Resubmissions

13-12-2024 17:44

241213-wbgxeaxphq 10

13-12-2024 17:15

241213-vsrmhavpgs 10

13-12-2024 17:14

241213-vshdtsxjhl 10

13-12-2024 17:13

241213-vrge5svpc1 10

Analysis

  • max time kernel
    247s
  • max time network
    245s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 17:13

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/PluginCompiler.exe

  • Size

    75KB

  • MD5

    e2d1c5df11f9573f6c5d0a7ad1a79fbf

  • SHA1

    b32bf571aca1b51af48f7f2f955aaf1bbdc5aa2f

  • SHA256

    0b41b2fcd0f1a4e913d3efe293f713849d59efebb27bac060ab31bed51ac2f6b

  • SHA512

    9c9ae7baa504dd34311f5730280f6a49e10eefdb145d2d29849e385a7da47c8f2c182cd6f39949f5904ef8462fc5c3dfaf1bc4cc8bff50c6750c9edc886192e0

  • SSDEEP

    1536:iyVzgm8NqToL6n975lw8FDx39EhPKu4iV1Y:iyVMLUTos5SAx3ChPKpiVe

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\PluginCompiler.exe
    "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\PluginCompiler.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3040
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2252
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x524
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1272
    • C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe
      "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3040-0-0x000007FEF581E000-0x000007FEF581F000-memory.dmp

      Filesize

      4KB

    • memory/3040-1-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-2-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-3-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-4-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-5-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-6-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-7-0x000000001EFA0000-0x000000001EFB0000-memory.dmp

      Filesize

      64KB

    • memory/3040-8-0x000007FEF581E000-0x000007FEF581F000-memory.dmp

      Filesize

      4KB

    • memory/3040-9-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-11-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

      Filesize

      9.6MB