Resubmissions

13-12-2024 17:44

241213-wbgxeaxphq 10

13-12-2024 17:15

241213-vsrmhavpgs 10

13-12-2024 17:14

241213-vshdtsxjhl 10

13-12-2024 17:13

241213-vrge5svpc1 10

Analysis

  • max time kernel
    884s
  • max time network
    885s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 17:13

Errors

Reason
Machine shutdown

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/PluginCompiler.exe

  • Size

    75KB

  • MD5

    e2d1c5df11f9573f6c5d0a7ad1a79fbf

  • SHA1

    b32bf571aca1b51af48f7f2f955aaf1bbdc5aa2f

  • SHA256

    0b41b2fcd0f1a4e913d3efe293f713849d59efebb27bac060ab31bed51ac2f6b

  • SHA512

    9c9ae7baa504dd34311f5730280f6a49e10eefdb145d2d29849e385a7da47c8f2c182cd6f39949f5904ef8462fc5c3dfaf1bc4cc8bff50c6750c9edc886192e0

  • SSDEEP

    1536:iyVzgm8NqToL6n975lw8FDx39EhPKu4iV1Y:iyVMLUTos5SAx3ChPKpiVe

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\PluginCompiler.exe
    "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\PluginCompiler.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3560
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2080
    • C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe
      "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\NanoCore.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2324
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Windows\system32\ipconfig.exe
        ipconfig
        2⤵
        • Gathers network information
        PID:1248
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3220
      • C:\Windows\system32\ipconfig.exe
        ipconfig
        2⤵
        • Gathers network information
        PID:4636
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa38e9055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\t.exe

      Filesize

      130KB

      MD5

      63d76b86be2032895ba385f88a4d4c24

      SHA1

      c2c3e888f10d75bd55345299bd1d51106408694e

      SHA256

      4c0e57d89c3a25c6d9280a6e8032fb5a8c66c08c43cd5dc52015db2592b0d4f0

      SHA512

      0522c26af35b442d629bbfd6a5c416efdcc39e2e34df903a9d88385e7ca314c4b2ce2f9dad1c86e8c74e6ff33fd4af0a3b631acb1f3d004e7a1c1d3bde5115a1

    • memory/2324-18-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

      Filesize

      64KB

    • memory/2324-28-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

      Filesize

      64KB

    • memory/3560-8-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-10-0x00007FFAB0555000-0x00007FFAB0556000-memory.dmp

      Filesize

      4KB

    • memory/3560-5-0x000000001BCB0000-0x000000001BD4C000-memory.dmp

      Filesize

      624KB

    • memory/3560-6-0x0000000000940000-0x0000000000948000-memory.dmp

      Filesize

      32KB

    • memory/3560-7-0x000000001BE10000-0x000000001BE5C000-memory.dmp

      Filesize

      304KB

    • memory/3560-0-0x00007FFAB0555000-0x00007FFAB0556000-memory.dmp

      Filesize

      4KB

    • memory/3560-9-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-4-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-11-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-12-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-14-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-15-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-17-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-2-0x00007FFAB02A0000-0x00007FFAB0C41000-memory.dmp

      Filesize

      9.6MB

    • memory/3560-3-0x000000001B720000-0x000000001BBEE000-memory.dmp

      Filesize

      4.8MB

    • memory/3560-1-0x000000001B1A0000-0x000000001B246000-memory.dmp

      Filesize

      664KB