Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe
Resource
win10v2004-20240226-en
General
-
Target
e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe
-
Size
579KB
-
MD5
c120e299d90c9842d8876d7d0f05a122
-
SHA1
47f4db2443aa422664a6c388c799f620982c8c1a
-
SHA256
e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe
-
SHA512
27a74be873e32eb6c04e032891db5a5c32aa7502884fcb90f119ba15a75d327e446118553cb580a05ca8b5722bc51747a5e4825c91e33ba60c9aa71256d93244
-
SSDEEP
12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0R6d/5cdefdmIaa:P1/aGLDCM4D8ayGMeSeFmIaa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2468 rgksb.exe -
Loads dropped DLL 2 IoCs
pid Process 1728 e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe 1728 e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\rgksb.exe" rgksb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2468 1728 e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe 29 PID 1728 wrote to memory of 2468 1728 e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe 29 PID 1728 wrote to memory of 2468 1728 e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe 29 PID 1728 wrote to memory of 2468 1728 e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe"C:\Users\Admin\AppData\Local\Temp\e3249c4ac754660d562e18ef18ef50cef2d29450002afd060e51974faa0ffabe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\ProgramData\rgksb.exe"C:\ProgramData\rgksb.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579KB
MD5e42dcfd7f01aeb69a4481cced3e0ee75
SHA115554ac95cf78795fc9ec3acbff9e0c98a19108a
SHA256fd3e6a66fbdcd7652b4993e6e6a5aa97dd7f84fd5dae7cae65389218079f5377
SHA51201585bc5291d281c495ce8a2e9c5e037858dc690d8b4727a794352cbce0a51f7d9956988f4e7ce2c65bdbb509dfa918e409b4402f80d1553f1a8ba45c79277fb
-
Filesize
320KB
MD51818c7eeb7ff2bc06248b70ad87fb08f
SHA1ce7ce0e62f23a362cbbb3eae092cffd2010ff1f1
SHA256700e25d2b45f37390ed22d465d0cf3784fa2d742954615495f8adabc0f8de37b
SHA5121ac2dbf063cf5776da5185d66df1ca1a7b80d915ce4ec59ff037e29aa79740c53d24767de5fbb9d80487a8c878ff1b045b7d175db6e3cd186dbb3f11a97df470
-
Filesize
258KB
MD5762a5fd7c9d037cb1c3cf4c39eb5bcca
SHA1e3612883d988cb8fc8709682a2784dca89352f2e
SHA25654b2c146215cd483157c95648a7863ce6c8fdaa463094bc25bfc0816d4820c5e
SHA5122ac8e951a61468e66ffbb31299dd0c6427e6580e33f2703175560673e2741ffe402f10ad2a1aa04d368ae9711e34df23be0f73465ea21334667768fdc6313419