Analysis Overview
SHA256
2891d3f5c09b5c18946ee0dd7b6274b682b32f591c77cdaa140fff29856e1ceb
Threat Level: Known bad
The file imapsvc.exe was found to be: Known bad.
Malicious Activity Summary
Nanocore family
NanoCore
Checks whether UAC is enabled
Adds Run key to start application
Drops file in Program Files directory
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-12 18:26
Signatures
Nanocore family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-12 18:26
Reported
2024-11-12 18:27
Platform
win10v2004-20241007-en
Max time kernel
15s
Max time network
13s
Command Line
Signatures
NanoCore
Nanocore family
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Host = "C:\\Program Files (x86)\\DHCP Host\\dhcphost.exe" | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files (x86)\DHCP Host\dhcphost.exe | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
| File created | C:\Program Files (x86)\DHCP Host\dhcphost.exe | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2060 wrote to memory of 3996 | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2060 wrote to memory of 3996 | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2060 wrote to memory of 3996 | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2060 wrote to memory of 3632 | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2060 wrote to memory of 3632 | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | C:\Windows\SysWOW64\schtasks.exe |
| PID 2060 wrote to memory of 3632 | N/A | C:\Users\Admin\AppData\Local\Temp\imapsvc.exe | C:\Windows\SysWOW64\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\imapsvc.exe
"C:\Users\Admin\AppData\Local\Temp\imapsvc.exe"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DHCP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmpD86E.tmp"
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DHCP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpD8CD.tmp"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nanocore3317.ddns.net | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.208.201.84.in-addr.arpa | udp |
| US | 8.8.4.4:53 | nanocore3317.ddns.net | udp |
| US | 8.8.8.8:53 | nanocore3317.ddns.net | udp |
| US | 8.8.8.8:53 | 4.4.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | nanocore3317.ddns.net | udp |
| US | 8.8.4.4:53 | nanocore3317.ddns.net | udp |
| US | 8.8.8.8:53 | nanocore3317.ddns.net | udp |
| US | 8.8.4.4:53 | nanocore3317.ddns.net | udp |
| US | 8.8.8.8:53 | nanocore3317.ddns.net | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| N/A | 127.0.0.1:5353 | tcp |
Files
memory/2060-0-0x0000000074B52000-0x0000000074B53000-memory.dmp
memory/2060-1-0x0000000074B50000-0x0000000075101000-memory.dmp
memory/2060-2-0x0000000074B50000-0x0000000075101000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpD86E.tmp
| MD5 | 596e28ec651a34651a6593a8d0f38644 |
| SHA1 | 8bf1a6d3b6c04e65f9fe0910b92650c58ea9d85f |
| SHA256 | 2026e95ee5b5d738fe3dcd5e1f173f2bab13a89745af040fdfbecb53e0157d40 |
| SHA512 | 41dc9f8fb12c0d11a7b065b86136205525f5b0dbc411f2963af8a7a8ba4ac6d741b37b72e2be1d6adb0a5a2a2e972af7c148fbe8d976179740c57741e7541442 |
C:\Users\Admin\AppData\Local\Temp\tmpD8CD.tmp
| MD5 | 0479d5f304ef2d7e3c15fb24a99f88c1 |
| SHA1 | 8edbb1450a656fac5f5e96779ffe440ee8c1aec9 |
| SHA256 | 112557c2b2d0c669a3b115129dc32f005341e965330fa8f2ad3e5de1926594bc |
| SHA512 | 537e8d87e5cd975f0e69bb145f81d6e9d7b0d82eed143ac351304ea38577137386a51fdb7357ec6d641eb04ff5f51e249bba2db8a4b5bf2934d561394a4a3f15 |
memory/2060-10-0x0000000074B50000-0x0000000075101000-memory.dmp
memory/2060-11-0x0000000074B52000-0x0000000074B53000-memory.dmp
memory/2060-12-0x0000000074B50000-0x0000000075101000-memory.dmp
memory/2060-13-0x0000000074B50000-0x0000000075101000-memory.dmp
memory/2060-14-0x0000000074B50000-0x0000000075101000-memory.dmp