Overview
overview
10Static
static
10RCX/RCX.exe
windows7-x64
3RCX/RCX.exe
windows10-2004-x64
7RCX/RCX.exe.lnk
windows7-x64
3RCX/RCX.exe.lnk
windows10-2004-x64
7RCX/RCX/RCX/RCX.exe
windows7-x64
3RCX/RCX/RCX/RCX.exe
windows10-2004-x64
3RCX/RCXDraw.dll
windows7-x64
3RCX/RCXDraw.dll
windows10-2004-x64
1RCX/RCXDraw.exe
windows7-x64
1RCX/RCXDraw.exe
windows10-2004-x64
1RCX/RCXJPN.dll
windows7-x64
1RCX/RCXJPN.dll
windows10-2004-x64
1RCX/trz4A49.exe
windows7-x64
3RCX/trz4A49.exe
windows10-2004-x64
3RCX/trz6D30.exe
windows7-x64
3RCX/trz6D30.exe
windows10-2004-x64
7RCX/trzBF87.exe
windows7-x64
3RCX/trzBF87.exe
windows10-2004-x64
7RCX/trzDBC9.exe
windows7-x64
3RCX/trzDBC9.exe
windows10-2004-x64
7Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 18:57
Behavioral task
behavioral1
Sample
RCX/RCX.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RCX/RCX.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
RCX/RCX.exe.lnk
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
RCX/RCX.exe.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
RCX/RCX/RCX/RCX.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
RCX/RCX/RCX/RCX.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
RCX/RCXDraw.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
RCX/RCXDraw.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
RCX/RCXDraw.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
RCX/RCXDraw.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
RCX/RCXJPN.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
RCX/RCXJPN.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
RCX/trz4A49.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
RCX/trz4A49.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
RCX/trz6D30.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
RCX/trz6D30.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
RCX/trzBF87.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
RCX/trzBF87.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
RCX/trzDBC9.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
RCX/trzDBC9.exe
Resource
win10v2004-20231215-en
General
-
Target
RCX/RCX.exe.lnk
-
Size
758B
-
MD5
0175ab02ca5aee20c22b5dd700d4ae63
-
SHA1
4bea714d90a0188b060b24c18b896cc76b981903
-
SHA256
9fc8cb56d3e95a452c1dee688df3e15cca83bcac4029420debda956b0b16a320
-
SHA512
d09a10d76ab01ca63f85f520ac85e38eca55fb01576687382df5b2baeb4cca5ec0c1fc7a878bf3f94805eec6fed74330732722babca324d177342aa352cc0b8e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2864 RCX.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 RCX.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2864 RCX.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2864 RCX.exe 2864 RCX.exe 2832 RCXDraw.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2864 2196 cmd.exe 18 PID 2196 wrote to memory of 2864 2196 cmd.exe 18 PID 2196 wrote to memory of 2864 2196 cmd.exe 18 PID 2196 wrote to memory of 2864 2196 cmd.exe 18 PID 2864 wrote to memory of 2832 2864 RCX.exe 30 PID 2864 wrote to memory of 2832 2864 RCX.exe 30 PID 2864 wrote to memory of 2832 2864 RCX.exe 30 PID 2864 wrote to memory of 2832 2864 RCX.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RCX\RCX.exe.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\RCX\RCX.exe"C:\Users\Admin\AppData\Local\Temp\RCX\RCX.exe"2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\RCX\RCXDraw.exe"C:\Users\Admin\AppData\Local\Temp\RCX\RCXDraw.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2832
-
-