Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20231023-en
  • resource tags

    arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/11/2023, 19:22

General

  • Target

    ReksFN_Launcher.exe

  • Size

    6.4MB

  • MD5

    932f7870d11a6b043a52061d15501a14

  • SHA1

    334e49517cae3464cfeeae59422cdefcbc22a205

  • SHA256

    2428f2d4d82bcd68303c61cd5585344a4ce13311bee819e9f9023b32f07e3cde

  • SHA512

    b838d9b5d808e970514de7f9c45f968df324ffb8da3745d7fdc3827248d40fd92f6e96723bdd3ffd5ade7090d75386960f14236aab46fa0c65375e233f9c603b

  • SSDEEP

    98304:BHQLjYWlLaioEWdVr6nSCoOUonbUwUWvk0IY2bp+MS4EnOicpwG:BwLjYGOJtdd2SCozonbUycE2bpc4EO

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ReksFN_Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\ReksFN_Launcher.exe"
    1⤵
    • Modifies Control Panel
    PID:616
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /7
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3224

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/616-0-0x000002BD3ECE0000-0x000002BD3F348000-memory.dmp

          Filesize

          6.4MB

        • memory/616-1-0x00007FF97B0E0000-0x00007FF97BACC000-memory.dmp

          Filesize

          9.9MB

        • memory/616-2-0x000002BD598A0000-0x000002BD59EDC000-memory.dmp

          Filesize

          6.2MB

        • memory/616-3-0x000002BD41190000-0x000002BD411A0000-memory.dmp

          Filesize

          64KB

        • memory/616-4-0x000002BD59EE0000-0x000002BD5A316000-memory.dmp

          Filesize

          4.2MB

        • memory/616-5-0x000002BD5A490000-0x000002BD5A548000-memory.dmp

          Filesize

          736KB

        • memory/616-6-0x000002BD5A550000-0x000002BD5A638000-memory.dmp

          Filesize

          928KB

        • memory/616-7-0x000002BD411B0000-0x000002BD411B8000-memory.dmp

          Filesize

          32KB

        • memory/616-8-0x000002BD411C0000-0x000002BD411CA000-memory.dmp

          Filesize

          40KB

        • memory/616-9-0x000002BD5A6C0000-0x000002BD5A774000-memory.dmp

          Filesize

          720KB

        • memory/616-10-0x000002BD5A460000-0x000002BD5A47A000-memory.dmp

          Filesize

          104KB

        • memory/616-11-0x000002BD5A970000-0x000002BD5AA1A000-memory.dmp

          Filesize

          680KB

        • memory/616-12-0x000002BD41190000-0x000002BD411A0000-memory.dmp

          Filesize

          64KB

        • memory/616-13-0x000002BD5D100000-0x000002BD5D10E000-memory.dmp

          Filesize

          56KB

        • memory/616-14-0x000002BD5DA30000-0x000002BD5DAA6000-memory.dmp

          Filesize

          472KB

        • memory/616-15-0x00007FF97B0E0000-0x00007FF97BACC000-memory.dmp

          Filesize

          9.9MB

        • memory/616-16-0x000002BD41190000-0x000002BD411A0000-memory.dmp

          Filesize

          64KB

        • memory/616-17-0x000002BD41190000-0x000002BD411A0000-memory.dmp

          Filesize

          64KB