Analysis

  • max time kernel
    117s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 01:43

General

  • Target

    Builder.exe

  • Size

    495KB

  • MD5

    bda37ad3c62e346bc0dc3c0c5dd904ed

  • SHA1

    ccd30af09ca5d3b725f41d33f34d826f25af6dd6

  • SHA256

    59930cbba4dd59a8e76a13ecc22429f1ec061c79f31a0f4e0ad4a7d9de1e486f

  • SHA512

    a8a198f1b60585abf81d76423577990c45fbcbbaaae6c866ad39d5935224f17c429d0202f23acc56b62675f8bc2110b851ad578e42e66dded1ca60edce522074

  • SSDEEP

    12288:ZLV6Btpmk/ZAnwuKKb0660GFvJSbV1y38/Zt6Znj:hApf/OwC06GFvJY1ND6Zj

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Builder.exe
    "C:\Users\Admin\AppData\Local\Temp\Builder.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "DHCP Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmp96D3.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2572
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "DHCP Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9722.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp96D3.tmp

    Filesize

    1KB

    MD5

    b5a43b9fb362d98c033e9a8b39aac74c

    SHA1

    e32983a42bf0a3dc9b5520ece9d8f34d99bc41d5

    SHA256

    75b9e1e010550532b5f9b425e98710fd6a559a4a15e4736306a4cf9593021235

    SHA512

    1bd7d7646790e9870f6c30bbf53e8140f20172eddedf72b8f3242d1daf192dbce03562a34f9da1b838d2fe87bdd8963cf96d748319756fe017b4edb49e52649b

  • C:\Users\Admin\AppData\Local\Temp\tmp9722.tmp

    Filesize

    1KB

    MD5

    cdf5683344404764a0f3592e9db8a5a1

    SHA1

    6705943b404de237cdd7080c05af25e2b1b6410c

    SHA256

    1ea0af7c86be3e61c281ada0470c6dcf178834380def1903b5bb78b49440ffff

    SHA512

    23c56873ca8520784cc1d6b0b4211b373fff6fb429872932e5274801d3b9d786566877cd16d1ffa0adca8c7aebb0b935701a0c071073edfbdb319002f99a182b

  • memory/2356-0-0x00000000749F1000-0x00000000749F2000-memory.dmp

    Filesize

    4KB

  • memory/2356-1-0x00000000749F0000-0x0000000074F9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2356-2-0x00000000749F0000-0x0000000074F9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2356-13-0x00000000749F0000-0x0000000074F9B000-memory.dmp

    Filesize

    5.7MB