Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 09:51 UTC

General

  • Target

    1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe

  • Size

    434KB

  • MD5

    1ca4a0e2f74e5ffd751683f6afd1556e

  • SHA1

    228e7c61d1f6963a1a6617d02c9e3d8705088d64

  • SHA256

    1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6

  • SHA512

    5de83b5f4823e6fcc6f0f297a43c581bbcb875ba9ad78afc2d45179dc1d7040725c612392113ae47fcbf8957891439f1247b92091f2efbc861b8fe2ab1d92819

  • SSDEEP

    12288:nmJileuH/oPLDnoG3l+g9whD89s88C51/lX:Lee8FV+Gigs8H

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

37.0.10.137:9025

Mutex

b7d9d933-745d-49c1-bd0c-e06768b05c24

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    37.0.10.137

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2021-08-01T05:05:17.189046036Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    9025

  • default_group

    LYDECKER

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    b7d9d933-745d-49c1-bd0c-e06768b05c24

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    37.0.10.137

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe
    "C:\Users\Admin\AppData\Local\Temp\1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AFUUjo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5D2E.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1852
    • C:\Users\Admin\AppData\Local\Temp\1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe
      "C:\Users\Admin\AppData\Local\Temp\1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe"
      2⤵
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:776

Network

  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    104.219.191.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    104.219.191.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    53.210.109.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    53.210.109.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    67.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    67.209.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    11.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    11.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 37.0.10.137:9025
    1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe
    208 B
    4
  • 37.0.10.137:9025
    1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe
    208 B
    4
  • 37.0.10.137:9025
    1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe
    208 B
    4
  • 37.0.10.137:9025
    1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe
    208 B
    4
  • 37.0.10.137:9025
    1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe
    208 B
    4
  • 37.0.10.137:9025
    1f0c4b2bfc1d9dc27b3624894740779c748988c8134c7e455706d5a0a8d1c0a6.exe
    208 B
    4
  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    104.219.191.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    104.219.191.52.in-addr.arpa

  • 8.8.8.8:53
    53.210.109.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    53.210.109.20.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    67.209.201.84.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    67.209.201.84.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    11.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    11.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/776-16-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/776-26-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/776-25-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/776-24-0x0000000005480000-0x000000000548A000-memory.dmp

    Filesize

    40KB

  • memory/776-23-0x0000000005440000-0x000000000545E000-memory.dmp

    Filesize

    120KB

  • memory/776-22-0x00000000051F0000-0x00000000051FA000-memory.dmp

    Filesize

    40KB

  • memory/776-20-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/776-17-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-5-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-9-0x0000000008720000-0x00000000087BC000-memory.dmp

    Filesize

    624KB

  • memory/3488-10-0x0000000008870000-0x00000000088CC000-memory.dmp

    Filesize

    368KB

  • memory/3488-8-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-7-0x000000007539E000-0x000000007539F000-memory.dmp

    Filesize

    4KB

  • memory/3488-19-0x0000000075390000-0x0000000075B40000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-6-0x0000000005CA0000-0x0000000005CAE000-memory.dmp

    Filesize

    56KB

  • memory/3488-0-0x000000007539E000-0x000000007539F000-memory.dmp

    Filesize

    4KB

  • memory/3488-4-0x0000000005A80000-0x0000000005A8A000-memory.dmp

    Filesize

    40KB

  • memory/3488-3-0x00000000058D0000-0x0000000005962000-memory.dmp

    Filesize

    584KB

  • memory/3488-2-0x0000000005DA0000-0x0000000006344000-memory.dmp

    Filesize

    5.6MB

  • memory/3488-1-0x0000000000E70000-0x0000000000EE2000-memory.dmp

    Filesize

    456KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.