Resubmissions

13-12-2024 17:44

241213-wbgxeaxphq 10

13-12-2024 17:15

241213-vsrmhavpgs 10

13-12-2024 17:14

241213-vshdtsxjhl 10

13-12-2024 17:13

241213-vrge5svpc1 10

Analysis

  • max time kernel
    595s
  • max time network
    596s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 17:14

Errors

Reason
Machine shutdown

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/PluginCompiler.exe

  • Size

    75KB

  • MD5

    e2d1c5df11f9573f6c5d0a7ad1a79fbf

  • SHA1

    b32bf571aca1b51af48f7f2f955aaf1bbdc5aa2f

  • SHA256

    0b41b2fcd0f1a4e913d3efe293f713849d59efebb27bac060ab31bed51ac2f6b

  • SHA512

    9c9ae7baa504dd34311f5730280f6a49e10eefdb145d2d29849e385a7da47c8f2c182cd6f39949f5904ef8462fc5c3dfaf1bc4cc8bff50c6750c9edc886192e0

  • SSDEEP

    1536:iyVzgm8NqToL6n975lw8FDx39EhPKu4iV1Y:iyVMLUTos5SAx3ChPKpiVe

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\PluginCompiler.exe
    "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\PluginCompiler.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5040
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39a9855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5040-0-0x00007FFEE8D45000-0x00007FFEE8D46000-memory.dmp

    Filesize

    4KB

  • memory/5040-1-0x000000001B4D0000-0x000000001B576000-memory.dmp

    Filesize

    664KB

  • memory/5040-2-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB

  • memory/5040-3-0x000000001BA50000-0x000000001BF1E000-memory.dmp

    Filesize

    4.8MB

  • memory/5040-4-0x000000001C000000-0x000000001C09C000-memory.dmp

    Filesize

    624KB

  • memory/5040-5-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB

  • memory/5040-6-0x0000000000D90000-0x0000000000D98000-memory.dmp

    Filesize

    32KB

  • memory/5040-7-0x000000001C160000-0x000000001C1AC000-memory.dmp

    Filesize

    304KB

  • memory/5040-8-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB

  • memory/5040-9-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB

  • memory/5040-10-0x00007FFEE8D45000-0x00007FFEE8D46000-memory.dmp

    Filesize

    4KB

  • memory/5040-11-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB

  • memory/5040-12-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB

  • memory/5040-14-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB

  • memory/5040-15-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB

  • memory/5040-16-0x00007FFEE8A90000-0x00007FFEE9431000-memory.dmp

    Filesize

    9.6MB