Analysis
-
max time kernel
289s -
max time network
293s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
14-02-2025 15:54
General
-
Target
test.exe
-
Size
202KB
-
MD5
c1beb7a79c6268028a5e54bbb40421c9
-
SHA1
4521454c5ade866704417c63cca5857b97849c37
-
SHA256
873c4fcc6dcd4c50dddc6fc333bc9dc298264a04756e7b907863f14d58d40a17
-
SHA512
58aec9ff41ff95c57d18eb06b8733ad323651a6e42533d7577323264f646c68246fad6efb17d30c0288c438648b0a71819f4aa05704883b45f7316370f2d1c8e
-
SSDEEP
3072:gzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HI7czhzRWEV9UWlv38SAt:gLV6Bta6dtJmakIM53FAyUWlv3PAt
Malware Config
Signatures
-
Nanocore family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 22 636 Process not Found -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2928 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 test.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz test.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-156903528-2922517348-1168185335-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe 3404 test.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3404 test.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3404 test.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3404 wrote to memory of 4528 3404 test.exe 98 PID 3404 wrote to memory of 4528 3404 test.exe 98 PID 3404 wrote to memory of 4528 3404 test.exe 98 PID 4528 wrote to memory of 1144 4528 cmd.exe 100 PID 4528 wrote to memory of 1144 4528 cmd.exe 100 PID 4528 wrote to memory of 1144 4528 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\explorer.exeexplorer3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1144
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2928
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3084