Overview
overview
6Static
static
1Devment_5.rdp
windows7-x64
6Devment_5.rdp
windows10-2004-x64
6Devment_5.rdp
android-9-x86
Devment_5.rdp
android-10-x64
Devment_5.rdp
android-11-x64
Devment_5.rdp
macos-10.15-amd64
1Devment_5.rdp
ubuntu-18.04-amd64
Devment_5.rdp
debian-9-armhf
Devment_5.rdp
debian-9-mips
Devment_5.rdp
debian-9-mipsel
Analysis
-
max time kernel
130s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 02:43
Static task
static1
Behavioral task
behavioral1
Sample
Devment_5.rdp
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Devment_5.rdp
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
Devment_5.rdp
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
Devment_5.rdp
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
Devment_5.rdp
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
Devment_5.rdp
Resource
macos-20220504-en
Behavioral task
behavioral7
Sample
Devment_5.rdp
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral8
Sample
Devment_5.rdp
Resource
debian9-armhf-20221125-en
Behavioral task
behavioral9
Sample
Devment_5.rdp
Resource
debian9-mipsbe-20221111-en
Behavioral task
behavioral10
Sample
Devment_5.rdp
Resource
debian9-mipsel-en-20211208
General
-
Target
Devment_5.rdp
-
Size
86B
-
MD5
ead61a03def0e733115092a1c61bd62c
-
SHA1
fb70b326a1a646cf2d035e49c0df9f5685e528eb
-
SHA256
1eb7f0062c0ab8f6c17ed971fadc7cfb2751cf71f57b46277ecda383d7bc7858
-
SHA512
688c214091265eb835b1bae498bf08eca5b786f75016198b5a566e1e75de9bd92b7d5e48cd483d8e03ea6cbf42369967480bc0448c17125f2188325e1e487650
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\F: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\Q: mstsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1696 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1696 mstsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1696 mstsc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1696 1048 cmd.exe 27 PID 1048 wrote to memory of 1696 1048 cmd.exe 27 PID 1048 wrote to memory of 1696 1048 cmd.exe 27
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Devment_5.rdp1⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\mstsc.exe"mstsc.exe" "C:\Users\Admin\AppData\Local\Temp\Devment_5.rdp"2⤵
- Enumerates connected drives
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1696
-