Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe
Resource
win7-20240903-en
General
-
Target
ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe
-
Size
1.4MB
-
MD5
efc521e6f288f225af4d3cc8fcb445f0
-
SHA1
b6913be5783c7a3ce919dd7c367141fbb39da1c7
-
SHA256
ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5
-
SHA512
32b7da7549fff982ce50cf9ecc2a204199b71c1dda6282fe63151981782e98774cd2bff7d57cb8472e3782e0d71e38e650508b1af8dd54b57052eddcae58e2f4
-
SSDEEP
24576:6AHnh+eWsN3skA4RV1Hom2KXMmHaYDBNkmBRGEMdSR5ADIAsG/jJ45N:Nh+ZkldoPK8YaZSeIAmN
Malware Config
Extracted
nanocore
1.2.2.0
bnow.duckdns.org:4156
fc4000c4-f8ec-42dc-a0ad-1edfd7548ceb
-
activate_away_mode
true
-
backup_connection_host
bnow.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-08-20T04:39:27.808758936Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4156
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
fc4000c4-f8ec-42dc-a0ad-1edfd7548ceb
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
bnow.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
igfxEM.exeigfxEM.exepid Process 2176 igfxEM.exe 1736 igfxEM.exe -
Loads dropped DLL 1 IoCs
Processes:
igfxEM.exepid Process 2176 igfxEM.exe -
Processes:
RegAsm.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0007000000016db5-23.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exeigfxEM.exeigfxEM.exedescription pid Process procid_target PID 944 set thread context of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 2176 set thread context of 1796 2176 igfxEM.exe 38 PID 1736 set thread context of 2112 1736 igfxEM.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exeRegAsm.exeschtasks.exeschtasks.exeigfxEM.exeec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exeRegAsm.exeigfxEM.exeRegAsm.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxEM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxEM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 1300 schtasks.exe 2832 schtasks.exe 2028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
RegAsm.exepid Process 3040 RegAsm.exe 3040 RegAsm.exe 3040 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegAsm.exepid Process 3040 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid Process Token: SeDebugPrivilege 3040 RegAsm.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exeRegAsm.exetaskeng.exeigfxEM.exeigfxEM.exedescription pid Process procid_target PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 944 wrote to memory of 3040 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 31 PID 3040 wrote to memory of 1300 3040 RegAsm.exe 32 PID 3040 wrote to memory of 1300 3040 RegAsm.exe 32 PID 3040 wrote to memory of 1300 3040 RegAsm.exe 32 PID 3040 wrote to memory of 1300 3040 RegAsm.exe 32 PID 944 wrote to memory of 2832 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 34 PID 944 wrote to memory of 2832 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 34 PID 944 wrote to memory of 2832 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 34 PID 944 wrote to memory of 2832 944 ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe 34 PID 2700 wrote to memory of 2176 2700 taskeng.exe 37 PID 2700 wrote to memory of 2176 2700 taskeng.exe 37 PID 2700 wrote to memory of 2176 2700 taskeng.exe 37 PID 2700 wrote to memory of 2176 2700 taskeng.exe 37 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 1796 2176 igfxEM.exe 38 PID 2176 wrote to memory of 2028 2176 igfxEM.exe 39 PID 2176 wrote to memory of 2028 2176 igfxEM.exe 39 PID 2176 wrote to memory of 2028 2176 igfxEM.exe 39 PID 2176 wrote to memory of 2028 2176 igfxEM.exe 39 PID 2700 wrote to memory of 1736 2700 taskeng.exe 42 PID 2700 wrote to memory of 1736 2700 taskeng.exe 42 PID 2700 wrote to memory of 1736 2700 taskeng.exe 42 PID 2700 wrote to memory of 1736 2700 taskeng.exe 42 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43 PID 1736 wrote to memory of 2112 1736 igfxEM.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe"C:\Users\Admin\AppData\Local\Temp\ec056f78952b9f467a03740f0f70cc96b4739a625a8f418dc947358bf466f9a5N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UDP Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpED0D.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1300
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn azroles /tr "C:\Users\Admin\WinSAT\igfxEM.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7552B309-6CC3-46B3-A16C-EA635D8AB3F8} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\WinSAT\igfxEM.exeC:\Users\Admin\WinSAT\igfxEM.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn azroles /tr "C:\Users\Admin\WinSAT\igfxEM.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2028
-
-
-
C:\Users\Admin\WinSAT\igfxEM.exeC:\Users\Admin\WinSAT\igfxEM.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c6f0625bf4c1cdfb699980c9243d3b22
SHA143de1fe580576935516327f17b5da0c656c72851
SHA2568dfc4e937f0b2374e3ced25fce344b0731cf44b8854625b318d50ece2da8f576
SHA5129ef2dbd4142ad0e1e6006929376ecb8011e7ffc801ee2101e906787d70325ad82752df65839de9972391fa52e1e5974ec1a5c7465a88aa56257633ebb7d70969
-
Filesize
1.4MB
MD5560bb615c7de76d30c825854e4b84c09
SHA16de84289d41b77f3e09440c8367ea1837fa1dcb5
SHA256bb9944660e692a0d93084aee16245c31c0a2b7c0618baeeee0940a7bcfe7fc85
SHA512e173d1dde7abec6724bb50e8f441a0ec3f27f04ea55dc9601b8c7094f6ca1cb467fa9f65dd79e473244b459126e6d4c27d5ed3634d91e81dac81f076e04fc59c
-
Filesize
719B
MD542dea1331ee8a83bddfd0b56484e54a9
SHA1d3d471e9e6887ae56c7d80e62b6a445170e93bea
SHA25686ce08eb87d23aad30a25468cc958718f75a3b31666c0673eda87330688baa9e
SHA512b6f4fbaf84a28ede396814d239243d38391d013810f8966f5e54317393b319b01226a0cad1d70d50be7e2ea3872e6caa021e626492548476500744b24b99c27c