Analysis

  • max time kernel
    163s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 03:46

General

  • Target

    rc270.exe

  • Size

    2.6MB

  • MD5

    15703fd23846809513a3765f83ee1407

  • SHA1

    e48b007f0596fc8dfc7a00b698e80fcb75245331

  • SHA256

    a2ce462d9f7a7fe8e40f0073697cc4b34ea5d92e0a80cf7b2ef23bd9105f9156

  • SHA512

    98e763c6f5ad424cb22d8423604ef2ced5e9317063c8957f1cb088c3dc5733381a33811aa62c6c3bb116e17bdf32976c871e611cb02f29c2d4bd2f296a63563b

  • SSDEEP

    49152:f/+/hbb15HXn14QDAp8QUW/y2BSBawwE18+907hRPJIDRhpJaRS:uJbZ5HjDZGSBaZ7W075Cta8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rc270.exe
    "C:\Users\Admin\AppData\Local\Temp\rc270.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Users\Admin\AppData\Local\Temp\is-2OT81.tmp\is-9K8LL.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2OT81.tmp\is-9K8LL.tmp" /SL4 $501D6 C:\Users\Admin\AppData\Local\Temp\rc270.exe 2502286 51200
      2⤵
      • Executes dropped EXE
      PID:644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-2OT81.tmp\is-9K8LL.tmp

    Filesize

    173KB

    MD5

    d45931c1b6bf3e6fb2c610a9d75d3aca

    SHA1

    37e998f326c7b24327199f1dc2f24579751ba90b

    SHA256

    77abf1005714a228af32bb2b07f7b32eb157b0a92cadf0b83da3697273bc9136

    SHA512

    3894b0bdaba2dddeba1fbf14e3449fdd2a421074918312e964af7732da257b0345f917ae3d4b2148503b9fa1e4a88226736ad60ae9ccd578e91963ae2d818f1a

  • C:\Users\Admin\AppData\Local\Temp\is-2OT81.tmp\is-9K8LL.tmp

    Filesize

    237KB

    MD5

    ebef694b86c5311a3b3de72549204a18

    SHA1

    cea899e245b0e2732a1b709aaa72654ea322762f

    SHA256

    3b578cead107a12a61e8701994ea57a193ef3253b356aba051083cf23e3882bb

    SHA512

    881629aebe0572238b89b153025329620204f7291cad71224ef0e2820ff8e651baa696297aafdf312eab3da82f2b00aa37c1ae4accdfb431d6e953b46977a464

  • memory/644-7-0x0000000000650000-0x0000000000651000-memory.dmp

    Filesize

    4KB

  • memory/644-12-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/644-15-0x0000000000650000-0x0000000000651000-memory.dmp

    Filesize

    4KB

  • memory/3336-2-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3336-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3336-11-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB