Resubmissions

13-12-2024 17:44

241213-wbgxeaxphq 10

13-12-2024 17:15

241213-vsrmhavpgs 10

13-12-2024 17:14

241213-vshdtsxjhl 10

13-12-2024 17:13

241213-vrge5svpc1 10

Analysis

  • max time kernel
    593s
  • max time network
    595s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 17:14

Errors

Reason
Machine shutdown

General

  • Target

    NanoCore 1.2.2.0_Cracked By Alcatraz3222/ServerPlugin.dll

  • Size

    28KB

  • MD5

    952c62ec830c63380beb72ad923d35dc

  • SHA1

    6700baa1fb1877129e79402dfe237f0b84221b69

  • SHA256

    2e5fbfb7932b117a2f6093dc346cdee4a5702e39739d9c40d27bfd1580f6f0d7

  • SHA512

    5dc19d7d6ab7670ded766f357e481328c8df4a96ac3c2a00194a5ccea8c34bca0e34cfea3d9d17934db384d302446be2fec9853438371561d70580665bffe121

  • SSDEEP

    384:7LmAEURVWGSCyo6/NLoqwXEsZmLTdFuoKy:vm1izOlg0ZKy

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\NanoCore 1.2.2.0_Cracked By Alcatraz3222\ServerPlugin.dll",#1
    1⤵
      PID:1964
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:2272
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x534
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:320
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:1608

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1608-1-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/2272-0-0x0000000002E10000-0x0000000002E11000-memory.dmp

          Filesize

          4KB