Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 12:06
Static task
static1
Behavioral task
behavioral1
Sample
1cfce58dfd515383527e7fae60655ad8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cfce58dfd515383527e7fae60655ad8.exe
Resource
win10v2004-20231215-en
General
-
Target
1cfce58dfd515383527e7fae60655ad8.exe
-
Size
260KB
-
MD5
1cfce58dfd515383527e7fae60655ad8
-
SHA1
b43c8690f72a836fef1e0047031dfcaa84c4b954
-
SHA256
37c7db4459b215436f9b1f1b447d8100892e5d169c1ab14574b924ca95d817cb
-
SHA512
a0c05bd73cc3338db93b11594ac5af94dfd7f50d5a54ad7fcb012d967f9857720e1ae03efb5d6551b3afb43287356f5d502a65de3a93089e422f5ca8e90016d6
-
SSDEEP
6144:8d/tSgTSrMaIl/jcLijfHFEHWzXvjT85R:8DTSrMaIqLlI/H85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rrxuf.exe -
Executes dropped EXE 1 IoCs
pid Process 1076 rrxuf.exe -
Loads dropped DLL 2 IoCs
pid Process 1792 1cfce58dfd515383527e7fae60655ad8.exe 1792 1cfce58dfd515383527e7fae60655ad8.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /x" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /s" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /N" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /H" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /I" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /W" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /n" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /A" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /v" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /b" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /d" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /l" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /M" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /O" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /w" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /S" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /h" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /p" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /V" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /r" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /Y" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /o" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /X" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /K" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /C" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /a" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /F" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /c" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /L" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /P" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /T" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /U" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /E" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /u" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /D" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /m" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /G" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /z" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /B" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /j" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /J" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /e" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /Z" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /R" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /k" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /y" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /i" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /g" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /q" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /t" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /f" rrxuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrxuf = "C:\\Users\\Admin\\rrxuf.exe /Q" rrxuf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe 1076 rrxuf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1792 1cfce58dfd515383527e7fae60655ad8.exe 1076 rrxuf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1076 1792 1cfce58dfd515383527e7fae60655ad8.exe 28 PID 1792 wrote to memory of 1076 1792 1cfce58dfd515383527e7fae60655ad8.exe 28 PID 1792 wrote to memory of 1076 1792 1cfce58dfd515383527e7fae60655ad8.exe 28 PID 1792 wrote to memory of 1076 1792 1cfce58dfd515383527e7fae60655ad8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cfce58dfd515383527e7fae60655ad8.exe"C:\Users\Admin\AppData\Local\Temp\1cfce58dfd515383527e7fae60655ad8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\rrxuf.exe"C:\Users\Admin\rrxuf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD53f8bf731213d62bfd7f6d33a6b78c0c9
SHA122b46327533c3cee4f41ca6eb56d93601ef400d6
SHA256a638762fdcc55ee24df327ffbfadb7d017ac5f3ec1fcfccb81594ba20208e748
SHA51291ba4f3a10ba75ce9f74caf835c1ee3c61ff7c9c335fb775ef18c5b176d4e5fb7073eb06376c0d6639efbc65957a3771aa936ea408f9f1441aafebe8f8ba1766
-
Filesize
186KB
MD5e884285dbd03206c632006734225a31c
SHA1cf3bc43aff5617148b1de185ddc7b5628c08b8ed
SHA256ed80f18eacf3d174194b89a4172809b4f995e2a639566d2502c2bffc5a846dd2
SHA512830c7920c67af324510a65bb2735f99100099a2ba45f1e2df4a8a1061617aa766fe5cc9c839965b4fd00bf3e7dbc7a47ac0bccfa09afcbb524ecd117448e431d
-
Filesize
52KB
MD5f4862e94c1ab4b1c6de0c6bb96c102c5
SHA11b182ae492153a00d8bb145b8a36b0779322ef26
SHA2568931d678595f0e31bd251300510a091453af7fdf6fe0cbb53e22528a8fdc856b
SHA512f597f6809ea5b6d8aa7dacc000d552a86dfb1d11899ef3cdd0edfe52f4d1eef3c44f01173a7f864812771433260b5074a4fb4a549091ee95cf58bc41502c3893
-
Filesize
189KB
MD5ca73ca67ef2d01251aa5647389f64281
SHA1d2104376680cd4b03ab917acec2ce49c5d7f37be
SHA256cf30399c976218aa55d213ec2f5491ba88936aca684e151327629f1a89f00060
SHA512c8079a64440782b010dc1ee61a815da2ea4255015fb58e5f8f4e0fffaf44cc54ac639c7b938842b69c3d3e1443113da597e8fdfd6602d382f99340a2bc1d24ef
-
Filesize
138KB
MD5f5ab9a5f3fd90e5ae793864dbda7f215
SHA15f29f60975726baf13912f7c54bc51068e94412c
SHA256d3b81acf081917621b89fd6084be36af11bc70b558fc75926bc163f9c65efc8d
SHA512df812842dc6249b24f8a388e04bcf583a0ed0a203ce32bd4b5032d437b5be15df33398473beabacf9b7452fe16367f9cef67c2426cb453cca166abf1d0be5df4