General
-
Target
https://cdn.discordapp.com/attachments/1157438477202366687/1157704178731327528/RC7.zip?ex=65199389&is=65184209&hm=b8a48fcd4349eaf066ee16129cfef49db098ccb2ac78eb0e84a6850cd8d616ed&
-
Sample
231001-qqgx3abb3y
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1157438477202366687/1157704178731327528/RC7.zip?ex=65199389&is=65184209&hm=b8a48fcd4349eaf066ee16129cfef49db098ccb2ac78eb0e84a6850cd8d616ed&
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1157438477202366687/1157704178731327528/RC7.zip?ex=65199389&is=65184209&hm=b8a48fcd4349eaf066ee16129cfef49db098ccb2ac78eb0e84a6850cd8d616ed&
Score10/10-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1