Overview
overview
7Static
static
39c3d6192ba...d4.exe
windows7-x64
39c3d6192ba...d4.exe
windows10-2004-x64
7$TEMP/gikW...EC.exe
windows7-x64
1$TEMP/gikW...EC.exe
windows10-2004-x64
1Users/�...re.dll
windows7-x64
1Users/�...re.dll
windows10-2004-x64
1Users/�...UI.dll
windows7-x64
1Users/�...UI.dll
windows10-2004-x64
1Users/�...nds.js
windows7-x64
1Users/�...nds.js
windows10-2004-x64
1Users/�...at.exe
windows7-x64
1Users/�...at.exe
windows10-2004-x64
1Users/�...is.dll
windows7-x64
1Users/�...is.dll
windows10-2004-x64
1Users/�...eel.js
windows7-x64
1Users/�...eel.js
windows10-2004-x64
1Users/�...ci.dll
windows7-x64
1Users/�...ci.dll
windows10-2004-x64
1Users/�...up.msi
windows7-x64
1Users/�...up.msi
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
9c3d6192ba68e46624894e4f0136d8d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c3d6192ba68e46624894e4f0136d8d4.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$TEMP/gikWp/rdxYDEC.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$TEMP/gikWp/rdxYDEC.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Users//Desktop//WMPDMCCore.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Users//Desktop//WMPDMCCore.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Users//Desktop//WMPNSSUI.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Users//Desktop//WMPNSSUI.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Users//Desktop//bot/Battlegrounds.js
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Users//Desktop//bot/Battlegrounds.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Users//Desktop//cheat.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Users//Desktop//cheat.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Users//Desktop//mpvis.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Users//Desktop//mpvis.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Users//Desktop//topmon/LookNFeel.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Users//Desktop//topmon/LookNFeel.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Users//Desktop//wmpnssci.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Users//Desktop//wmpnssci.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Users///setup.msi
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Users///setup.msi
Resource
win10v2004-20231215-en
General
-
Target
9c3d6192ba68e46624894e4f0136d8d4.exe
-
Size
8.4MB
-
MD5
9c3d6192ba68e46624894e4f0136d8d4
-
SHA1
7c697bb80dc6a41d1f54468acd6a7bd77ee35533
-
SHA256
7c6e588ecef08afdc346bbc8cc2c0e143798e127fcdc4c41352858b2c614cf2a
-
SHA512
6c6bd78fdd22ad2fb69be5421ae088c345d510a3e73c1ec203be4476917e088792777e500b3348fae2917b361deb7237b6a06d56a5ae62a4bbd8a2a4bdbd5728
-
SSDEEP
196608:XkT+14Gq1DSJkkqe+QQZf0lhgGpphi5LoJ/y5K9de6wL:X54Gq1m6X9oNpz2LoJ/y5KwL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2768 rdxYDEC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2768 rdxYDEC.exe 2768 rdxYDEC.exe 2768 rdxYDEC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4724 wrote to memory of 2768 4724 9c3d6192ba68e46624894e4f0136d8d4.exe 84 PID 4724 wrote to memory of 2768 4724 9c3d6192ba68e46624894e4f0136d8d4.exe 84 PID 4724 wrote to memory of 2768 4724 9c3d6192ba68e46624894e4f0136d8d4.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c3d6192ba68e46624894e4f0136d8d4.exe"C:\Users\Admin\AppData\Local\Temp\9c3d6192ba68e46624894e4f0136d8d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\gikWp\rdxYDEC.exerdxYDEC.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59e469715df9450ad6f46bedfa26d5cf4
SHA17a62364d0e96e0c1c88b05b314ea1e534ee7a807
SHA256c8bcef5710e64466a8f40cc683ab275cff116a9e4486670e909d82522d64dd42
SHA5128a5d9c7a10dc6653c7d27e0769effd31055cd749cd5d66fe9cc97579203559df9266351ebd982777ff0b260f03457d671046ec8db99df5bc8cee4dbde17535b8
-
Filesize
47KB
MD5761f7858d8b65eb884d387fd96da0b0d
SHA1b68f78367c6d36026b75715d2906cbac65cef1dd
SHA25688cba66e9c7e8d35e440026a0cfaa67882535faec3f5805d3aa2b3110e41fe76
SHA5122378963b482da68ff20e0b1721cd33a2655c3a2df2ae49f81c501c94c0616ed8d935fb55963e909db7e0aa46f57b3c5f645af6e3a3e477c7415166acb99e200c