Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
RC7_REmakeV1-main.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
RC7_REmakeV1-main.zip
Resource
win11-20231215-en
General
-
Target
RC7_REmakeV1-main.zip
-
Size
641KB
-
MD5
ffe7d531f7c187cff6283970778ccf80
-
SHA1
ccf445f2aec8cdffb0b35b3b810948055ad6a4dd
-
SHA256
ba958af0530ca9d2bfb636bd30a80cfdee131bea91d2eec17ff2624c023d1d7f
-
SHA512
60be821bd3be8a26eeb07361f282f098bf1f95b3578616be917e3ef6d8ecc1d2334a6499e2e17325dbca7cee345991f80e9e139f5e32c902a1e3bbcbb40fda8a
-
SSDEEP
12288:mcNCeKL3wEAmYKWwn02Vtl3wudkzVsRqc8ZP/3oLRlgvyLcm93X:mcNxKLgE9Tn02VtlAud0sh8ZP/o9lddH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 896 vlc.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 2184 msedge.exe 2184 msedge.exe 3144 identity_helper.exe 3144 identity_helper.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 896 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 896 vlc.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 896 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2792 2184 msedge.exe 104 PID 2184 wrote to memory of 2792 2184 msedge.exe 104 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 2828 2184 msedge.exe 105 PID 2184 wrote to memory of 4624 2184 msedge.exe 106 PID 2184 wrote to memory of 4624 2184 msedge.exe 106 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107 PID 2184 wrote to memory of 4736 2184 msedge.exe 107
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\RC7_REmakeV1-main.zip1⤵PID:4300
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ExitHide.3g2"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc498946f8,0x7ffc49894708,0x7ffc498947182⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17719324137260575524,11931530865452350326,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d5564ccbd62bac229941d2812fc4bfba
SHA10483f8496225a0f2ca0d2151fab40e8f4f61ab6d
SHA256d259ff04090cbde3b87a54554d6e2b8a33ba81e9483acbbe3e6bad15cbde4921
SHA512300cda7933e8af577bdc1b20e6d4279d1e418cdb0571c928b1568bfea3c231ba632ccb67313ae73ddeae5586d85db95caffaedd23e973d437f8496a8c5a15025
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD529152e0dae9689895fc9fcc62281fa37
SHA17c8880aaf2380ee5d9f0cc682fcfbb2fa0eb2a1d
SHA2567cb2dd45c850afa7c5e4b5b50f0fa5206aec8a68e107d8914af77ae84dd64fd9
SHA512890520a7f3a43a0895bf581467dd3b409f2bc0c3f8dce87923d793443db59f7a04effb88bdc67e5e8030e864995ddb2ec1fa0f5da49b5bf356ee83cdad2ad84b
-
Filesize
5KB
MD59ce4462137996d747788c1da37755435
SHA1dbf53a692c2d2a6bf77e063b2f257e8d1c8b30aa
SHA256292e51cf3e4bc844fb159174620665a23b19e15a365f523828131f5bf5a19557
SHA512f8894091c69cae00a48a83c5cb45ffc1c2e5f669ccb9cc342dc7cbff0c11ed535f6d402bd500fc8d0327495698f4efdacad4f1580b33dff38b61bb4e806e9f10
-
Filesize
5KB
MD54fef0a5262337bd33d109be942538e2c
SHA16be70380d4263282627225457403ce332dfefd6d
SHA2561c9934a51e9cca27c275fa2714a6eee8e10d4012c5249db189da2941c524d902
SHA51287afdc4d613128f3cc948d2711c520774482f2e3280cc4376948fa99157a8319bf99d97c24b684c1f9fe00ce9140a93b8a1f1fff1c63ed129039c645d6833f59
-
Filesize
24KB
MD51d1c7c7f0b54eb8ba4177f9e91af9dce
SHA12b0f0ceb9a374fec8258679c2a039fbce4aff396
SHA256555c13933eae4e0b0e992713ed8118e2980442f89fbdfb06d3914b607edbbb18
SHA5124c8930fe2c805c54c0076408aba3fbfb08c24566fba9f6a409b5b1308d39c7b26c96717d43223632f1f71d2e9e68a01b43a60031be8f1ca7a541fe0f56f4d9f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56e3792bb714f2678c231c9ae42afcdaa
SHA18c47fdc336f485fdc138a3dfdd20de9efc4ca45d
SHA256d8f85b265a93db26826549c8c6871d8cda6b9a845e5eb66185b85019e570ffc7
SHA5128bacddec7cd8542e56714730efc78b12d203283a2e86b6c873cabcc95196281c5e59c422961d5b68ff2854c9ba8677b2056ee7414ab6e61939688d6118e46c14