Analysis
-
max time kernel
120s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 19:30
Behavioral task
behavioral1
Sample
661853c344c274af24c2d172db42cc9b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
661853c344c274af24c2d172db42cc9b.exe
Resource
win10v2004-20250217-en
General
-
Target
661853c344c274af24c2d172db42cc9b.exe
-
Size
203KB
-
MD5
661853c344c274af24c2d172db42cc9b
-
SHA1
4bf93aa965559f99c85e521f5984cb409591f54c
-
SHA256
54c028b0bb2728975b22d500df2164a3218670a3db6cb8a9a31654fdc2b8a20b
-
SHA512
ebc3286c97af3f8df973842c21422c124160fefeeeda50757f7e41c9b9fb7405d4d25bd11c5e0a31ab90b41482b444aa5a6e2348f1b475a08238e0784bcd2503
-
SSDEEP
3072:szEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIPoiT05t4Ziu8hBVv4TPcXQZq/:sLV6Bta6dtJmakIM5EGtMMnEcXs7hmt
Malware Config
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UDP Service = "C:\\Program Files (x86)\\UDP Service\\udpsv.exe" 661853c344c274af24c2d172db42cc9b.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 661853c344c274af24c2d172db42cc9b.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\UDP Service\udpsv.exe 661853c344c274af24c2d172db42cc9b.exe File opened for modification C:\Program Files (x86)\UDP Service\udpsv.exe 661853c344c274af24c2d172db42cc9b.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 661853c344c274af24c2d172db42cc9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2112 schtasks.exe 2268 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2392 661853c344c274af24c2d172db42cc9b.exe 2392 661853c344c274af24c2d172db42cc9b.exe 2392 661853c344c274af24c2d172db42cc9b.exe 2392 661853c344c274af24c2d172db42cc9b.exe 2392 661853c344c274af24c2d172db42cc9b.exe 2392 661853c344c274af24c2d172db42cc9b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2392 661853c344c274af24c2d172db42cc9b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2392 661853c344c274af24c2d172db42cc9b.exe Token: SeDebugPrivilege 2392 661853c344c274af24c2d172db42cc9b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2112 2392 661853c344c274af24c2d172db42cc9b.exe 30 PID 2392 wrote to memory of 2112 2392 661853c344c274af24c2d172db42cc9b.exe 30 PID 2392 wrote to memory of 2112 2392 661853c344c274af24c2d172db42cc9b.exe 30 PID 2392 wrote to memory of 2112 2392 661853c344c274af24c2d172db42cc9b.exe 30 PID 2392 wrote to memory of 2268 2392 661853c344c274af24c2d172db42cc9b.exe 32 PID 2392 wrote to memory of 2268 2392 661853c344c274af24c2d172db42cc9b.exe 32 PID 2392 wrote to memory of 2268 2392 661853c344c274af24c2d172db42cc9b.exe 32 PID 2392 wrote to memory of 2268 2392 661853c344c274af24c2d172db42cc9b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\661853c344c274af24c2d172db42cc9b.exe"C:\Users\Admin\AppData\Local\Temp\661853c344c274af24c2d172db42cc9b.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UDP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9AE8.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2112
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UDP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9B76.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57c1e3438321c13afd83257e4839b8f33
SHA12461f57669f68fb52bfd98dc1afba9e4c5951177
SHA256981b514010e868bd65bb600f7adbfbf6087fb308a920a31ee0b858c66307a1e6
SHA512b8170b1769ad7029196a25d11debb89fae55e2c3ea2f4a3867d917bea75ae4b4f7f969acacf50df801a37f6e73393f8b8dad7ab7d1ddbfb986fdf0e59198b675
-
Filesize
1KB
MD50a24db62cb5b84309c4803346caaa25d
SHA167660778f61bb44168c33ed3fe56ed86cf9583e8
SHA25638d38647af394a04ee6add9f05c43244f04e64a6b96257f4b241a5038efa82df
SHA512d25d9df063f44595d5e0bf890755bd387655131ff369eeedf3d11ffcc6202ca4455bbb33a8a926dd06839cbd1ddec3d06809b3c66a82c6518aa14beaa469a548