Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe
Resource
win7-20241023-en
General
-
Target
6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe
-
Size
1005KB
-
MD5
f1cc61e9f5c6582068587a299af11e0c
-
SHA1
8411f0e9b01e4ff7fce473e05f2ff34bd4d452a3
-
SHA256
6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff
-
SHA512
cabae307fda0635670d07247de662796e988fb0080c0bae05d93d9bd64f5112266268738cdd7549aefb368c6818ffa73e9e7b9f166fdd791cbba3b12c14b54b4
-
SSDEEP
12288:RO64ectxdIsRVIEmfds397GSP32CXE4H932CXEa/M:R57YgswEodslGSf2CPHJ2CJ/M
Malware Config
Extracted
nanocore
1.2.2.0
niiarmah.kozow.com:9301
niiarmah.duckdns.org:9301
10406b63-713b-4c08-b037-a196ecfc3de2
-
activate_away_mode
true
-
backup_connection_host
niiarmah.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-08-24T03:26:43.193669336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
9301
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
10406b63-713b-4c08-b037-a196ecfc3de2
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
niiarmah.kozow.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe -
Executes dropped EXE 1 IoCs
pid Process 3880 svhost.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 652 set thread context of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\Antispyware\Security.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2168 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Antispyware\Security.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 3880 svhost.exe 3880 svhost.exe 3880 svhost.exe 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3880 svhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe Token: SeDebugPrivilege 3880 svhost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 652 wrote to memory of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 PID 652 wrote to memory of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 PID 652 wrote to memory of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 PID 652 wrote to memory of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 PID 652 wrote to memory of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 PID 652 wrote to memory of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 PID 652 wrote to memory of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 PID 652 wrote to memory of 3880 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 94 PID 652 wrote to memory of 1560 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 95 PID 652 wrote to memory of 1560 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 95 PID 652 wrote to memory of 1560 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 95 PID 652 wrote to memory of 4532 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 97 PID 652 wrote to memory of 4532 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 97 PID 652 wrote to memory of 4532 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 97 PID 4532 wrote to memory of 4272 4532 cmd.exe 99 PID 4532 wrote to memory of 4272 4532 cmd.exe 99 PID 4532 wrote to memory of 4272 4532 cmd.exe 99 PID 652 wrote to memory of 4568 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 100 PID 652 wrote to memory of 4568 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 100 PID 652 wrote to memory of 4568 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 100 PID 652 wrote to memory of 2784 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 103 PID 652 wrote to memory of 2784 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 103 PID 652 wrote to memory of 2784 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 103 PID 652 wrote to memory of 3436 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 105 PID 652 wrote to memory of 3436 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 105 PID 652 wrote to memory of 3436 652 6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe 105 PID 3436 wrote to memory of 2168 3436 cmd.exe 107 PID 3436 wrote to memory of 2168 3436 cmd.exe 107 PID 3436 wrote to memory of 2168 3436 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe"C:\Users\Admin\AppData\Local\Temp\6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/6cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff.exe" "%appdata%\Antispyware\Security.exe" /Y2⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%appdata%\Antispyware\Security.exe.lnk" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Antispyware\Security.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %appdata%\Antispyware\Security.exe:Zone.Identifier2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ren "%appdata%\Antispyware\Security.exe.jpg" Security.exe2⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Antispyware\Security.exe.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD58fdf47e0ff70c40ed3a17014aeea4232
SHA1e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be
-
Filesize
1005KB
MD5f1cc61e9f5c6582068587a299af11e0c
SHA18411f0e9b01e4ff7fce473e05f2ff34bd4d452a3
SHA2566cc902a129311aaac4f40644029251ed2fc60a9138cb705d85e556deaf5d5cff
SHA512cabae307fda0635670d07247de662796e988fb0080c0bae05d93d9bd64f5112266268738cdd7549aefb368c6818ffa73e9e7b9f166fdd791cbba3b12c14b54b4
-
Filesize
209B
MD5b0d86bf8ebf3a961a9eb244c9387f47b
SHA11227e30c2504575ce80830e78fe8d97ec98d2994
SHA2566e544573bfd75d9c8846e8a6fe037b20874e8f10fc7559c18af52f01e789f856
SHA512ec987050df366b71d0d098cccf1d667e9284581b0b7206b8e1ebaa4345fe6a8175732f8ce8210e6fd7c9ea95a8d5bf57e1159c712a4524a886441c92f9f56e01