Analysis
-
max time kernel
28s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24-10-2023 10:53
Behavioral task
behavioral1
Sample
RC7.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
RC7.exe
Resource
win10v2004-20231023-en
General
-
Target
RC7.exe
-
Size
5.9MB
-
MD5
a182caf9eac2984fe420ba38dee42589
-
SHA1
dad2e80fbba6ef855d01f5e0a429863de14e3069
-
SHA256
05311e59be8266ba7a34622879ac1ed2e8d345bf6aef65e5ec57ba95861b981d
-
SHA512
e97ce5939e47c06a920fc49fda06bae210aa6a98063fce37cb1bbefbc837f27c28a4e63c7d4ae18746cd1916399c6b5b1e955f4e1452ee0b4a24d57f3491bfd4
-
SSDEEP
98304:pxmoDUN43WeeqOjOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6a2nMdT:pxumWewOjmFwDRxtYSHdK34kdai7bN3i
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2720 RC7.exe -
resource yara_rule behavioral1/files/0x0006000000018b7b-21.dat upx behavioral1/files/0x0006000000018b7b-22.dat upx behavioral1/memory/2720-23-0x000007FEF62E0000-0x000007FEF6746000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2720 2072 RC7.exe 28 PID 2072 wrote to memory of 2720 2072 RC7.exe 28 PID 2072 wrote to memory of 2720 2072 RC7.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD54a6afa2200b1918c413d511c5a3c041c
SHA139ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3
SHA256bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da
SHA512dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20
-
Filesize
1.4MB
MD54a6afa2200b1918c413d511c5a3c041c
SHA139ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3
SHA256bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da
SHA512dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20