Analysis

  • max time kernel
    51s
  • max time network
    58s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 06:50

General

  • Target

    cc077c8701bf4c9a4c1c9301eefa7046efb259cf63cf1d86d5dccd524b0b995c.exe

  • Size

    1.1MB

  • MD5

    ec0d613808c1029b86330c6eeda7e026

  • SHA1

    97b18b88bbdbaf4a17df3d41105cfdbdb799aa31

  • SHA256

    cc077c8701bf4c9a4c1c9301eefa7046efb259cf63cf1d86d5dccd524b0b995c

  • SHA512

    272001c06269ed77567960f63675c6362deae472e882d677d3618ef9756507eb0bf94ae38821d51a3d7063f3dd2d997ae05d9795bb2cda80f37cc8ef14e869c5

  • SSDEEP

    24576:gN8Wqwl8XbQGcKEHsw9zDx74FvPwgkTx1jFhGWcmfUpJCSsXYAsvBci0gsOs:A8xwlIhEHp9zDl4F3A11jiWcSyJVAs5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc077c8701bf4c9a4c1c9301eefa7046efb259cf63cf1d86d5dccd524b0b995c.exe
    "C:\Users\Admin\AppData\Local\Temp\cc077c8701bf4c9a4c1c9301eefa7046efb259cf63cf1d86d5dccd524b0b995c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\nsy43A1.tmp\RAVVPN-installer.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy43A1.tmp\RAVVPN-installer.exe" "C:\Users\Admin\AppData\Local\Temp\cc077c8701bf4c9a4c1c9301eefa7046efb259cf63cf1d86d5dccd524b0b995c.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy43A1.tmp\RAVVPN-installer.exe

    Filesize

    263KB

    MD5

    90c51a97424f561e7810c262bf805544

    SHA1

    4b6e2872a5637648503d48816d09ddd311b57984

    SHA256

    72c72730300fe79c173e093bbd0511b21952f4d972385da8fbc4e419217acc47

    SHA512

    906a3e7e90990d601206d9af452c2607bc1e3f4e9ddc507b6dbcda704b2ebe6e10925578f93e9c6aca53878d859e90e96ad1f16ff7208d1b6faf364611dfe43d

  • C:\Users\Admin\AppData\Local\Temp\nsy43A1.tmp\rsAtom.dll

    Filesize

    155KB

    MD5

    96ca672e37e6c0e52b78a6e019bf7810

    SHA1

    52cdb09849b917a8cce39edf0fd2436c8f781442

    SHA256

    95045fb3f5b9a9a1c30b7afcf2bf615709d4b708cf42c6781ea627b1a43f0e6a

    SHA512

    9035417c70e7cc74510b8321dd28a788b1f3ba0bd6e45275bd7c8098c5276bbd70c5935bdb08964c5ee8786bb98c118a7476d23a5efcda231453ad3f09000516

  • C:\Users\Admin\AppData\Local\Temp\nsy43A1.tmp\rsJSON.dll

    Filesize

    215KB

    MD5

    04e734888067ac06f1409d715745b6c6

    SHA1

    4b505a303c32a6d69d4b12f1ac623e46667db5de

    SHA256

    b6d8d54fb33393307383b9f9530eea968ae8065dbf32c62b914ce4bd15d4354d

    SHA512

    8be18926600def2f0cf0c1055dcf594db0dd96b26b3fb895e71c42008632f4f34b3edd6608f1acc0f09d2a17a814e3e58482430463c4554b367697cacd4b1fad

  • C:\Users\Admin\AppData\Local\Temp\nsy43A1.tmp\rsLogger.dll

    Filesize

    177KB

    MD5

    ab7a909589cb83e0ae9de36f56b435cc

    SHA1

    2a30a9da4b0e79623f9e986d3bd85ce141d17310

    SHA256

    ed3e726cf4e48f236ebcd639ff148db03962cc966114a608d1a8d0f7d1737ebd

    SHA512

    b028557ae711c3e4c7852da91dadd140d453404ddb4b85a9d1cd6a7c352f8c16d46bd31956dc39dade47ee927a5a0671c827cff6a4436260599049c8c2d8c471

  • C:\Users\Admin\AppData\Local\Temp\nsy43A1.tmp\rsStubLib.dll

    Filesize

    238KB

    MD5

    a9a1cd75a6dbc18f1094303011ccbf49

    SHA1

    9913bcd3777e6be85b4703de9580f01efa732179

    SHA256

    dcb1efd9e758e8ba34a0ddd60979f47ad9abdc2cadae1075c27df8f9ebfd5ec9

    SHA512

    915300e3013b363e1039e0735cdc78ad12325c64a0a89592fbb187e9bffe3897bf5a2780dc29658ba63b554b25f95e4a1af6439814e0a0af628be923f62e6dde

  • memory/1576-21-0x000001F64EA30000-0x000001F64EA60000-memory.dmp

    Filesize

    192KB

  • memory/1576-31-0x000001F66A310000-0x000001F66A318000-memory.dmp

    Filesize

    32KB

  • memory/1576-22-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-24-0x000001F667230000-0x000001F667268000-memory.dmp

    Filesize

    224KB

  • memory/1576-25-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-17-0x000001F64CCE0000-0x000001F64CD22000-memory.dmp

    Filesize

    264KB

  • memory/1576-26-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-16-0x00007FFB43783000-0x00007FFB43785000-memory.dmp

    Filesize

    8KB

  • memory/1576-28-0x000001F667180000-0x000001F6671AA000-memory.dmp

    Filesize

    168KB

  • memory/1576-29-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-30-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-19-0x000001F64E9F0000-0x000001F64EA2E000-memory.dmp

    Filesize

    248KB

  • memory/1576-32-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-34-0x000001F66A390000-0x000001F66A39E000-memory.dmp

    Filesize

    56KB

  • memory/1576-33-0x000001F66A3D0000-0x000001F66A408000-memory.dmp

    Filesize

    224KB

  • memory/1576-35-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-36-0x00007FFB43783000-0x00007FFB43785000-memory.dmp

    Filesize

    8KB

  • memory/1576-37-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-38-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-39-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-40-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB

  • memory/1576-41-0x00007FFB43780000-0x00007FFB44241000-memory.dmp

    Filesize

    10.8MB