Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
10380f30ca38a03e8e576e583953e206.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10380f30ca38a03e8e576e583953e206.exe
Resource
win10v2004-20231215-en
General
-
Target
10380f30ca38a03e8e576e583953e206.exe
-
Size
1.1MB
-
MD5
10380f30ca38a03e8e576e583953e206
-
SHA1
b62bc183d83a553ce274a47416f56373cdd61645
-
SHA256
e146aa239498c41f13a73055bc9a9aca41db83431c23f7d914422e3245bbffff
-
SHA512
7510b5e4196d8418155f0b2b4fffd04ebba8eae1caa7bbe54320deb691b01843024bd6f48657bc335d524a8227b3610e5362711ffc1ef86806b238f4461ee75f
-
SSDEEP
24576:qKeyxTAJj7P+yeo9xIU9N63wXyyQEp/I8M/UueTA:qKeyRA0yeowuQgiKVvc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2672 rsxrriutonec.exe -
Loads dropped DLL 1 IoCs
pid Process 1444 10380f30ca38a03e8e576e583953e206.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\rfmoplsql\rsxrriutonec.exe 10380f30ca38a03e8e576e583953e206.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2672 1444 10380f30ca38a03e8e576e583953e206.exe 28 PID 1444 wrote to memory of 2672 1444 10380f30ca38a03e8e576e583953e206.exe 28 PID 1444 wrote to memory of 2672 1444 10380f30ca38a03e8e576e583953e206.exe 28 PID 1444 wrote to memory of 2672 1444 10380f30ca38a03e8e576e583953e206.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\10380f30ca38a03e8e576e583953e206.exe"C:\Users\Admin\AppData\Local\Temp\10380f30ca38a03e8e576e583953e206.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\rfmoplsql\rsxrriutonec.exe"C:\Program Files (x86)\rfmoplsql\rsxrriutonec.exe"2⤵
- Executes dropped EXE
PID:2672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5e0573415a7b782489afd4565687a5ea2
SHA13ea97cbbe46c09d4ba5636964c79c9f572cec85c
SHA2560514e4c8fd6e82a5f141cd6aa3bed07e06cf9faa7707441a66580fe4d36235af
SHA512ce6f1d49deb9eec062a240b7747d0bd816b52f620b8690806a26e59b128dcd7fcdd266bb85b3c2b12da45dbdb9eebddd5709c970dc73c719a84bb031052ba457