Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/01/2025, 08:19 UTC

250112-j7wn8awqbm 10

12/01/2025, 08:14 UTC

250112-j49fxatphz 10

Analysis

  • max time kernel
    896s
  • max time network
    838s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2025, 08:19 UTC

General

  • Target

    0f72038eb374ca1ef1aadf1a8b0c2671f0c8a5eebc7d695d5544c37a0f4febc4.exe

  • Size

    279KB

  • MD5

    34a00d782f9766b8185f616b48d088ce

  • SHA1

    40f0d6841fd8a71ad280e2f16426a4bdec361cc2

  • SHA256

    0f72038eb374ca1ef1aadf1a8b0c2671f0c8a5eebc7d695d5544c37a0f4febc4

  • SHA512

    21829790ecae391fbe2be96293a674d8c3547c550ddbed88ac4d20232398f93efddbd884b5e1e9bc211a18285cec985b0789db424ab4edb07700bbe2206f9e7c

  • SSDEEP

    6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66f/:boSeGUA5YZazpXUmZhZ6n

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

sysupdate24.ddns.net:45400

Mutex

ae82ab7f-db07-49ee-9d2b-76075d76f37f

Attributes
  • activate_away_mode

    true

  • backup_connection_host

  • backup_dns_server

  • buffer_size

    65535

  • build_time

    2020-04-24T17:41:53.492468936Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    45400

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    ae82ab7f-db07-49ee-9d2b-76075d76f37f

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    sysupdate24.ddns.net

  • primary_dns_server

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f72038eb374ca1ef1aadf1a8b0c2671f0c8a5eebc7d695d5544c37a0f4febc4.exe
    C:\Users\Admin\AppData\Local\Temp\0f72038eb374ca1ef1aadf1a8b0c2671f0c8a5eebc7d695d5544c37a0f4febc4.exe cmd /c %TERMINATE% "DELETE"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
      "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
        "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2608

Network

  • flag-us
    DNS
    sysupdate24.ddns.net
    a1punf5t2of.exe
    Remote address:
    8.8.8.8:53
    Request
    sysupdate24.ddns.net
    IN A
    Response
    sysupdate24.ddns.net
    IN A
    0.0.0.0
  • flag-us
    DNS
    sysupdate24.ddns.net
    a1punf5t2of.exe
    Remote address:
    8.8.8.8:53
    Request
    sysupdate24.ddns.net
    IN A
    Response
    sysupdate24.ddns.net
    IN A
    0.0.0.0
  • flag-us
    DNS
    sysupdate24.ddns.net
    a1punf5t2of.exe
    Remote address:
    8.8.8.8:53
    Request
    sysupdate24.ddns.net
    IN A
    Response
    sysupdate24.ddns.net
    IN A
    0.0.0.0
No results found
  • 8.8.8.8:53
    sysupdate24.ddns.net
    dns
    a1punf5t2of.exe
    66 B
    82 B
    1
    1

    DNS Request

    sysupdate24.ddns.net

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    sysupdate24.ddns.net
    dns
    a1punf5t2of.exe
    66 B
    82 B
    1
    1

    DNS Request

    sysupdate24.ddns.net

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    sysupdate24.ddns.net
    dns
    a1punf5t2of.exe
    66 B
    82 B
    1
    1

    DNS Request

    sysupdate24.ddns.net

    DNS Response

    0.0.0.0

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

    Filesize

    280KB

    MD5

    9b4f3b1ee63fe167ab0f45086d327858

    SHA1

    740b108c2fea543e15f05b011dded6e797ad2ddb

    SHA256

    07f56b45f6d2e2d86dfe6437975eea0f9f034957265f2ae5af17e27e3466ce94

    SHA512

    cb67f0941ddfc992c89dc42473f1b4150dde31e0c2f71d7995e79c338ac5f09df1920aaa922d1d80b60c8a0d69c32b314d6a365567b0d3b8bd4e3b2b64e87e85

  • memory/2112-0-0x0000000074051000-0x0000000074052000-memory.dmp

    Filesize

    4KB

  • memory/2112-1-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-2-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-3-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-4-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-5-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-6-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-15-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2608-33-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2608-29-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2608-24-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2608-26-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2608-38-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2608-23-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2608-40-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2608-32-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2700-16-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-20-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-17-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-19-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-18-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-42-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.