Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
44e357921981ac0da89263f4fd694300.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44e357921981ac0da89263f4fd694300.exe
Resource
win10v2004-20231215-en
General
-
Target
44e357921981ac0da89263f4fd694300.exe
-
Size
368KB
-
MD5
44e357921981ac0da89263f4fd694300
-
SHA1
717a1a3dd3282af70c35f8a32f59e706e1b48331
-
SHA256
5018b9959def30ca4de027114e55a105aa7a4339625a1e68b354d14ed87f5d97
-
SHA512
e5bf7a6264f6b0b17e25419273247f8483d1d6dfefb18817883e7ae2681d8ab89c24856dcd2f6a628b9cd859192ee3e8824c67a13968539c6d97737e950b17f1
-
SSDEEP
6144:71+7qr6xy889gva1DGK4pu/pxQ/W11pZ/D1iwMslmO7TFrkTsz:Z+7s8UgvC9/pxH11pdxisdFrkTsz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2108 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 rtaptamghg.exe -
Loads dropped DLL 3 IoCs
pid Process 2108 cmd.exe 2108 cmd.exe 2928 rtaptamghg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2184 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1960 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 rtaptamghg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe 2928 rtaptamghg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2108 1752 44e357921981ac0da89263f4fd694300.exe 28 PID 1752 wrote to memory of 2108 1752 44e357921981ac0da89263f4fd694300.exe 28 PID 1752 wrote to memory of 2108 1752 44e357921981ac0da89263f4fd694300.exe 28 PID 1752 wrote to memory of 2108 1752 44e357921981ac0da89263f4fd694300.exe 28 PID 2108 wrote to memory of 2184 2108 cmd.exe 30 PID 2108 wrote to memory of 2184 2108 cmd.exe 30 PID 2108 wrote to memory of 2184 2108 cmd.exe 30 PID 2108 wrote to memory of 2184 2108 cmd.exe 30 PID 2108 wrote to memory of 1960 2108 cmd.exe 32 PID 2108 wrote to memory of 1960 2108 cmd.exe 32 PID 2108 wrote to memory of 1960 2108 cmd.exe 32 PID 2108 wrote to memory of 1960 2108 cmd.exe 32 PID 2108 wrote to memory of 2928 2108 cmd.exe 33 PID 2108 wrote to memory of 2928 2108 cmd.exe 33 PID 2108 wrote to memory of 2928 2108 cmd.exe 33 PID 2108 wrote to memory of 2928 2108 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\44e357921981ac0da89263f4fd694300.exe"C:\Users\Admin\AppData\Local\Temp\44e357921981ac0da89263f4fd694300.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1752 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\44e357921981ac0da89263f4fd694300.exe" & start C:\Users\Admin\AppData\Local\RTAPTA~1.EXE -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 17523⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:1960
-
-
C:\Users\Admin\AppData\Local\rtaptamghg.exeC:\Users\Admin\AppData\Local\RTAPTA~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD544e357921981ac0da89263f4fd694300
SHA1717a1a3dd3282af70c35f8a32f59e706e1b48331
SHA2565018b9959def30ca4de027114e55a105aa7a4339625a1e68b354d14ed87f5d97
SHA512e5bf7a6264f6b0b17e25419273247f8483d1d6dfefb18817883e7ae2681d8ab89c24856dcd2f6a628b9cd859192ee3e8824c67a13968539c6d97737e950b17f1