Analysis
-
max time kernel
163s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:46
Static task
static1
Behavioral task
behavioral1
Sample
rc270.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
rc270.exe
Resource
win10v2004-20231215-en
General
-
Target
rc270.exe
-
Size
2.6MB
-
MD5
15703fd23846809513a3765f83ee1407
-
SHA1
e48b007f0596fc8dfc7a00b698e80fcb75245331
-
SHA256
a2ce462d9f7a7fe8e40f0073697cc4b34ea5d92e0a80cf7b2ef23bd9105f9156
-
SHA512
98e763c6f5ad424cb22d8423604ef2ced5e9317063c8957f1cb088c3dc5733381a33811aa62c6c3bb116e17bdf32976c871e611cb02f29c2d4bd2f296a63563b
-
SSDEEP
49152:f/+/hbb15HXn14QDAp8QUW/y2BSBawwE18+907hRPJIDRhpJaRS:uJbZ5HjDZGSBaZ7W075Cta8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 644 is-9K8LL.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3336 wrote to memory of 644 3336 rc270.exe 93 PID 3336 wrote to memory of 644 3336 rc270.exe 93 PID 3336 wrote to memory of 644 3336 rc270.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\rc270.exe"C:\Users\Admin\AppData\Local\Temp\rc270.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\is-2OT81.tmp\is-9K8LL.tmp"C:\Users\Admin\AppData\Local\Temp\is-2OT81.tmp\is-9K8LL.tmp" /SL4 $501D6 C:\Users\Admin\AppData\Local\Temp\rc270.exe 2502286 512002⤵
- Executes dropped EXE
PID:644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5d45931c1b6bf3e6fb2c610a9d75d3aca
SHA137e998f326c7b24327199f1dc2f24579751ba90b
SHA25677abf1005714a228af32bb2b07f7b32eb157b0a92cadf0b83da3697273bc9136
SHA5123894b0bdaba2dddeba1fbf14e3449fdd2a421074918312e964af7732da257b0345f917ae3d4b2148503b9fa1e4a88226736ad60ae9ccd578e91963ae2d818f1a
-
Filesize
237KB
MD5ebef694b86c5311a3b3de72549204a18
SHA1cea899e245b0e2732a1b709aaa72654ea322762f
SHA2563b578cead107a12a61e8701994ea57a193ef3253b356aba051083cf23e3882bb
SHA512881629aebe0572238b89b153025329620204f7291cad71224ef0e2820ff8e651baa696297aafdf312eab3da82f2b00aa37c1ae4accdfb431d6e953b46977a464