Overview
overview
10Static
static
10RCX/RCX.exe
windows7-x64
3RCX/RCX.exe
windows10-2004-x64
7RCX/RCX.exe.lnk
windows7-x64
3RCX/RCX.exe.lnk
windows10-2004-x64
7RCX/RCX/RCX/RCX.exe
windows7-x64
3RCX/RCX/RCX/RCX.exe
windows10-2004-x64
3RCX/RCXDraw.dll
windows7-x64
3RCX/RCXDraw.dll
windows10-2004-x64
1RCX/RCXDraw.exe
windows7-x64
1RCX/RCXDraw.exe
windows10-2004-x64
1RCX/RCXJPN.dll
windows7-x64
1RCX/RCXJPN.dll
windows10-2004-x64
1RCX/trz4A49.exe
windows7-x64
3RCX/trz4A49.exe
windows10-2004-x64
3RCX/trz6D30.exe
windows7-x64
3RCX/trz6D30.exe
windows10-2004-x64
7RCX/trzBF87.exe
windows7-x64
3RCX/trzBF87.exe
windows10-2004-x64
7RCX/trzDBC9.exe
windows7-x64
3RCX/trzDBC9.exe
windows10-2004-x64
7Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 18:57
Behavioral task
behavioral1
Sample
RCX/RCX.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RCX/RCX.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
RCX/RCX.exe.lnk
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
RCX/RCX.exe.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
RCX/RCX/RCX/RCX.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
RCX/RCX/RCX/RCX.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
RCX/RCXDraw.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
RCX/RCXDraw.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
RCX/RCXDraw.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
RCX/RCXDraw.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
RCX/RCXJPN.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
RCX/RCXJPN.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
RCX/trz4A49.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
RCX/trz4A49.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
RCX/trz6D30.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
RCX/trz6D30.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
RCX/trzBF87.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
RCX/trzBF87.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
RCX/trzDBC9.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
RCX/trzDBC9.exe
Resource
win10v2004-20231215-en
General
-
Target
RCX/RCX.exe
-
Size
2.4MB
-
MD5
cb2910db65e1c7f468f3a82650486ccf
-
SHA1
8fac4c5dc4731b69b73dc4a68180225b7fa0656f
-
SHA256
b7acae52125a814ed6df47862832cbabb89e9796d7c1c120926bc37a0513785a
-
SHA512
1f4461fee6b84f9402d1ef70071dae1815f23c57186c3b8d8cffbf00effe1f1db37d7f796bc06f76ac294a334f4357ce6e1b770b4c44ac09216787c2a60d425a
-
SSDEEP
12288:41rDGR1ZDsD0brfV7V7VArfV7V7V7V7VArsrsrsrfV7V7V7V7V7V7V7V7VArsrf5:41GZDs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation RCX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 RCX.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2312 RCX.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2312 RCX.exe 2312 RCX.exe 1296 RCXDraw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1296 2312 RCX.exe 92 PID 2312 wrote to memory of 1296 2312 RCX.exe 92 PID 2312 wrote to memory of 1296 2312 RCX.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\RCX\RCX.exe"C:\Users\Admin\AppData\Local\Temp\RCX\RCX.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\RCX\RCXDraw.exe"C:\Users\Admin\AppData\Local\Temp\RCX\RCXDraw.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1296
-