Analysis
-
max time kernel
7s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 00:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f65a714f4db1d2f7d585abc7d60656d.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f65a714f4db1d2f7d585abc7d60656d.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
3f65a714f4db1d2f7d585abc7d60656d.exe
-
Size
168KB
-
MD5
3f65a714f4db1d2f7d585abc7d60656d
-
SHA1
cb96a4d2eddde21a89e3d8ae98fc82fcbd5a1bdc
-
SHA256
6b5315d5569d448773a9d4c334f22475bf820132f65c824b733a5a9fefa4f845
-
SHA512
e64ad49d79fc59d98734766cf731d5c431635e960b023f288e2c3cd5214d13d54d303296eb0cf0f7d8c41da66e963293082ba7c261cd112f0260d19c9d474497
-
SSDEEP
3072:8B/yfWqIm2ToinfY86s+g0Sfh2WYhdH2eluFkVZH7SLmRYqC:8ofU3tfpj0gRUdH2etB+L
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3900 Rmigix.exe 4320 Rmigix.exe 1236 Rmigix.exe -
Loads dropped DLL 2 IoCs
pid Process 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 3900 Rmigix.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmigix = "C:\\Users\\Admin\\AppData\\Roaming\\Rmigix.exe" 3f65a714f4db1d2f7d585abc7d60656d.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4596 set thread context of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 2332 set thread context of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 3900 set thread context of 4320 3900 Rmigix.exe 61 PID 4320 set thread context of 1236 4320 Rmigix.exe 66 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 228 3f65a714f4db1d2f7d585abc7d60656d.exe 228 3f65a714f4db1d2f7d585abc7d60656d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 Rmigix.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 4596 wrote to memory of 2332 4596 3f65a714f4db1d2f7d585abc7d60656d.exe 24 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 2332 wrote to memory of 228 2332 3f65a714f4db1d2f7d585abc7d60656d.exe 29 PID 228 wrote to memory of 3900 228 3f65a714f4db1d2f7d585abc7d60656d.exe 62 PID 228 wrote to memory of 3900 228 3f65a714f4db1d2f7d585abc7d60656d.exe 62 PID 228 wrote to memory of 3900 228 3f65a714f4db1d2f7d585abc7d60656d.exe 62 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 3900 wrote to memory of 4320 3900 Rmigix.exe 61 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 4320 wrote to memory of 1236 4320 Rmigix.exe 66 PID 1236 wrote to memory of 2500 1236 Rmigix.exe 102 PID 1236 wrote to memory of 2500 1236 Rmigix.exe 102 PID 1236 wrote to memory of 2500 1236 Rmigix.exe 102 PID 2500 wrote to memory of 2276 2500 iexplore.exe 103 PID 2500 wrote to memory of 2276 2500 iexplore.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Roaming\Rmigix.exe"C:\Users\Admin\AppData\Roaming\Rmigix.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3900
-
-
-
-
C:\Users\Admin\AppData\Roaming\Rmigix.exe"C:\Users\Admin\AppData\Roaming\Rmigix.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Roaming\Rmigix.exe"C:\Users\Admin\AppData\Roaming\Rmigix.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:17410 /prefetch:25⤵PID:3220
-
-
-
-