wrote to memory of 4388 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 82 PID 4336 wrote to memory of 4388 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 82 PID 4336 wrote to memory of 4388 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 82 PID 4336 wrote to memory of 4536 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 83 PID 4336 wrote to memory of 4536 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 83 PID 4336 wrote to memory of 4536 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 83 PID 4336 wrote to memory of 4536 4336 PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe"2⤵PID:4388
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE5294_EXPO_SCAN DOC_PDF.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4536
-