Analysis
-
max time kernel
117s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/01/2025, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
Tempspoffer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Tempspoffer.exe
Resource
win10v2004-20241007-en
General
-
Target
Tempspoffer.exe
-
Size
40.6MB
-
MD5
f0082668059d950985a7241f49b2e783
-
SHA1
a72316855135a7402661576800634a33fba4ffdb
-
SHA256
4a00588e366b27273cc7b3a7dc14addaddc207fdc3b6965e5cb995c1ace2fd04
-
SHA512
453a87d68aafc792fc690766cfcedcfdd3f01039f949f365be269d3e3147466c2e59b5c8ffa16a03db19bdd25b13acddca8fc73b0fde5311077ab142be3efdbd
-
SSDEEP
786432:90Xbab6t3WWEqamWxa4IzSDqG9dabW+mY72F1y4SQNgNh2AtPHAr7UCM283nrG:90Xub64WEa8JIzSmGGbWQ2F1yINgfBhq
Malware Config
Signatures
-
Nanocore family
-
Executes dropped EXE 3 IoCs
pid Process 1256 spoffer.exe 2820 Temp sppoffer.exe 2672 Google Chrome.exe -
Loads dropped DLL 2 IoCs
pid Process 1248 Tempspoffer.exe 1256 spoffer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Manager = "C:\\Program Files (x86)\\DHCP Manager\\dhcpmgr.exe" Google Chrome.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Google Chrome.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DHCP Manager\dhcpmgr.exe Google Chrome.exe File opened for modification C:\Program Files (x86)\DHCP Manager\dhcpmgr.exe Google Chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Google Chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2128 schtasks.exe 1796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe 2672 Google Chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 Google Chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2672 Google Chrome.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1256 1248 Tempspoffer.exe 30 PID 1248 wrote to memory of 1256 1248 Tempspoffer.exe 30 PID 1248 wrote to memory of 1256 1248 Tempspoffer.exe 30 PID 1256 wrote to memory of 2820 1256 spoffer.exe 31 PID 1256 wrote to memory of 2820 1256 spoffer.exe 31 PID 1256 wrote to memory of 2820 1256 spoffer.exe 31 PID 2820 wrote to memory of 2672 2820 Temp sppoffer.exe 33 PID 2820 wrote to memory of 2672 2820 Temp sppoffer.exe 33 PID 2820 wrote to memory of 2672 2820 Temp sppoffer.exe 33 PID 2820 wrote to memory of 2672 2820 Temp sppoffer.exe 33 PID 2672 wrote to memory of 2128 2672 Google Chrome.exe 34 PID 2672 wrote to memory of 2128 2672 Google Chrome.exe 34 PID 2672 wrote to memory of 2128 2672 Google Chrome.exe 34 PID 2672 wrote to memory of 2128 2672 Google Chrome.exe 34 PID 2672 wrote to memory of 1796 2672 Google Chrome.exe 36 PID 2672 wrote to memory of 1796 2672 Google Chrome.exe 36 PID 2672 wrote to memory of 1796 2672 Google Chrome.exe 36 PID 2672 wrote to memory of 1796 2672 Google Chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tempspoffer.exe"C:\Users\Admin\AppData\Local\Temp\Tempspoffer.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\spoffer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\spoffer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Temp sppoffer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Temp sppoffer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Google Chrome.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Google Chrome.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DHCP Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpD2C9.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2128
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DHCP Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpD357.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1796
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33.9MB
MD5f096b2300f64c3fb11d06562a97bc298
SHA1768afdd542a4be396b10033ed7e4f02f36b8236a
SHA25630ba7c29fe54659ef3d4615df1a198096e55c8f7642d70522fb474da9aa4172e
SHA5127a7aaf43905a9c31e0df95d39e44513dea0c5aafb2f2debba769faf604139a7d81a42a500d7cf1c7a30a18e94950ae963c4ab20e3f78ca4c603b15fc336e508d
-
Filesize
6.5MB
MD57bfd75f09aa7e17d66e9cb4a4149748b
SHA179c47f031fa264907f06295985d1b5e1b0ce35d5
SHA256b953c0f984cefd10df18006b4dac295474931059ec39b38cd519c8c8d3dae14b
SHA512703470beff1df7ebde61c1e5631f1aec7d36813907b2dc504f1e0ba0d7f18592f8fc8d43bd54b8066b6c08f29a5cb9fb6cb5b0e8160a3081332c347aed341119
-
Filesize
203KB
MD539dc955ee6e7b3eefd55691689adb50d
SHA1fa9fa0a367d4e47906e387da0357865f60541ff0
SHA2565b4033f97ff12ecc172d1ea985f0a474cfbf124d74cb892377f963c530223c48
SHA512e976c02b4976aadfc3e633653bc576ac8949f3a47f1dc78ac1cdbca7b80bda1ffc9b82d5eb8f44b587dba0bb2e26e2d3135fadeb70241363fc5ee260d58479fb
-
Filesize
1KB
MD5fc6066e1f63e193b1d0c3d59db5c029c
SHA1ac288c28a25c191726a89eba9e1f3476c756826a
SHA25635f383f371aa89cec328c0e4fb0ee13a0ee4e728b545f6c4af631f831509bb46
SHA5123622b5e1d1acbbd636f5df9038359033b657702fd0079d8721709e8acb24db0c70c28202119d264101ba61724933284c801aab79e3b6bba42321e2ea6b34a03c
-
Filesize
1KB
MD5cdf5683344404764a0f3592e9db8a5a1
SHA16705943b404de237cdd7080c05af25e2b1b6410c
SHA2561ea0af7c86be3e61c281ada0470c6dcf178834380def1903b5bb78b49440ffff
SHA51223c56873ca8520784cc1d6b0b4211b373fff6fb429872932e5274801d3b9d786566877cd16d1ffa0adca8c7aebb0b935701a0c071073edfbdb319002f99a182b