Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2025 14:02

General

  • Target

    agg.exe

  • Size

    543KB

  • MD5

    4dbf422d243020b7c8dbf7f186e9f405

  • SHA1

    4e2e3ee0214f1d20817efc248d10faea235cc4b5

  • SHA256

    9f0a14be6b3437eb09cca475a3fdcc22bfe51af31abeed95c57be0f61fbffd35

  • SHA512

    8b903fae347f8b4576720307b03abfcb2b19ff00a6c29cb2199d911531bc90dff1d438449072d64ab8bd75fa735f05953e95dc04455139e9e4622249ee4f57b9

  • SSDEEP

    12288:HLV6BtpmkUliOEyfOR4BLij8f4McGz0esfr:rApfUIOEyfjA8AMeesfr

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\agg.exe
    "C:\Users\Admin\AppData\Local\Temp\agg.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /create /f /tn "DSL Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA795.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1324
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /create /f /tn "DSL Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA861.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpA795.tmp

    Filesize

    1KB

    MD5

    d6157234b2b6ca8f8d1e697731927364

    SHA1

    a245df0c0de55ee1aa7c167f2884bbb0b9f479c8

    SHA256

    0061aab09024753d113b25378f07345ef3b1c4b17db4bb1dcb0a9420486d01e5

    SHA512

    8c97b01c425a76d7865960febc04ee5196f34d71693f91e75b26bfdfa444ce45e5e1a22f4922894cc0087f1aa68cc6de9c4cd5edfa7454c48c5712b73e8403ad

  • C:\Users\Admin\AppData\Local\Temp\tmpA861.tmp

    Filesize

    1KB

    MD5

    10ae1ba70a0bb6d3ca9aa43f610f1656

    SHA1

    05add06d0b4a21408f659d233919a7f5fdf5b639

    SHA256

    521664ecbbcfce4ec86a0d48bea0614d4207ccef37680770657dc8ff593ae0cc

    SHA512

    3b571ff4ae7ee3448a506dfe793e91dfcef5c830a66a54e59e648111da889bef2aebe563354eec1f267e976eca73c024f314500f21597ff2e80f82db5220a00d

  • memory/1196-16-0x0000000000D60000-0x0000000000D6C000-memory.dmp

    Filesize

    48KB

  • memory/1196-2-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-15-0x0000000000D50000-0x0000000000D62000-memory.dmp

    Filesize

    72KB

  • memory/1196-14-0x0000000000420000-0x000000000042E000-memory.dmp

    Filesize

    56KB

  • memory/1196-11-0x0000000000AB0000-0x0000000000ABA000-memory.dmp

    Filesize

    40KB

  • memory/1196-12-0x0000000000A20000-0x0000000000A32000-memory.dmp

    Filesize

    72KB

  • memory/1196-13-0x0000000000AC0000-0x0000000000ADA000-memory.dmp

    Filesize

    104KB

  • memory/1196-18-0x0000000001260000-0x0000000001270000-memory.dmp

    Filesize

    64KB

  • memory/1196-21-0x00000000012B0000-0x00000000012CE000-memory.dmp

    Filesize

    120KB

  • memory/1196-20-0x0000000000410000-0x000000000041E000-memory.dmp

    Filesize

    56KB

  • memory/1196-19-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1196-17-0x0000000001250000-0x0000000001264000-memory.dmp

    Filesize

    80KB

  • memory/1196-32-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-3-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-1-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-23-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-24-0x00000000012D0000-0x00000000012FE000-memory.dmp

    Filesize

    184KB

  • memory/1196-25-0x0000000001270000-0x0000000001284000-memory.dmp

    Filesize

    80KB

  • memory/1196-22-0x0000000001280000-0x000000000128A000-memory.dmp

    Filesize

    40KB

  • memory/1196-26-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-27-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-28-0x000007FEF513E000-0x000007FEF513F000-memory.dmp

    Filesize

    4KB

  • memory/1196-29-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-30-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-31-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

    Filesize

    9.6MB

  • memory/1196-0-0x000007FEF513E000-0x000007FEF513F000-memory.dmp

    Filesize

    4KB