Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 14:12
Static task
static1
Behavioral task
behavioral1
Sample
0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe
Resource
win7-20241023-en
General
-
Target
0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe
-
Size
1.3MB
-
MD5
b0de8f50d0dbcbdba16c871edd0383d0
-
SHA1
3e341c3c4ad059aa264786c984a11b3e4dd2a55c
-
SHA256
0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2
-
SHA512
261fd14f92b115a27d305a6e10cf1ef244dc4a1459f8afe977367bb2e5ae28f6a8b4d209570eac3c88d5b2a4374afb4e7910bde14286d84f8b1bd1bac0061f03
-
SSDEEP
24576:xdtP2cbksTpugRNJI50FMJFMFggMFgMJFggMJFMFggMFMJFMFMFMFgggMFggMFgL:Cgqe
Malware Config
Extracted
nanocore
1.2.2.0
91.236.116.142:5888
d995ed82-bf13-4043-b564-f5f89f8c5209
-
activate_away_mode
true
-
backup_connection_host
91.236.116.142
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2017-01-07T03:01:54.729778636Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5888
-
default_group
Spy
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
d995ed82-bf13-4043-b564-f5f89f8c5209
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
91.236.116.142
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 app.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\app.exe" 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4924 set thread context of 3932 4924 app.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 4924 app.exe 4924 app.exe 4924 app.exe 4924 app.exe 4924 app.exe 4924 app.exe 3932 aspnet_compiler.exe 3932 aspnet_compiler.exe 3932 aspnet_compiler.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3932 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe Token: SeDebugPrivilege 4924 app.exe Token: SeDebugPrivilege 3932 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2056 wrote to memory of 4924 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 91 PID 2056 wrote to memory of 4924 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 91 PID 2056 wrote to memory of 4924 2056 0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe 91 PID 4924 wrote to memory of 3932 4924 app.exe 92 PID 4924 wrote to memory of 3932 4924 app.exe 92 PID 4924 wrote to memory of 3932 4924 app.exe 92 PID 4924 wrote to memory of 3932 4924 app.exe 92 PID 4924 wrote to memory of 3932 4924 app.exe 92 PID 4924 wrote to memory of 3932 4924 app.exe 92 PID 4924 wrote to memory of 3932 4924 app.exe 92 PID 4924 wrote to memory of 3932 4924 app.exe 92 PID 3932 wrote to memory of 3452 3932 aspnet_compiler.exe 93 PID 3932 wrote to memory of 3452 3932 aspnet_compiler.exe 93 PID 3932 wrote to memory of 3452 3932 aspnet_compiler.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe"C:\Users\Admin\AppData\Local\Temp\0c1c0a2aab61208228f79c88d9d119953f0095825ccbdf37a6e4e1c041a342a2N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Roaming\app.exe"C:\Users\Admin\AppData\Roaming\app.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NTFS Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpE104.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3452
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d81eb43d26d4511c44151cba2eb45983
SHA1135c98e039c6ab35d4e9564f15f9c56dc9dbeb9a
SHA256a72a8f6434d6b0fb904db5adc8cab891d12c53b4ac1435dfd13df51f84a2d4d0
SHA512b5895c19159d23a8fa312967e47d0855ac6f8f314f8931f54469b0c0079a22e9e00a5eaf6729761f74d54e111454d49813e658243e920a9c3434a5576cdda721
-
Filesize
1.3MB
MD54fe4eb227592cf1b254c003ef442b780
SHA1d31016f38fac45e154ba4f2b08ed9b7758c61df3
SHA2560ffb88bbabf18d3961d29e2488882336a1113f1ea8a3c2e39de667e35d559b15
SHA5126254d291ad612c02c8ea6e2fd170399b989589e6b0a430cbc1be70e70dccb1f88fc4271b1c439d177685e830f146b23eb34fa693d533f7a044c09fed24d141c6