Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
rm.promoter.v1.4-patch-twk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
rm.promoter.v1.4-patch-twk.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
rmpromoter.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
rmpromoter.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
非常世纪资源网.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
非常世纪资源网.url
Resource
win10v2004-20231215-en
General
-
Target
rmpromoter.exe
-
Size
1.7MB
-
MD5
5950f1c32dfa2a27e303a588aaf07e96
-
SHA1
7a082091cace6536ceb1a3882d574f4ad0611c79
-
SHA256
c697c44bcd67a9f248e69ec96f89d27d8ad73303908c9e0049c225451c77bb46
-
SHA512
ced17784cf046d96de3a5a324138928303bd139136246ae75ad709ec384da045c468dde9f43f9471a891ff93c48bd703ae286a116b70b0d83f02fa61ab97bd6b
-
SSDEEP
24576:Oc/FLC5JYqqzv1La0B7ucbpa2JjL1eieaUBj0gHLcCjyoiwySOUvE9qCeVNsGncg:JQnQzRa4fw/08Z3WSzNsGcwAdo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2784 is-9HKE4.tmp -
Loads dropped DLL 3 IoCs
pid Process 2428 rmpromoter.exe 2784 is-9HKE4.tmp 2784 is-9HKE4.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2784 is-9HKE4.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2784 2428 rmpromoter.exe 28 PID 2428 wrote to memory of 2784 2428 rmpromoter.exe 28 PID 2428 wrote to memory of 2784 2428 rmpromoter.exe 28 PID 2428 wrote to memory of 2784 2428 rmpromoter.exe 28 PID 2428 wrote to memory of 2784 2428 rmpromoter.exe 28 PID 2428 wrote to memory of 2784 2428 rmpromoter.exe 28 PID 2428 wrote to memory of 2784 2428 rmpromoter.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\rmpromoter.exe"C:\Users\Admin\AppData\Local\Temp\rmpromoter.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\is-3Q00M.tmp\is-9HKE4.tmp"C:\Users\Admin\AppData\Local\Temp\is-3Q00M.tmp\is-9HKE4.tmp" /SL4 $30154 C:\Users\Admin\AppData\Local\Temp\rmpromoter.exe 1576877 506882⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD575ee5c174e8157bc7ca178299d02f278
SHA10bbadf6dae7885ef9265f9b9537e7a619465773c
SHA256f70f5f53c88e415c4b3a841db548353d405619db145f6b55a903c5f609dadb38
SHA512a78f07562fe0a1936d32ae22e7b7327f7c3cb8c2f2fdd9bdbe2ffcae97c0fdd4d0b9827bdff41ef07601f661e60ed13e17c7a400f766fa3c3743e234959c5a83
-
Filesize
335KB
MD5ba815e335e3029b42e234ccd84e13aff
SHA17a348a8bfb0e081049491b62013f863f780e5536
SHA256ae5178d164f148a221a4007064ec7a6200a5800e4c736f0bd882dc6d3f1a210c
SHA512c5e1100f4d11d6880d67cc973c822f6826094c6acdc7bf0aa3d6c327d68a670f2118f1c433929bba8ffff941880cf9fc9753e620ab7a7746ca811e8914d9c5f6
-
Filesize
288KB
MD58b0858da653630c8cccc727991ff6c5f
SHA1f0f0e2eefff1c3924f39a661d41b08da50a7a0d1
SHA25632b1b61c8fefcb03ecdde283f5c7a6b90a8db5dd8905a090c1e26276cf402ffa
SHA512744d7c32483dc5172af74224fd8bfac79e6e69cf3006d401262269680b9584f9055f7f37cfbf6bc796106e6d8f4962dcc3f3844084aa6651c04dc11407395a90
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3