Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 01:43

General

  • Target

    Builder.exe

  • Size

    495KB

  • MD5

    bda37ad3c62e346bc0dc3c0c5dd904ed

  • SHA1

    ccd30af09ca5d3b725f41d33f34d826f25af6dd6

  • SHA256

    59930cbba4dd59a8e76a13ecc22429f1ec061c79f31a0f4e0ad4a7d9de1e486f

  • SHA512

    a8a198f1b60585abf81d76423577990c45fbcbbaaae6c866ad39d5935224f17c429d0202f23acc56b62675f8bc2110b851ad578e42e66dded1ca60edce522074

  • SSDEEP

    12288:ZLV6Btpmk/ZAnwuKKb0660GFvJSbV1y38/Zt6Znj:hApf/OwC06GFvJY1ND6Zj

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Builder.exe
    "C:\Users\Admin\AppData\Local\Temp\Builder.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "LAN Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp706D.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1216
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "LAN Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp70DB.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp706D.tmp

    Filesize

    1KB

    MD5

    b5a43b9fb362d98c033e9a8b39aac74c

    SHA1

    e32983a42bf0a3dc9b5520ece9d8f34d99bc41d5

    SHA256

    75b9e1e010550532b5f9b425e98710fd6a559a4a15e4736306a4cf9593021235

    SHA512

    1bd7d7646790e9870f6c30bbf53e8140f20172eddedf72b8f3242d1daf192dbce03562a34f9da1b838d2fe87bdd8963cf96d748319756fe017b4edb49e52649b

  • C:\Users\Admin\AppData\Local\Temp\tmp70DB.tmp

    Filesize

    1KB

    MD5

    6b30dba7972c92c9a1b881e88c108b15

    SHA1

    f76207985cc5a1f70edb2fb5bd45678f195a4564

    SHA256

    578f5b0ff051f02f8e0a67fc3424dad554fa9489875475ea624fbb63eabfcbf7

    SHA512

    e3dd368937f863cb07453de12173580fb63b8d3983db7119c24860f227c89ded76401c47607f5b1134d215d46fe2b40d4bc3d7299374f1e8abecdeaefc7b9099

  • memory/2064-0-0x0000000075562000-0x0000000075563000-memory.dmp

    Filesize

    4KB

  • memory/2064-1-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-2-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-10-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-11-0x0000000075562000-0x0000000075563000-memory.dmp

    Filesize

    4KB

  • memory/2064-12-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-13-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB

  • memory/2064-14-0x0000000075560000-0x0000000075B11000-memory.dmp

    Filesize

    5.7MB