Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
5311163437ff559324b2f45636f46bc8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5311163437ff559324b2f45636f46bc8.exe
Resource
win10v2004-20231215-en
General
-
Target
5311163437ff559324b2f45636f46bc8.exe
-
Size
142KB
-
MD5
5311163437ff559324b2f45636f46bc8
-
SHA1
8ba3a0bf6d2c58b1af181c9d7eb8f8c31c2b2a01
-
SHA256
29ab3d0899ee3fc766d0acc98500ad3388b11530cd7471bb2513d614caefd0df
-
SHA512
3b4bab1020d378ae859846b1bba4ba96d00f39ba363078d279ff1e10f63f0caa693067a5d10dcf2678dc3431252c1a4d1baeb97f4d82f9a98b15f4890fcdc549
-
SSDEEP
3072:BdxX0Fpx9KQcJJ78IrDlq2RzFq247DCLTzltNSFN9b23y0PEOmuHw794rK9fz8iY:BP0l9KQcJJ78IrDlq2RzFq247DCLTzlG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rpxil.exe -
Executes dropped EXE 1 IoCs
pid Process 3020 rpxil.exe -
Loads dropped DLL 2 IoCs
pid Process 3004 5311163437ff559324b2f45636f46bc8.exe 3004 5311163437ff559324b2f45636f46bc8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\rpxil = "C:\\Users\\Admin\\rpxil.exe" rpxil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe 3020 rpxil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3004 5311163437ff559324b2f45636f46bc8.exe 3020 rpxil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3020 3004 5311163437ff559324b2f45636f46bc8.exe 28 PID 3004 wrote to memory of 3020 3004 5311163437ff559324b2f45636f46bc8.exe 28 PID 3004 wrote to memory of 3020 3004 5311163437ff559324b2f45636f46bc8.exe 28 PID 3004 wrote to memory of 3020 3004 5311163437ff559324b2f45636f46bc8.exe 28 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1 PID 3020 wrote to memory of 3004 3020 rpxil.exe 1
Processes
-
C:\Users\Admin\AppData\Local\Temp\5311163437ff559324b2f45636f46bc8.exe"C:\Users\Admin\AppData\Local\Temp\5311163437ff559324b2f45636f46bc8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\rpxil.exe"C:\Users\Admin\rpxil.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD51772c3b889fb1a66a2dec9fda9d054ad
SHA13b5eb6f3e1de6a73c3e309a90979c1598b63bf15
SHA25600bd1621985876d78b42d91c8c5fd2b2ab78ef6be6a2b56ad8f01544ddda8771
SHA512f3d8013c1b941289136ba44b49490532bacfb238d8e6553386673644196948105da9e1f3488bf619d6921439c6f70a91df4d736bcaac18e8100aa8f6b811926a