Analysis
-
max time kernel
9s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19-02-2023 22:08
Behavioral task
behavioral1
Sample
Game.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Game.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
System/RGSS301.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
System/RGSS301.dll
Resource
win10v2004-20220812-en
General
-
Target
System/RGSS301.dll
-
Size
1.0MB
-
MD5
dd25855ac39d32da033902fc58fa210b
-
SHA1
0ffa23a4d0b81438a329258f5c8d3b3403f4aa94
-
SHA256
27647690ed16218cd988dd71069fdca67207515b2a2df775be361f0198ab6876
-
SHA512
07f7f7cb4eda2165b4b28456fb01d4edea6e3d5f305dde19256865777905a0d0bb1d13ce1194a8639d740f633ccf1507a1b87530644d5e2d512a86829195ae60
-
SSDEEP
24576:+pc8WbPqpzFwdPhet279ae3P7zqP2JzCNkX67Flr1nH0F3ia:+pc8W7qEdPhet2hae3HfJR2Uf
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Modifies registry class 3 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1324 wrote to memory of 1784 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1784 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1784 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1784 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1784 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1784 1324 rundll32.exe rundll32.exe PID 1324 wrote to memory of 1784 1324 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\System\RGSS301.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\System\RGSS301.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
PID:1784
-