Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:15
Behavioral task
behavioral1
Sample
RainRadio.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RainRadio.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
taskill.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
taskill.exe
Resource
win10v2004-20231222-en
General
-
Target
RainRadio.exe
-
Size
291KB
-
MD5
9360319721a50d811f968d11c415552e
-
SHA1
7fde7f2b62a5e3eadb524fe8213bf38dcdf068ee
-
SHA256
07698890107417a8095d07fb0088361d88e3bd2d37d09750d68f717bdf1c2886
-
SHA512
600afd6217c8629ac297e0f68ab4c5ae038f2f78309319335224d19060f07a8b89788daf32f899b1dedf6f3aa13d5ee85f3c753e974f5d4a21132f2a143b1f94
-
SSDEEP
6144:xjn325g9LcO04S629EzDTZvxVK9tp4S9xnQ1IQ:xj3229A5629EzXZvx89tWS92d
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2188-0-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2188-1-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2188-1-0x0000000000400000-0x00000000004BC000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2188 RainRadio.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2188 RainRadio.exe 2188 RainRadio.exe 2188 RainRadio.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2188 RainRadio.exe 2188 RainRadio.exe 2188 RainRadio.exe