Analysis
-
max time kernel
118s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 08:05
Static task
static1
Behavioral task
behavioral1
Sample
99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe
Resource
win7-20241023-en
General
-
Target
99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe
-
Size
254KB
-
MD5
d2672e8be8f517e02f29be484b1bc3a0
-
SHA1
f8b2d116a750a24c1bef9657365c3daeb203cad3
-
SHA256
99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9
-
SHA512
b44e5f4d3ceb6fe48a66cfff8347a5158d9bf15b53d90c3ea1d930759b43d8720bb61b6b96ab8f9e6e7f638482e1526573c7414a0aeccd5d5c03b5ff98bfc33b
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQlog:EeGUA5YZazpXUmZhSog
Malware Config
Extracted
nanocore
1.2.2.0
sysupdate24.ddns.net:45400
ae82ab7f-db07-49ee-9d2b-76075d76f37f
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65535
-
build_time
2020-04-24T17:41:53.492468936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
45400
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ae82ab7f-db07-49ee-9d2b-76075d76f37f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
sysupdate24.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Executes dropped EXE 2 IoCs
Processes:
a1punf5t2of.exea1punf5t2of.exepid Process 2880 a1punf5t2of.exe 2668 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
Processes:
99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exea1punf5t2of.exepid Process 1736 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe 2880 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe -
Processes:
a1punf5t2of.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a1punf5t2of.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a1punf5t2of.exedescription pid Process procid_target PID 2880 set thread context of 2668 2880 a1punf5t2of.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a1punf5t2of.exe99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
a1punf5t2of.exepid Process 2668 a1punf5t2of.exe 2668 a1punf5t2of.exe 2668 a1punf5t2of.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
a1punf5t2of.exepid Process 2668 a1punf5t2of.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a1punf5t2of.exedescription pid Process Token: SeDebugPrivilege 2668 a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exea1punf5t2of.exedescription pid Process procid_target PID 1736 wrote to memory of 2880 1736 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe 31 PID 1736 wrote to memory of 2880 1736 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe 31 PID 1736 wrote to memory of 2880 1736 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe 31 PID 1736 wrote to memory of 2880 1736 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe 31 PID 1736 wrote to memory of 2880 1736 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe 31 PID 1736 wrote to memory of 2880 1736 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe 31 PID 1736 wrote to memory of 2880 1736 99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe 31 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32 PID 2880 wrote to memory of 2668 2880 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe"C:\Users\Admin\AppData\Local\Temp\99332453c5a5dff57507cc6f75213e246b284a6a4cb234bd8d1c8d19375441f9N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD53f8a4373527e2422bf37e60e7f2b1e59
SHA147697fca30bb8d418c5a81985befe79a5fae9ae9
SHA256b82b2582142298183500a63149ba06eb3121721028bef05cdc17470b5cb6d9d3
SHA51246cdd16081166d08f2abbc362445cd1ffbc225c9121ac457d9406d71ff3944d3c303d8ee6d515b470172acda3770e08c26a7af5b24e456abf1709380dfc662ce