Analysis

  • max time kernel
    121s
  • max time network
    152s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    15-01-2025 01:35

General

  • Target

    Builder.exe

  • Size

    495KB

  • MD5

    bda37ad3c62e346bc0dc3c0c5dd904ed

  • SHA1

    ccd30af09ca5d3b725f41d33f34d826f25af6dd6

  • SHA256

    59930cbba4dd59a8e76a13ecc22429f1ec061c79f31a0f4e0ad4a7d9de1e486f

  • SHA512

    a8a198f1b60585abf81d76423577990c45fbcbbaaae6c866ad39d5935224f17c429d0202f23acc56b62675f8bc2110b851ad578e42e66dded1ca60edce522074

  • SSDEEP

    12288:ZLV6Btpmk/ZAnwuKKb0660GFvJSbV1y38/Zt6Znj:hApf/OwC06GFvJY1ND6Zj

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Detected Nirsoft tools 4 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Builder.exe
    "C:\Users\Admin\AppData\Local\Temp\Builder.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "DHCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp92BA.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4644
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "DHCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9319.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1284
    • \??\c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe
      "c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\zrps0h4s.13n"
      2⤵
      • Accesses Microsoft Outlook accounts
      • System Location Discovery: System Language Discovery
      PID:3004
    • \??\c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe
      "c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\kauknjs4.ek5"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kauknjs4.ek5

    Filesize

    3KB

    MD5

    02524418240369b25b988e9884cd1c54

    SHA1

    42a33322d952edf6d8431d4cd788bbc863d2b890

    SHA256

    80b2a0874c2f734dfe1196d7ae2a7bc6ccb30df2d9281513ac33edc529a71a37

    SHA512

    7c5bbe911f7f0b072d6fdb89ea5759655c2b5cf9ebfddff8f2f67f956141b8ed3697ab0504f60c3992849afbbc79434043a6c04d7cf6ddd958e23354fd3a698f

  • C:\Users\Admin\AppData\Local\Temp\tmp92BA.tmp

    Filesize

    1KB

    MD5

    b5a43b9fb362d98c033e9a8b39aac74c

    SHA1

    e32983a42bf0a3dc9b5520ece9d8f34d99bc41d5

    SHA256

    75b9e1e010550532b5f9b425e98710fd6a559a4a15e4736306a4cf9593021235

    SHA512

    1bd7d7646790e9870f6c30bbf53e8140f20172eddedf72b8f3242d1daf192dbce03562a34f9da1b838d2fe87bdd8963cf96d748319756fe017b4edb49e52649b

  • C:\Users\Admin\AppData\Local\Temp\tmp9319.tmp

    Filesize

    1KB

    MD5

    2f26d92c1eeead3896820e56ec46f6f1

    SHA1

    d95533b61eed7d89e4ada56bc566d60e42ac1f61

    SHA256

    99a158463ce40c750bad6991ae1fceece305a0dbf8e209dd7147b5d539756bfa

    SHA512

    6c1ed12d5e1afcd9e7f327e0153786fd8594f75a995f341c408ef014e69917452a9fe99c511f0249aceb57b3045b707f1fd3f404e4086cfbf0aadcb3318db892

  • C:\Users\Admin\AppData\Local\Temp\zrps0h4s.13n

    Filesize

    523B

    MD5

    69b2a2e17e78d24abee9f1de2f04811a

    SHA1

    d19c109704e83876ab3527457f9418a7d053aa33

    SHA256

    1b1491f21e64681f8fdc27b2265e2274fb7813eecb6ad8b446d2e431f6300edd

    SHA512

    eb7269979bc4187520636fe3d7b3089f2c7c02e81c4ce2a738ade680f72c61c67fe9577eeaa09d3ca93f34b60be8c434d2cfbfed6566e783f6611279f056150f

  • memory/1240-1-0x0000000074B50000-0x0000000075101000-memory.dmp

    Filesize

    5.7MB

  • memory/1240-2-0x0000000074B50000-0x0000000075101000-memory.dmp

    Filesize

    5.7MB

  • memory/1240-9-0x0000000074B50000-0x0000000075101000-memory.dmp

    Filesize

    5.7MB

  • memory/1240-13-0x0000000074B52000-0x0000000074B53000-memory.dmp

    Filesize

    4KB

  • memory/1240-14-0x0000000074B50000-0x0000000075101000-memory.dmp

    Filesize

    5.7MB

  • memory/1240-15-0x0000000074B50000-0x0000000075101000-memory.dmp

    Filesize

    5.7MB

  • memory/1240-16-0x0000000074B50000-0x0000000075101000-memory.dmp

    Filesize

    5.7MB

  • memory/1240-0-0x0000000074B52000-0x0000000074B53000-memory.dmp

    Filesize

    4KB

  • memory/2844-25-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2844-27-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2844-28-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2844-34-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/3004-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-20-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-17-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB