Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
RTP100/Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
RTP100/Setup.exe
Resource
win10v2004-20240226-en
General
-
Target
RTP100/Setup.exe
-
Size
571KB
-
MD5
f3a1050bac829eebf38a553db08c02e1
-
SHA1
8a6a2a4e825b1b9de88791c03d7404e181fb0241
-
SHA256
3b178f718655dab3c444857b5e6fd755dc611de72dc229de486b3e06d8548fd2
-
SHA512
9e52b8e46192f72eb06971ee06bad397304db7714df4fd0b8397e2bd9d23c1aacdb10667ec1dfeb3b03b600875656f2a60e3b8582ccb6e86aefcae4a38a895f7
-
SSDEEP
12288:Z3Mjhv8888888888888W88888888888H09+kjn3bVNyRvh6QoqJh5+B+98LApiag:dMjhQ09+miWQpJh5n98LAoa58h5j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3588 Setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3588 4500 Setup.exe 90 PID 4500 wrote to memory of 3588 4500 Setup.exe 90 PID 4500 wrote to memory of 3588 4500 Setup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\RTP100\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RTP100\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\is-N7IJQ.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-N7IJQ.tmp\Setup.tmp" /SL5="$5022C,140800,0,C:\Users\Admin\AppData\Local\Temp\RTP100\Setup.exe"2⤵
- Executes dropped EXE
PID:3588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5a1b9dcc51ceaa1bc0e4775bc0bd41b90
SHA1a905c009ca6f63be26efdb9d69194a61fd45f6e9
SHA256dbdfec18e5f60db9ea34b830a7649d7275e343e0fa52cdf8c8a870b483c1a70a
SHA512efa3b6219354c179f3eaa5caf473fb32b2f9857cf1e2f2cf92b2899b72cb8c05d97049a25309ca80f12bb696f5529d7ad02656cd4e76c8b781faf909646122f3
-
Filesize
64KB
MD5f19e34015ce517f3196b4b8462165cea
SHA171f35d67a0f7a212ee3a9ea4c3859a233d020af2
SHA256401dad0e05efc1d43647c935781574143402724bf6106d5d19baa8ab88190ff8
SHA512f4af642952a7bb93be842ebd6a6e8f9d90c86a7da10aff025299c421a3257156b98ce47220e2913233e79e45f3cf202445b4f754c2194308801b98f640736261