Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe
Resource
win7-20240903-en
General
-
Target
c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe
-
Size
1.1MB
-
MD5
950f1e4709c69aee0e9bf082fd91574d
-
SHA1
dd7a010f52069362d8ec13df361c489efbca675a
-
SHA256
c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c
-
SHA512
c3d8d5baf233708637360761711913cf220d37397697235da37edfd2a2ad6f96c420b8b81e6147a45b7b05668a43aa9ce3b8a35ef9a519dcf3f6c55b0e1c55a4
-
SSDEEP
24576:9TbBv5rUeTHpvm6tcMbtjd5v21lcgNdNd0fuiI:XBvHpvnZhUcgX0GB
Malware Config
Extracted
nanocore
1.2.2.0
december2n.duckdns.org:40111
december2nd.ddns.net:40111
32ca6e6e-2fe0-4ef5-a3ea-5de451e80042
-
activate_away_mode
false
-
backup_connection_host
december2nd.ddns.net
- backup_dns_server
-
buffer_size
65538
-
build_time
2022-11-26T05:13:34.059050336Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
40111
-
default_group
mama
-
enable_debug_mode
true
-
gc_threshold
1.0485772e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.0485772e+07
-
mutex
32ca6e6e-2fe0-4ef5-a3ea-5de451e80042
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
december2n.duckdns.org
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8009
Signatures
-
Nanocore family
-
Executes dropped EXE 2 IoCs
pid Process 1716 fvtum.pif 1896 RegSvcs.exe -
Loads dropped DLL 2 IoCs
pid Process 592 wscript.exe 1716 fvtum.pif -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Chrome = "C:\\Users\\Admin\\AppData\\Local\\Temp\\twgb\\fvtum.pif C:\\Users\\Admin\\AppData\\Local\\Temp\\twgb\\xebp.mp3" fvtum.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AutoUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\twgb\\Update.vbs" fvtum.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SCSI Host = "C:\\Program Files (x86)\\SCSI Host\\scsihost.exe" RegSvcs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1716 set thread context of 1896 1716 fvtum.pif 33 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SCSI Host\scsihost.exe RegSvcs.exe File created C:\Program Files (x86)\SCSI Host\scsihost.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvtum.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe 2600 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1896 RegSvcs.exe 1896 RegSvcs.exe 1896 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1896 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1896 RegSvcs.exe Token: SeDebugPrivilege 1896 RegSvcs.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2664 wrote to memory of 592 2664 c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe 31 PID 2664 wrote to memory of 592 2664 c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe 31 PID 2664 wrote to memory of 592 2664 c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe 31 PID 2664 wrote to memory of 592 2664 c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe 31 PID 592 wrote to memory of 1716 592 wscript.exe 32 PID 592 wrote to memory of 1716 592 wscript.exe 32 PID 592 wrote to memory of 1716 592 wscript.exe 32 PID 592 wrote to memory of 1716 592 wscript.exe 32 PID 592 wrote to memory of 1716 592 wscript.exe 32 PID 592 wrote to memory of 1716 592 wscript.exe 32 PID 592 wrote to memory of 1716 592 wscript.exe 32 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1716 wrote to memory of 1896 1716 fvtum.pif 33 PID 1896 wrote to memory of 2352 1896 RegSvcs.exe 34 PID 1896 wrote to memory of 2352 1896 RegSvcs.exe 34 PID 1896 wrote to memory of 2352 1896 RegSvcs.exe 34 PID 1896 wrote to memory of 2352 1896 RegSvcs.exe 34 PID 1896 wrote to memory of 2600 1896 RegSvcs.exe 36 PID 1896 wrote to memory of 2600 1896 RegSvcs.exe 36 PID 1896 wrote to memory of 2600 1896 RegSvcs.exe 36 PID 1896 wrote to memory of 2600 1896 RegSvcs.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe"C:\Users\Admin\AppData\Local\Temp\c4fb6d7a5c23c1dcb5550d864503a125ff9615e6c8edf2e6396be5ba68fd704c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" Update-do.i.vbe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\twgb\fvtum.pif"C:\Users\Admin\AppData\Local\Temp\twgb\fvtum.pif" xebp.mp33⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SCSI Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp204.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2352
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SCSI Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2DF.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595aceabc58acad5d73372b0966ee1b35
SHA12293b7ad4793cf574b1a5220e85f329b5601040a
SHA2568d9642e1c3cd1e0b5d1763de2fb5e605ba593e5a918b93eec15acbc5dcc48fd4
SHA51200760dfc9d8caf357f0cee5336e5448a4cca18e32cc63e1a69c16e34fe00ea29acd5b2cf278e86c6f9c3e66a1b176d27ed927361848212e6bf1fade7d3d06e74
-
Filesize
1KB
MD59a559f229be0944bc3dc813cde333f50
SHA10e97c97eea032b499ff060e799581e32beeceb09
SHA256a63d853679aa655cced3b62a10855c56f9efd9b50770738b408d728008f73330
SHA5124cbb2f77283500e86ecf79fd2cbd31d10c3af2fcf6c9a557ee0b1edead229dc07d63a5030b60df57458d52ef8c2a42ec199d2d4cdca387400d047df25b593c68
-
Filesize
31KB
MD57a9c7f57757ad97e2117eef574e2358e
SHA14e4d93bd64b94f08ab507a462291c4dd91fbdd23
SHA2565491d9cf3673842e5fc06747e6e55ecaf93688210f52fd521611194e493d911b
SHA512bfae9e262d1d2df402fac4671b6ca5b5940cf16bc6c217c15f3b038b738f1645da9c163b452ebf89505fd36f2f5af44bad5fcefa3f8ed272c736be4ebf239d7d
-
Filesize
1.2MB
MD5044b14a71e0453cd74c513920fb61839
SHA17c693ddc0df7d100b2d7554365c5c4024851068b
SHA2566c6e082b6c56c06767d76288ad97a744f19ffd7d64d4cf03181ce6f76bdf4f8a
SHA5123807f6e044b2dcc980dae350a43390f04a18b3b71161213ab5d6ec94caef9f47d73a95a0f9063fe033a49147b836cc6af9f95f580aa67d40ee1cddcdf453850d
-
Filesize
397KB
MD547a3760694424f080062061971c9e2ae
SHA1107b8682b9322ee4886ade154c88c3cfebd24ae9
SHA2562a454fbe70bedf8e9df6bb9172fd14b941b675a3465a80bc9b0fe20b499ef4ad
SHA51231d92fc367c857fa71598fbb3346f292da574855d013a7cab0b5715eac80a7e2b37d863c92dcdb3b1ef34fc6e3529630460c9b23ba22e3d41e4553c5f3a3e655
-
Filesize
80KB
MD5681b715e18750d3be54efc53d100de5a
SHA192e6d8b2512a4d86dac46c0926709973d3b19457
SHA2561fc98f0579ecaec74db49efd3f3a199419588828676b811053d4d088e0483030
SHA512384f59a6bdaf7964b795cbfeb1cc04711e6e59753104e70a3b9c3805b5ed22565f448bfb119f619b0653caaf785f96495e14c36c557b02279ee69fbafa162f1e
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215