Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
2c24fe54dee203528f8a66b7008daaab.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2c24fe54dee203528f8a66b7008daaab.exe
Resource
win10v2004-20231215-en
General
-
Target
2c24fe54dee203528f8a66b7008daaab.exe
-
Size
92KB
-
MD5
2c24fe54dee203528f8a66b7008daaab
-
SHA1
de49adb39fd830451f21f0e233f9d4792e9c3a6c
-
SHA256
3eecc3ade8eaa5c57fdd71b2c5e333ba10b678f0b89ccf846d7d46d1cfbc2c31
-
SHA512
0a02349f95ad17f2998791e79cad1e23631d2f86462ccaf265c8011e47c9aa27846bc57e30c4543a475aae10aea4b3e30086ec75125e6c150faf85c7ec8fca6f
-
SSDEEP
1536:mLXB65939tY6HBg4sXJggL+9cqEBiIfmHbyLf5y4TyJgcfRA1IHUfiAq5U6217PB:mLk395hYXJ69cqiiQ0bOQVRApfiTuB
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MediaCenter\Parameters\ServiceDll = "C:\\Windows\\system32\\Rtmotvy.cc3" 2012820174228.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2c24fe54dee203528f8a66b7008daaab.exe -
Executes dropped EXE 2 IoCs
pid Process 1264 2012820174228.exe 5008 2012820174229.exe -
Loads dropped DLL 2 IoCs
pid Process 1264 2012820174228.exe 2728 svchost.exe -
resource yara_rule behavioral2/memory/1264-15-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Rtmotvy.cc3 2012820174228.exe File created C:\Windows\SysWOW64\firefox.exe 2012820174229.exe File opened for modification C:\Windows\SysWOW64\firefox.exe 2012820174229.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1476 5008 WerFault.exe 49 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1264 2012820174228.exe 1264 2012820174228.exe 5008 2012820174229.exe 5008 2012820174229.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1264 2012820174228.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4372 wrote to memory of 1264 4372 2c24fe54dee203528f8a66b7008daaab.exe 45 PID 4372 wrote to memory of 1264 4372 2c24fe54dee203528f8a66b7008daaab.exe 45 PID 4372 wrote to memory of 1264 4372 2c24fe54dee203528f8a66b7008daaab.exe 45 PID 4372 wrote to memory of 5008 4372 2c24fe54dee203528f8a66b7008daaab.exe 49 PID 4372 wrote to memory of 5008 4372 2c24fe54dee203528f8a66b7008daaab.exe 49 PID 4372 wrote to memory of 5008 4372 2c24fe54dee203528f8a66b7008daaab.exe 49 PID 1264 wrote to memory of 2624 1264 2012820174228.exe 46 PID 1264 wrote to memory of 2624 1264 2012820174228.exe 46 PID 1264 wrote to memory of 2624 1264 2012820174228.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c24fe54dee203528f8a66b7008daaab.exe"C:\Users\Admin\AppData\Local\Temp\2c24fe54dee203528f8a66b7008daaab.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\temp\2012820174228.exe"C:\Windows\temp\2012820174228.exe"2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\temp\201282~1.EXE > nul3⤵PID:2624
-
-
-
C:\Windows\temp\2012820174229.exe"C:\Windows\temp\2012820174229.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 5243⤵
- Program crash
PID:1476
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k start1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k start1⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5008 -ip 50081⤵PID:1636