Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-10-2024 16:22

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/PluginCompiler.exe

  • Size

    75KB

  • MD5

    e2d1c5df11f9573f6c5d0a7ad1a79fbf

  • SHA1

    b32bf571aca1b51af48f7f2f955aaf1bbdc5aa2f

  • SHA256

    0b41b2fcd0f1a4e913d3efe293f713849d59efebb27bac060ab31bed51ac2f6b

  • SHA512

    9c9ae7baa504dd34311f5730280f6a49e10eefdb145d2d29849e385a7da47c8f2c182cd6f39949f5904ef8462fc5c3dfaf1bc4cc8bff50c6750c9edc886192e0

  • SSDEEP

    1536:iyVzgm8NqToL6n975lw8FDx39EhPKu4iV1Y:iyVMLUTos5SAx3ChPKpiVe

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\PluginCompiler.exe
    "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\PluginCompiler.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2708-0-0x00007FF91F115000-0x00007FF91F116000-memory.dmp

    Filesize

    4KB

  • memory/2708-1-0x000000001B090000-0x000000001B136000-memory.dmp

    Filesize

    664KB

  • memory/2708-2-0x00007FF91EE60000-0x00007FF91F801000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-3-0x000000001B610000-0x000000001BADE000-memory.dmp

    Filesize

    4.8MB

  • memory/2708-5-0x00007FF91EE60000-0x00007FF91F801000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-4-0x000000001BC10000-0x000000001BCAC000-memory.dmp

    Filesize

    624KB

  • memory/2708-6-0x000000001AF80000-0x000000001AF88000-memory.dmp

    Filesize

    32KB

  • memory/2708-7-0x000000001BE70000-0x000000001BEBC000-memory.dmp

    Filesize

    304KB

  • memory/2708-8-0x00007FF91EE60000-0x00007FF91F801000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-9-0x00007FF91EE60000-0x00007FF91F801000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-10-0x00007FF91F115000-0x00007FF91F116000-memory.dmp

    Filesize

    4KB

  • memory/2708-11-0x00007FF91EE60000-0x00007FF91F801000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-12-0x00007FF91EE60000-0x00007FF91F801000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-14-0x00007FF91EE60000-0x00007FF91F801000-memory.dmp

    Filesize

    9.6MB

  • memory/2708-15-0x00007FF91EE60000-0x00007FF91F801000-memory.dmp

    Filesize

    9.6MB