Resubmissions

28/03/2024, 19:58

240328-yp6h2afh52 10

26/03/2024, 19:31

240326-x8k6rsac82 10

26/03/2024, 19:29

240326-x7nv9sdb8v 3

26/03/2024, 19:26

240326-x5nsgsab94 10

Analysis

  • max time kernel
    1799s
  • max time network
    1179s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2024, 19:58

General

  • Target

    40a30e39dfce70f5bba7b73dfe0bb97aa6a01b61ba9a3b20913159e077d5e465.exe

  • Size

    172KB

  • MD5

    d5d67479100e986a12e93f9be917bd9c

  • SHA1

    33fad2e93fffeee3c2b358e57d44b632cbfc8e20

  • SHA256

    40a30e39dfce70f5bba7b73dfe0bb97aa6a01b61ba9a3b20913159e077d5e465

  • SHA512

    aaebd28f8c8222ebe8b9080135fa1ee33729abc2787ea5d80cd877e0b8a7f0c1da60469658d8492a0a2567ffed3f15ae94969c91942554488f58d5ef35f88853

  • SSDEEP

    3072:jbx0J+a0UAVTj2XAwqr6HFjuoF+N7bZD16iYIQusGGTkLGFMMalHSXvhSkXWnU2X:jbNa0U+j2Qh69uoF+N7bZD16iYIQusGN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40a30e39dfce70f5bba7b73dfe0bb97aa6a01b61ba9a3b20913159e077d5e465.exe
    "C:\Users\Admin\AppData\Local\Temp\40a30e39dfce70f5bba7b73dfe0bb97aa6a01b61ba9a3b20913159e077d5e465.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\rdcaf.exe
      "C:\Users\Admin\rdcaf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rdcaf.exe

    Filesize

    172KB

    MD5

    f0eaaa21a1bfa1e99a41a2daf7b5e63f

    SHA1

    4dd2c2d6ab3e6aed363adeea42e91e6d388efcdf

    SHA256

    1374cf7d6d04a1fb3a58f505aa3cb9ed2d7a9a203767153311e852a7e850d412

    SHA512

    1cceab22250fa54818f48faf40d67eef96b96415b7cc0070f787eee38cdcdd4d9b8d42fa73e6295fc275ba59d8ada56c5776e3039164da0935e0ac86f0f2dd1d