Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2025, 01:02

General

  • Target

    2025-04-05_94e7fb3c3ea440611092e736d7685b6f_black-basta_luca-stealer_metamorfo.exe

  • Size

    1.4MB

  • MD5

    94e7fb3c3ea440611092e736d7685b6f

  • SHA1

    22c5dcac41eae7514488c307fc83c4b00d86ea00

  • SHA256

    042d02ed81084afc2aa2900b4b8ad77c972cf617f5506f961ca3a046fdb09712

  • SHA512

    620ed4bd5462b02431f9e0098d6f82c64964be9799e8f897713c72d0d2ebd6eb43d0e6a08686a9df77ee7758ee63272120913c633447a1ecd83d4d7c35bbaabb

  • SSDEEP

    24576:6NA3R5drXvdn+9rdhf2SQ0KKIlvcWNFli8nXZelYxGJ51yT9E0nu:z5F+9rdh+SQPKIBdNFY8pfxs51opnu

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

isaacjekaguleri1234.ddns.net:57356

213.208.129.218:57356

Mutex

d81f5af0-23d5-45d4-8738-7baca2544eb1

Attributes
  • activate_away_mode

    false

  • backup_connection_host

    213.208.129.218

  • backup_dns_server

  • buffer_size

    65538

  • build_time

    2019-05-20T00:12:07.530934136Z

  • bypass_user_account_control

    false

  • bypass_user_account_control_data

    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

  • clear_access_control

    false

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    57356

  • default_group

    AUGUST MONEY

  • enable_debug_mode

    true

  • gc_threshold

    1.0485772e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.0485772e+07

  • mutex

    d81f5af0-23d5-45d4-8738-7baca2544eb1

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    isaacjekaguleri1234.ddns.net

  • primary_dns_server

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    false

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8009

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-05_94e7fb3c3ea440611092e736d7685b6f_black-basta_luca-stealer_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-05_94e7fb3c3ea440611092e736d7685b6f_black-basta_luca-stealer_metamorfo.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\32422775\gcnndhc.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5416
      • C:\Users\Admin\AppData\Local\Temp\32422775\gbsxq.exe
        "C:\Users\Admin\AppData\Local\Temp\32422775\gbsxq.exe" qcpsujm.gwt
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4040
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4128
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks.exe" /create /f /tn "WAN Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpEA21.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4296
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks.exe" /create /f /tn "WAN Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpEACE.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3540
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\32422775\gbsxq.exe C:\Users\Admin\AppData\Local\Temp\32422775\qcpsujm.gwt
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Users\Admin\AppData\Local\Temp\32422775\gbsxq.exe
      C:\Users\Admin\AppData\Local\Temp\32422775\gbsxq.exe C:\Users\Admin\AppData\Local\Temp\32422775\qcpsujm.gwt
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5460
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Program Files (x86)\WAN Manager\wanmgr.exe
    1⤵
      PID:4492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\32422775\gbsxq.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\32422775\gcnndhc.vbs

      Filesize

      32KB

      MD5

      6b8c96a39bebbc8c58ebbb1dbfc2a5e8

      SHA1

      89dcddabf38b14b70f758275080e6746b040af3d

      SHA256

      343fbfe1f4b421e2ff8eda19531c809c43d0d2d6eefe55bb29ae8f808ff6fd12

      SHA512

      b77548d4d35d65beb3daa9604dd9316cbb8b8727e423b16bc28aba72f7996a067d3e4223e4ef06c5aafed717ddf6a1ee93634777722b3720db7193b4840ae4c1

    • C:\Users\Admin\AppData\Local\Temp\32422775\sudsi.ppt

      Filesize

      472KB

      MD5

      4607b2d7b5060860f1ae49be811667f3

      SHA1

      cfd3a09f8dd2463260728deecf1713384bb66d40

      SHA256

      2268baf402c1f88a0547d4f39ac4b10ffcb9a75869af9a98fdd2563eb96ca89f

      SHA512

      94c3e52e964f0bbe04e6a9f82e5efbd9ac75956b74fdbdbe6678761531b0f6bf99abc4913c56cd5ae654a6a3bf068417fd4b0c7615e9f8097db426047ab32a19

    • C:\Users\Admin\AppData\Local\Temp\tmpEA21.tmp

      Filesize

      1KB

      MD5

      8cad1b41587ced0f1e74396794f31d58

      SHA1

      11054bf74fcf5e8e412768035e4dae43aa7b710f

      SHA256

      3086d914f6b23268f8a12cb1a05516cd5465c2577e1d1e449f1b45c8e5e8f83c

      SHA512

      99c2ef89029de51a866df932841684b7fc912df21e10e2dd0d09e400203bbdc6cba6319a31780b7bf8b286d2cea8ea3fc7d084348bf2f002ab4f5a34218ccbef

    • C:\Users\Admin\AppData\Local\Temp\tmpEACE.tmp

      Filesize

      1KB

      MD5

      f3cda3e6bab1951e8d59c3eb775a14c6

      SHA1

      434c1ec851a45c0505fd8fd28159f549e2e9adfd

      SHA256

      067d3f5167cab2ea4e76f59386df4eaf49c6008f6451e1971274a938ad7bcf44

      SHA512

      bc79446e4e0204c04abcacef6799aeafe7915c1a5c6bdb3573ba40370d6a6a1e2590eb6315151d12a9447970f993a17463442c5dc0ba97c58df17dddfd73d62c

    • memory/4128-121-0x0000000000C00000-0x0000000001C00000-memory.dmp

      Filesize

      16.0MB

    • memory/4128-124-0x000000000E7C0000-0x000000000E852000-memory.dmp

      Filesize

      584KB

    • memory/4128-125-0x000000000E900000-0x000000000E99C000-memory.dmp

      Filesize

      624KB

    • memory/4128-126-0x000000000E860000-0x000000000E86A000-memory.dmp

      Filesize

      40KB

    • memory/4128-123-0x000000000ECD0000-0x000000000F274000-memory.dmp

      Filesize

      5.6MB

    • memory/4128-122-0x0000000000C00000-0x0000000000C3A000-memory.dmp

      Filesize

      232KB

    • memory/4128-134-0x000000000E8E0000-0x000000000E8EA000-memory.dmp

      Filesize

      40KB

    • memory/4128-135-0x000000000E8F0000-0x000000000E8FC000-memory.dmp

      Filesize

      48KB

    • memory/4128-136-0x000000000ECA0000-0x000000000ECBE000-memory.dmp

      Filesize

      120KB

    • memory/4128-137-0x000000000F9F0000-0x000000000F9FA000-memory.dmp

      Filesize

      40KB