Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 02:23
Behavioral task
behavioral1
Sample
a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe
Resource
win7-20240903-en
General
-
Target
a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe
-
Size
553KB
-
MD5
3b4ee472d9c872ba1d96b7a676e809ba
-
SHA1
33186a216fe8a37a993f42477b8f813a56ba5f09
-
SHA256
a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164
-
SHA512
22d93c0656d9ebb8f0e33497e2d02ecf8a9f160fff07620f0dfbd022b8449b99ae3d5dccb3d2f65f555d99415489bfcc4856eba3d87c2158c68c3922216e4985
-
SSDEEP
12288:iLV6BtpmkjDwb1bL/mZyysVSX/GFFcEvz20Q3CE+A2whXXAo2RB:AApfy16yDSOzFvz20A7lXqB
Malware Config
Signatures
-
Nanocore family
-
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NTFS Manager = "C:\\Program Files (x86)\\NTFS Manager\\ntfsmgr.exe" a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NTFS Manager\ntfsmgr.exe a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe File opened for modification C:\Program Files (x86)\NTFS Manager\ntfsmgr.exe a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2488 a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe"C:\Users\Admin\AppData\Local\Temp\a317bcadef76feec57223d92244a322eb4409990808a7bab96cc929fbc4a7164.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2488