Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 02:21

General

  • Target

    54bf1a46ebdcca78b7dd2ef7a497aacf0cb6ed2745d64b296e98859f11c80154N.exe

  • Size

    210KB

  • MD5

    18323bd9db3060c3ec9230d324c3b2c0

  • SHA1

    7589b3a69d0e0e5ed00189b023933824c60cdf3c

  • SHA256

    54bf1a46ebdcca78b7dd2ef7a497aacf0cb6ed2745d64b296e98859f11c80154

  • SHA512

    9dc90a029531b76df44192d0788973266a3a38aae93f8a7f12b0d7dc6383d3496bef6b8f08d45cb51316c3457e880dd2d30a216675025cb13459f6362298e8fc

  • SSDEEP

    3072:yzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HISv2X6ecnziHRCWuzu/gBuFAUG:yLV6Bta6dtJmakIM572GnWaQgyhMd

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\54bf1a46ebdcca78b7dd2ef7a497aacf0cb6ed2745d64b296e98859f11c80154N.exe
    "C:\Users\Admin\AppData\Local\Temp\54bf1a46ebdcca78b7dd2ef7a497aacf0cb6ed2745d64b296e98859f11c80154N.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks.exe" /create /f /tn "WPA Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp60AE.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4132
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks.exe" /create /f /tn "WPA Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp611C.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp60AE.tmp

    Filesize

    1KB

    MD5

    78b7deea88b4d507bf724df7785d21df

    SHA1

    4f9441ad9ff2f13b5da89498e9bb47b18a09b98c

    SHA256

    1595b43755bdbcefb7aeb79cf16b426fa98d3021dc986a501603dad3156f5c7d

    SHA512

    707ac62117261c411cdfc21c7fc7c8d3f2fa2e20a2dfd9008e18830229f6745fb41c86416b29fdfcb5dac7214a19e9e5926e215c940142020c19ac08ae146654

  • C:\Users\Admin\AppData\Local\Temp\tmp611C.tmp

    Filesize

    1KB

    MD5

    f8b4a088f8a23af5ab665d558da13b51

    SHA1

    d092ef34db6223767f42b180d3d4a01bc71d9116

    SHA256

    cdf22dfcbfbc3f203f91dd9b6746f3c7802e5b914105c27ea4f1e63a82bc4ca7

    SHA512

    b4a6aabb63c8f444082d7c1daf2698319293c79e94c90f8c3d7cd25ecba92f03497a68d3f7415d5f1a0f7b5c1f8dd2147da33ce782e6e71bd209470e540f1fdb

  • memory/4844-17-0x000000001D370000-0x000000001D38E000-memory.dmp

    Filesize

    120KB

  • memory/4844-28-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-4-0x000000001C860000-0x000000001C906000-memory.dmp

    Filesize

    664KB

  • memory/4844-5-0x000000001C7A0000-0x000000001C7A8000-memory.dmp

    Filesize

    32KB

  • memory/4844-6-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-7-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-2-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-1-0x000000001C080000-0x000000001C54E000-memory.dmp

    Filesize

    4.8MB

  • memory/4844-15-0x000000001D160000-0x000000001D16A000-memory.dmp

    Filesize

    40KB

  • memory/4844-16-0x000000001C920000-0x000000001C92C000-memory.dmp

    Filesize

    48KB

  • memory/4844-30-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-3-0x000000001C5F0000-0x000000001C68C000-memory.dmp

    Filesize

    624KB

  • memory/4844-21-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-20-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-19-0x000000001D4E0000-0x000000001D4EA000-memory.dmp

    Filesize

    40KB

  • memory/4844-22-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-23-0x00007FFFFF8F5000-0x00007FFFFF8F6000-memory.dmp

    Filesize

    4KB

  • memory/4844-24-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-25-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-26-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-27-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-18-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-29-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4844-0-0x00007FFFFF8F5000-0x00007FFFFF8F6000-memory.dmp

    Filesize

    4KB