Analysis

  • max time kernel
    51s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 10:33

General

  • Target

    RCO2Installer.exe

  • Size

    706KB

  • MD5

    30998e1e3fc08e5d558f8a5a7a4f90b7

  • SHA1

    0a429c9274d381f3e422d95ca6f65fa8804731cf

  • SHA256

    df979e95e56c2023e0fc3342fededa880fad95b47f9b7ee6e7133c89017be581

  • SHA512

    24b809f61dfd603be297503fb2d60d019406eeaa1b3bbb8e6dcd6dbb07d4ad9be8ec7c94518b7878389f46a9eab58122100d4b8f9c0f4531ee51df9d5e0aac18

  • SSDEEP

    12288:vQ1i1+PndRAV0Z/VTEMm1cLPgpUrZCjiFSDjkZ1wvUf0mcOnfhqz9nq:vQ12V0Z/V3m1cLWUtDFSxQD1JCQ

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RCO2Installer.exe
    "C:\Users\Admin\AppData\Local\Temp\RCO2Installer.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Program Files (x86)\RCO2\RCO.exe
      "C:\Program Files (x86)\RCO2\RCO.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:436
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f59758,0x7fef6f59768,0x7fef6f59778
      2⤵
        PID:772
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1568 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:8
        2⤵
          PID:1540
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1216 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:2
          2⤵
            PID:1556
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1668 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:8
            2⤵
              PID:584
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:1
              2⤵
                PID:652
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:1
                2⤵
                  PID:1448
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1536 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:2
                  2⤵
                    PID:2104
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3708 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:1
                    2⤵
                      PID:2180
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3892 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:8
                      2⤵
                        PID:2200
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4016 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:8
                        2⤵
                          PID:2216
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4044 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:1
                          2⤵
                            PID:2408
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2296 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:1
                            2⤵
                              PID:2516
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4348 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:8
                              2⤵
                                PID:2772
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2476 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:1
                                2⤵
                                  PID:3000
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2376 --field-trial-handle=1332,i,12681831904545813845,9916199548744455169,131072 /prefetch:1
                                  2⤵
                                    PID:2244
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:676

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files (x86)\RCO2\RCO.exe

                                    Filesize

                                    762KB

                                    MD5

                                    676a0fcb7a36794849129884f3737cc7

                                    SHA1

                                    8df432ff56b6a961274ca4fad6c0a28412962078

                                    SHA256

                                    2952acd238e09166c1152641cc4b76951f3973106e0ce538a56b7af0686419f9

                                    SHA512

                                    dd347de96e4666c74fb6bf162e1feb096d1a53d53b65c951506a4d30dffcf8162f25a8aedc0dbedd654680c0ef5c5a1bccfde5d2c945fe1a477de7051c7ad84c

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    62KB

                                    MD5

                                    3ac860860707baaf32469fa7cc7c0192

                                    SHA1

                                    c33c2acdaba0e6fa41fd2f00f186804722477639

                                    SHA256

                                    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

                                    SHA512

                                    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                    Filesize

                                    1KB

                                    MD5

                                    a266bb7dcc38a562631361bbf61dd11b

                                    SHA1

                                    3b1efd3a66ea28b16697394703a72ca340a05bd5

                                    SHA256

                                    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                    SHA512

                                    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                    Filesize

                                    242B

                                    MD5

                                    20f6d1bbb825ed7bd9317539c38942d9

                                    SHA1

                                    cbbe6b5cea524e99750d300537610ab9b6281d2b

                                    SHA256

                                    d2eccc1bd251fc9f221fa371ee1d0cf9677840da9755e43fa5cec894a6c7b776

                                    SHA512

                                    3973d2c037f87268483ef2c492cb80a7ef59c7e78ecccda72584b5b33b7509b58a22c4a032017063b5e90e90df3cec8d20ca3bb5fa96ccd820e33b4fcdb2afa5

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RF6cd412.TMP

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    527B

                                    MD5

                                    840e2400c31b411f7a839d6f75698b05

                                    SHA1

                                    df31d9e36932b8dac1101fb40c9d460bfb372e02

                                    SHA256

                                    6bc187e6b9d3b52363b37968fb3483aedf56f615f91b3699281dc637fee1b577

                                    SHA512

                                    60eac0e1767b6ff28134fb79201aa5f0972e4da27ae9be2593eaba760c11c5ad41c92609bb04b348b897b4d5d3ec5f9a6892694d98b60e8970ebc6c33b0eaaff

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    b95f56b51ed4979b4b4f8339ff30f032

                                    SHA1

                                    80c42e409bc4dd341cc843ca5b23d4cbcf08a8e2

                                    SHA256

                                    307180e1fae7f95e7970d220806be86f27e06f56a4fec94f0fb9ed4eb027586a

                                    SHA512

                                    082b521b88f6bef61042c768c91e8175594355ae3bf8bc3fdc64350749d13e746e58dcd177f862632a96df294735559aa855707ce4a32694e848b67d204cb504

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    216092c0b09fdca6cd24620619cae405

                                    SHA1

                                    a9346057c19948d6cb91c712a0c19cdb17e226d5

                                    SHA256

                                    c285d427f2861a21190a5439e5082ef3b68ec9c7774fd2ddeadb02822095acdc

                                    SHA512

                                    17c1a1357512304f1291fe61496ac935d44cc65ff65fa02d17ac4edca951c854bb6ed71e8f4d5b3a4e1bceb07078c4a391a626e574024d0912e39b8020e6ba0e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    0c9f805edca1dbd74829b24f56ade0c6

                                    SHA1

                                    07ca4c45b9f11ae7e0aa2a53ea67d113457cedf5

                                    SHA256

                                    4f1d72111a85f28417a55a0584dc7fbc8141c0d306e88613c9f08f129e4a6632

                                    SHA512

                                    5513a186ffd250add4aeb0f62f5b542b98f3abbe615ef2f4f8fc28bff85e9d28be4e1bbf88594920f25f371e3d18a9bc320751167db4c7e180aa59d280d6159c

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    148KB

                                    MD5

                                    291a216c88962f657bb4e672841e9cc8

                                    SHA1

                                    41c92f64be1870f409458436e3990458d0f5d109

                                    SHA256

                                    68980fa280a7babf1f589465f6768c8cc317b99f987cee0ef33d68a870557ca2

                                    SHA512

                                    1144362625ff91c9fcc0434ee9b460f9cf9c42d1944337efef710d78fe4a4b1d3dc5e4c27181419f69d3f81ba4b995eb704fa26764098bd49946d35e5ce974d6

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\f55a6244-923c-4023-904b-d959258040fc.tmp

                                    Filesize

                                    148KB

                                    MD5

                                    b9d1790981d91c6a61f406fabe3969a8

                                    SHA1

                                    42b0023a4dc955215bf30fa5ec0085c9469dbe35

                                    SHA256

                                    d2bef1fd8fa3ea1cdaee150a6f06daf3520502f03f6c1f8be67eb7a38263c924

                                    SHA512

                                    55ff9d76117a3dd86a318402c0c2b54e82fcc2f2b8129535552072836986f11aae67b970ea4ddbd0a81b492df2139cc22e88dce8d350028f39459bfa597e6780

                                  • C:\Users\Admin\AppData\Local\Temp\TarEBFC.tmp

                                    Filesize

                                    164KB

                                    MD5

                                    4ff65ad929cd9a367680e0e5b1c08166

                                    SHA1

                                    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

                                    SHA256

                                    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

                                    SHA512

                                    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

                                  • \Program Files (x86)\RCO2\RCO.exe

                                    Filesize

                                    762KB

                                    MD5

                                    676a0fcb7a36794849129884f3737cc7

                                    SHA1

                                    8df432ff56b6a961274ca4fad6c0a28412962078

                                    SHA256

                                    2952acd238e09166c1152641cc4b76951f3973106e0ce538a56b7af0686419f9

                                    SHA512

                                    dd347de96e4666c74fb6bf162e1feb096d1a53d53b65c951506a4d30dffcf8162f25a8aedc0dbedd654680c0ef5c5a1bccfde5d2c945fe1a477de7051c7ad84c