Analysis
-
max time kernel
174s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 23:41
Errors
General
-
Target
pest.exe
-
Size
202KB
-
MD5
3a25b8b57fee2dbe05b915a4ba5a5f23
-
SHA1
d563fc3b01275e873b938a5f08e15809a8ea44b7
-
SHA256
586ed5d88e9c4b4c7d64fdc87c134f464cee29a2c75cd7021195e057dbcfaf1c
-
SHA512
1c7549ae11347dfe60a5db10a169cb5990ba3f1a34a8cdaadd52525bba1c0fad2a932f02f1962289cf02d087d7bcdea9a2d5ac23cc69172dff4a782c82c553a6
-
SSDEEP
6144:QLV6Bta6dtJmakIM5JzxAnuBlMvBZORkl:QLV6BtpmkMxAIFkl
Malware Config
Signatures
-
Nanocore family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation pest.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ARP Host = "C:\\Program Files (x86)\\ARP Host\\arphost.exe" pest.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pest.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\ARP Host\arphost.exe pest.exe File opened for modification C:\Program Files (x86)\ARP Host\arphost.exe pest.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "226" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe 3996 pest.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3996 pest.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3996 pest.exe Token: SeDebugPrivilege 3996 pest.exe Token: SeShutdownPrivilege 3996 pest.exe Token: SeDebugPrivilege 3996 pest.exe Token: SeDebugPrivilege 3996 pest.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4540 LogonUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3996 wrote to memory of 4244 3996 pest.exe 91 PID 3996 wrote to memory of 4244 3996 pest.exe 91 PID 3996 wrote to memory of 4244 3996 pest.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\pest.exe"C:\Users\Admin\AppData\Local\Temp\pest.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clean1.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4244
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b6855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579KB
MD55512c5dce702c3564581f40032ef877c
SHA13c3b98500b82df4ebfb80bfd20c7399ef029f2d5
SHA2569fa1a9cb82e9731cba045d93ce8720a78eac7e48e0c88c1a76f46e3536a2341e
SHA5129541dec6b3fe149c24065d481e21f3943d94646b6b7ccff31643a70a1e2c6f89272a5047e63d49dfac9e07aba9dd5b4215544a6a04b1fbfdd197db7017f6cbe8
-
Filesize
40B
MD5ae0f5e6ce7122af264ec533c6b15a27b
SHA11265a495c42eed76cc043d50c60c23297e76cce1
SHA25673b0b92179c61c26589b47e9732ce418b07edee3860ee5a2a5fb06f3b8aa9b26
SHA512dd44c2d24d4e3a0f0b988ad3d04683b5cb128298043134649bbe33b2512ce0c9b1a8e7d893b9f66fbbcdd901e2b0646c4533fb6c0c8c4afcb95a0efb95d446f8