Analysis
-
max time kernel
6s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe
-
Size
1.5MB
-
MD5
f75dba012f1fb6995ba2bb64aa238672
-
SHA1
62ff586d4d6587d6364e8032c461fa5c554bc998
-
SHA256
c18840a37679170657aafa5493758eabf62316ebca074d012bde8181436d96d3
-
SHA512
45c8c635066eff67072b437cc98f3d916c2d51611ce3deb518171b3d1d060c62e53833be533a14d2afb7705ac4b2ca6e6064f781d7b09d076851a588889c7b88
-
SSDEEP
24576:6NA3R5drXDFdU4NevOUud0yTTBjExweTzqc4I+dqLIS9z1Aj3eJ3:z5vUaySd05aMzl4IMmIez1Aj3u3
Malware Config
Extracted
nanocore
1.2.2.0
christiantony388.ddns.net:7690
91.193.75.138:7690
241a22e3-2377-4481-a4e9-b295cb644c2f
-
activate_away_mode
false
-
backup_connection_host
91.193.75.138
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2019-08-26T03:06:00.164457636Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
7690
-
default_group
NOV19
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
241a22e3-2377-4481-a4e9-b295cb644c2f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
christiantony388.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
false
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
false
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Executes dropped EXE 2 IoCs
pid Process 1028 jevbrodkii.pif 1856 RegSvcs.exe -
Loads dropped DLL 5 IoCs
pid Process 2088 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe 2088 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe 2088 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe 2088 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe 1028 jevbrodkii.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\81159274\\JEVBRO~1.PIF C:\\Users\\Admin\\AppData\\Local\\Temp\\81159274\\nghje.ebi" jevbrodkii.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1028 set thread context of 1856 1028 jevbrodkii.pif 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jevbrodkii.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1856 RegSvcs.exe 1856 RegSvcs.exe 1856 RegSvcs.exe 1856 RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1028 2088 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe 31 PID 2088 wrote to memory of 1028 2088 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe 31 PID 2088 wrote to memory of 1028 2088 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe 31 PID 2088 wrote to memory of 1028 2088 2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe 31 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32 PID 1028 wrote to memory of 1856 1028 jevbrodkii.pif 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-29_f75dba012f1fb6995ba2bb64aa238672_black-basta_luca-stealer_metamorfo.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\81159274\jevbrodkii.pif"C:\Users\Admin\AppData\Local\Temp\81159274\jevbrodkii.pif" nghje.ebi2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD575e0188d4d7dd193101bcfb5d8bcb6c8
SHA1797c9cca37b349788a6da142639f43caabba6930
SHA25620581e403d3854321633aea43dfd9a8c11415c001ea5efb6f68b035ab703b583
SHA5126a971254f7b06d08b51465df7d6b50ac480babc03197a970389467980d16049aa3e2a85b7a86711b249e2184cc716c7469aa6d72e55dcff22d392a2b0b561a80
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215