Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
A653D1951B3DE7E0EDE77758187763B0.exe
Resource
win7-20240903-en
General
-
Target
A653D1951B3DE7E0EDE77758187763B0.exe
-
Size
3.0MB
-
MD5
a653d1951b3de7e0ede77758187763b0
-
SHA1
06df3427aa544488543152111f5c5cfc52d41463
-
SHA256
21f3851df5c3487b850c88275818072eb000857423f72608b0708b53bb3bbf64
-
SHA512
c8e5bc1284b3349cd81bb8edb85ebd5bb01fe08eb51aad53992a22a045ffae58ea4d7649f60559c9c5adaf71a7bcef4db3359bd54ae8157d9c0f0b9f2b0130ca
-
SSDEEP
49152:yKcYOh1T3CVOnr9zBVPgxyJbV4cPodKiUIQ+WSqwEQU:yxfrzCVOh9tQcPotU7
Malware Config
Extracted
nanocore
1.2.2.0
ksmj.ddns.net:1337
b73dccc0-ae28-411e-8f12-dcb30e5628a2
-
activate_away_mode
true
-
backup_connection_host
ksmj.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-12-21T21:11:28.928783136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1337
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b73dccc0-ae28-411e-8f12-dcb30e5628a2
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
ksmj.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Executes dropped EXE 5 IoCs
pid Process 2700 3377.exe 2960 ksmj.ddns.net.exe 2588 R00tkit Blandly.exe 692 Blandly Rootkit.exe 1212 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 2588 R00tkit Blandly.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3377.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ksmj.ddns.net.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 raw.githubusercontent.com 9 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksmj.ddns.net.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2700 3377.exe 2700 3377.exe 2960 ksmj.ddns.net.exe 2960 ksmj.ddns.net.exe 2960 ksmj.ddns.net.exe 2700 3377.exe 2960 ksmj.ddns.net.exe 2960 ksmj.ddns.net.exe 2960 ksmj.ddns.net.exe 2700 3377.exe 2700 3377.exe 2700 3377.exe 2960 ksmj.ddns.net.exe 2960 ksmj.ddns.net.exe 2960 ksmj.ddns.net.exe 2700 3377.exe 2700 3377.exe 2700 3377.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2960 ksmj.ddns.net.exe 2700 3377.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2700 3377.exe Token: SeDebugPrivilege 2960 ksmj.ddns.net.exe Token: SeDebugPrivilege 692 Blandly Rootkit.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2700 2184 A653D1951B3DE7E0EDE77758187763B0.exe 31 PID 2184 wrote to memory of 2700 2184 A653D1951B3DE7E0EDE77758187763B0.exe 31 PID 2184 wrote to memory of 2700 2184 A653D1951B3DE7E0EDE77758187763B0.exe 31 PID 2184 wrote to memory of 2700 2184 A653D1951B3DE7E0EDE77758187763B0.exe 31 PID 2184 wrote to memory of 2960 2184 A653D1951B3DE7E0EDE77758187763B0.exe 32 PID 2184 wrote to memory of 2960 2184 A653D1951B3DE7E0EDE77758187763B0.exe 32 PID 2184 wrote to memory of 2960 2184 A653D1951B3DE7E0EDE77758187763B0.exe 32 PID 2184 wrote to memory of 2960 2184 A653D1951B3DE7E0EDE77758187763B0.exe 32 PID 2184 wrote to memory of 2588 2184 A653D1951B3DE7E0EDE77758187763B0.exe 33 PID 2184 wrote to memory of 2588 2184 A653D1951B3DE7E0EDE77758187763B0.exe 33 PID 2184 wrote to memory of 2588 2184 A653D1951B3DE7E0EDE77758187763B0.exe 33 PID 2588 wrote to memory of 692 2588 R00tkit Blandly.exe 34 PID 2588 wrote to memory of 692 2588 R00tkit Blandly.exe 34 PID 2588 wrote to memory of 692 2588 R00tkit Blandly.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\A653D1951B3DE7E0EDE77758187763B0.exe"C:\Users\Admin\AppData\Local\Temp\A653D1951B3DE7E0EDE77758187763B0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3377.exe"C:\Users\Admin\AppData\Local\Temp\3377.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\ksmj.ddns.net.exe"C:\Users\Admin\AppData\Local\Temp\ksmj.ddns.net.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\R00tkit Blandly.exe"C:\Users\Admin\AppData\Local\Temp\R00tkit Blandly.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Blandly Rootkit.exe"C:\Users\Admin\AppData\Local\Temp\Blandly Rootkit.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD50e013a4db9f8352623a4eaa401d1911d
SHA167f2a12f5885ecd77529e21754f6597a2681800d
SHA2561f3efa5e76eefce96212cbb8b77df3aae303ec5d6867a5c70d6d546836149584
SHA5129c265ba915a79f95fa1d2cd85dec28308fc09a3fac4d5b8a35ecc6aebc22fe573343451fd822a5d6b4e7fc8a57fd60a7df26134f9fef83e128add574e42c0337
-
Filesize
2.7MB
MD5b66e88ba098da4d287b2dd99f69d14ef
SHA17bc51b7d8fb33372b162ec8cb7da3d9283ddb7d4
SHA256105fee6fb5d6119c586844d5b7ceaa27b86c8ace1b8c2c30eaea51eb55c7b115
SHA512a08c1cb60dfba2a4a601bcb5bf3f84e08aa98aa5eab1de8aace423f52f38ae1ed7ae610b60d6ad7dbe1dd9329e022c08f91f84fa62fed8acf84c437c0883cee1
-
Filesize
202KB
MD5e2557f03a5d4de545313ba77de25139e
SHA174e271b02f314f8e1544d51ba3095c33b6015930
SHA256ec9bba03d8dabd1ccaf0decd0bbe6fa6b8f23b8b81d67bc96b644f8751409ac6
SHA512451eb59e76ec322c278f99e83af335d419ffc43d0485b4884b0ac519b5759fcf7a6770439894dd240ccc32678842df3b457aa74a82d0079a3e84ff52479d6929
-
Filesize
3.0MB
MD5302e8cd3926e071313c59cb2ad1d1d79
SHA153e21e236d428fcd390b54d4803ac43fdafe6b6c
SHA256984360f867c1891f7ea6293ac2f72907321d1bcc4e68184327dad522744c97a5
SHA512e95d3a536eeac0834b249511100d7e354c3994840882a9b4e77d6f93b8d7750a09a85f74fa2b9b71304c5be66a559df2f0089c82f3d8f78c658a385379d09c16