Analysis
-
max time kernel
120s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe
Resource
win10v2004-20250314-en
General
-
Target
cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe
-
Size
524KB
-
MD5
eb794fa258e70ce308b380997ceed62c
-
SHA1
7677a9d15d7dab516b3769a9777d7e7c21912fd9
-
SHA256
cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c
-
SHA512
b653b53e2a3af8ef8a6888abd0ad7729c056874af5f10ce38099bc33eb69ea31029fe4f04ccfaea5365667490f3a953228a159b6ef681251ff17057ca0bec673
-
SSDEEP
12288:bhxp3lZnT9bDkCl3PX0jMCmvpKxZ86rDitH:bJlh9bDkClMjlmvpNgDiJ
Malware Config
Extracted
nanocore
1.2.2.0
ichbin1337.ddns.net:9033
ichbincool.ddns.net:9033
ffcb8fdb-4a29-46cd-a06a-580aecd4cd74
-
activate_away_mode
false
-
backup_connection_host
ichbincool.ddns.net
- backup_dns_server
-
buffer_size
65535
-
build_time
2016-07-15T19:36:40.912595336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
9033
-
default_group
Game Slaves
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ffcb8fdb-4a29-46cd-a06a-580aecd4cd74
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
ichbin1337.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1856 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe -
Executes dropped EXE 2 IoCs
pid Process 5800 accountgen.exe 4700 1380040671.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" accountgen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DDP Monitor = "C:\\Program Files\\DDP Monitor\\ddpmon.exe" 1380040671.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1380040671.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\DDP Monitor\ddpmon.exe 1380040671.exe File opened for modification C:\Program Files\DDP Monitor\ddpmon.exe 1380040671.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1856 powershell.exe 1856 powershell.exe 4700 1380040671.exe 4700 1380040671.exe 4700 1380040671.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4700 1380040671.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1856 powershell.exe Token: SeDebugPrivilege 4700 1380040671.exe Token: SeDebugPrivilege 4700 1380040671.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2772 wrote to memory of 5800 2772 cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe 85 PID 2772 wrote to memory of 5800 2772 cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe 85 PID 5800 wrote to memory of 5268 5800 accountgen.exe 88 PID 5800 wrote to memory of 5268 5800 accountgen.exe 88 PID 5800 wrote to memory of 4500 5800 accountgen.exe 90 PID 5800 wrote to memory of 4500 5800 accountgen.exe 90 PID 4500 wrote to memory of 1856 4500 cmd.exe 92 PID 4500 wrote to memory of 1856 4500 cmd.exe 92 PID 1856 wrote to memory of 4700 1856 powershell.exe 94 PID 1856 wrote to memory of 4700 1856 powershell.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe"C:\Users\Admin\AppData\Local\Temp\cf56c9f957b7a6a680289502433ee407201a9799214f78014e1d5ebc3d719a4c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\accountgen.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\accountgen.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c echo.3⤵PID:5268
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c exec.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NonInteractive -WindowStyle Hidden -ExecutionPolicy Bypass -File ".\bits.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\1380040671\1380040671.exe"C:\Users\Admin\AppData\Local\Temp\1380040671\1380040671.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD59a5331d8875e92214a2fe746c71a075e
SHA170560ed5c4b4f6fbf857cd8bb00a013984cdaac2
SHA25639640164c53a0f64aa0ff626af9d2d695f8a2106ebe3ec1afe464dca6c72049c
SHA5128d1362bead0e1e7dc0b53926ae23559cd43c53ed1d701d0a3b9163137f59d4a4961c68d881c332cdda804f2f849d0dc74d60e47d6c62160850fe9e9151c7a990
-
Filesize
270KB
MD58394b08922e0686a7dd5b48d49ab1c9b
SHA1e9acd4adf0e8c909f92d485041dd3b4ac91c033c
SHA256152fc3bf84fc802e58c78c5fda75a204a5244affa38b4eaffaee243414c155d7
SHA512848a57636a0f05a1e2f9642a31616b0a1885205e7c6c10e2425c852eba9a88653656ee65130afc7d2aec237c2c3b44e1db2e72eae5e689ee43e11b828b73f228
-
Filesize
95B
MD5368e0f2c003376d3bdae1c71dd85ec70
SHA1e5fa7b58cad7f5df6e3a7c2abeec16365ae17827
SHA25684ab0b7013c706781f6839235d7d59cfad0874e4cc415aeaa4bf86a8dd99b0d9
SHA512e3e2c9035fca632d04fd411c394301598e6b964d2ebd79db4fcf19816dd876ed23c51831382202d8f5335a0e4a8721d683c377bb1706e4faa4001387f843d553
-
Filesize
323KB
MD575c4ec9b0ab7cf09ac7e02d82502526f
SHA12e89d641491365af07ae3665cc73ac0a6a47f096
SHA256ebd6560688e89e56bfab3cf28a5d0a740a31b13faae997d66510d6978e5039ec
SHA512a3acee3d0545b0db9ce9a0a42d423b05e27087bba940e053b0f8a783c97bbe6f7364fec01129d53f1c78df5ce7581a43fb6edf98a991d2ae498a99a9585e6549
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82