Analysis
-
max time kernel
142s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe
Resource
win10v2004-20231020-en
General
-
Target
e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe
-
Size
200KB
-
MD5
cfe88832c90a6c49dfd78e0d8261b074
-
SHA1
49321a5546da8d3b7220ffd287c82d49a3c9f7d9
-
SHA256
e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b
-
SHA512
4c58719b95b35b3047cba65f948c56d924a7dd5497c91f07e378bf2bd223ea43e09a1d5e829b17195fea3f265098e392ceeaec384f31234ccac0f9c6377d7df6
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOJ:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1296 rwmhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\rwmhost.exe e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe File opened for modification C:\Windows\Debug\rwmhost.exe e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rwmhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rwmhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2112 e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2392 2112 e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe 29 PID 2112 wrote to memory of 2392 2112 e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe 29 PID 2112 wrote to memory of 2392 2112 e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe 29 PID 2112 wrote to memory of 2392 2112 e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe"C:\Users\Admin\AppData\Local\Temp\e7f1c9edb413fa69b12eba9e17e2ce2372cd4ab0e62724fb5934d534e462967b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E7F1C9~1.EXE > nul2⤵
- Deletes itself
PID:2392
-
-
C:\Windows\Debug\rwmhost.exeC:\Windows\Debug\rwmhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5ec32d3e23360fe96bd66018b2b11b246
SHA15711febfa37ab9c2953dfe4408e8179bb6189925
SHA25620640806571c893a175c3d88d19e9504578a070dcda9dd97176d2d0a359d4932
SHA5128b23b6f27f38a2574e6941d13e95df5f68b9e4809bdeb4e9c7508e327ff9ecf3ad536860c39e40fb9db8940afddba96f95fbfd0a1c286bdf819c84b54d47ea08