Analysis
-
max time kernel
105s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 19:30
Behavioral task
behavioral1
Sample
661853c344c274af24c2d172db42cc9b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
661853c344c274af24c2d172db42cc9b.exe
Resource
win10v2004-20250217-en
General
-
Target
661853c344c274af24c2d172db42cc9b.exe
-
Size
203KB
-
MD5
661853c344c274af24c2d172db42cc9b
-
SHA1
4bf93aa965559f99c85e521f5984cb409591f54c
-
SHA256
54c028b0bb2728975b22d500df2164a3218670a3db6cb8a9a31654fdc2b8a20b
-
SHA512
ebc3286c97af3f8df973842c21422c124160fefeeeda50757f7e41c9b9fb7405d4d25bd11c5e0a31ab90b41482b444aa5a6e2348f1b475a08238e0784bcd2503
-
SSDEEP
3072:szEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIPoiT05t4Ziu8hBVv4TPcXQZq/:sLV6Bta6dtJmakIM5EGtMMnEcXs7hmt
Malware Config
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IMAP Subsystem = "C:\\Program Files (x86)\\IMAP Subsystem\\imapss.exe" 661853c344c274af24c2d172db42cc9b.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 661853c344c274af24c2d172db42cc9b.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\IMAP Subsystem\imapss.exe 661853c344c274af24c2d172db42cc9b.exe File opened for modification C:\Program Files (x86)\IMAP Subsystem\imapss.exe 661853c344c274af24c2d172db42cc9b.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 661853c344c274af24c2d172db42cc9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3296 schtasks.exe 1572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3372 661853c344c274af24c2d172db42cc9b.exe 3372 661853c344c274af24c2d172db42cc9b.exe 3372 661853c344c274af24c2d172db42cc9b.exe 3372 661853c344c274af24c2d172db42cc9b.exe 3372 661853c344c274af24c2d172db42cc9b.exe 3372 661853c344c274af24c2d172db42cc9b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3372 661853c344c274af24c2d172db42cc9b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3372 661853c344c274af24c2d172db42cc9b.exe Token: SeDebugPrivilege 3372 661853c344c274af24c2d172db42cc9b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3372 wrote to memory of 1572 3372 661853c344c274af24c2d172db42cc9b.exe 87 PID 3372 wrote to memory of 1572 3372 661853c344c274af24c2d172db42cc9b.exe 87 PID 3372 wrote to memory of 1572 3372 661853c344c274af24c2d172db42cc9b.exe 87 PID 3372 wrote to memory of 3296 3372 661853c344c274af24c2d172db42cc9b.exe 89 PID 3372 wrote to memory of 3296 3372 661853c344c274af24c2d172db42cc9b.exe 89 PID 3372 wrote to memory of 3296 3372 661853c344c274af24c2d172db42cc9b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\661853c344c274af24c2d172db42cc9b.exe"C:\Users\Admin\AppData\Local\Temp\661853c344c274af24c2d172db42cc9b.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "IMAP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp8D2C.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1572
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "IMAP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp8D7C.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3296
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57c1e3438321c13afd83257e4839b8f33
SHA12461f57669f68fb52bfd98dc1afba9e4c5951177
SHA256981b514010e868bd65bb600f7adbfbf6087fb308a920a31ee0b858c66307a1e6
SHA512b8170b1769ad7029196a25d11debb89fae55e2c3ea2f4a3867d917bea75ae4b4f7f969acacf50df801a37f6e73393f8b8dad7ab7d1ddbfb986fdf0e59198b675
-
Filesize
1KB
MD54a0b600dc69a91b7134c8cedda9e49d3
SHA1788e74e33a9dc48a45074b7226730a299352f2ef
SHA256113b96e45fb075b17d381d3933db3eb2afcd1d08f7066a27b701ed9efd6c55f7
SHA512e2c7b7ad53ae28f895bbc8f5781b4748af1998832e6f6dadca77a961a123fc5507f84ddac3f1c6851a80d279416485515a7bd1798053aee5ff38e62ce4c7c44c