Overview
overview
10Static
static
101.exe
windows7-x64
101.exe
windows10-2004-x64
10ClientPlugin.dll
windows7-x64
1ClientPlugin.dll
windows10-2004-x64
1NanoCore.exe
windows7-x64
3NanoCore.exe
windows10-2004-x64
3Payload.exe
windows7-x64
7Payload.exe
windows10-2004-x64
7PluginCompiler.exe
windows7-x64
3PluginCompiler.exe
windows10-2004-x64
3ServerPlugin.dll
windows7-x64
1ServerPlugin.dll
windows10-2004-x64
1System.Dat...te.dll
windows7-x64
1System.Dat...te.dll
windows10-2004-x64
1client.exe
windows7-x64
10client.exe
windows10-2004-x64
10x64/SQLite...op.dll
windows7-x64
1x64/SQLite...op.dll
windows10-2004-x64
1x86/SQLite...op.dll
windows7-x64
3x86/SQLite...op.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 20:12
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ClientPlugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ClientPlugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
NanoCore.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
NanoCore.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Payload.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Payload.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
PluginCompiler.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PluginCompiler.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ServerPlugin.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ServerPlugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
client.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
client.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
x64/SQLite.Interop.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
x64/SQLite.Interop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
x86/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
x86/SQLite.Interop.dll
Resource
win10v2004-20241007-en
General
-
Target
1.exe
-
Size
202KB
-
MD5
7262cd751358cfecb8d31ff81575ac29
-
SHA1
fcab5f0e392ae5477635a7ced23bd1d377e69e16
-
SHA256
4667ca924aa5cbfd0a793da30825f5cb7ea98b2ddf83377c7b6ed91d73c3420c
-
SHA512
eaaead267bbcf1bda32d7f978493a02f6f87ae5c2af7d5d3ff67ee0d097d540e3ae3c222282b7c97edbbda9a31b608e69db2374aab2346b7f25108912173c7ef
-
SSDEEP
3072:wzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HItMzhzRWEV9UWlv38SAB:wLV6Bta6dtJmakIM5NFAyUWlv3PAB
Malware Config
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PCI Subsystem = "C:\\Program Files (x86)\\PCI Subsystem\\pciss.exe" 1.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\PCI Subsystem\pciss.exe 1.exe File opened for modification C:\Program Files (x86)\PCI Subsystem\pciss.exe 1.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2540 1.exe 2540 1.exe 2540 1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2540 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2540