Overview
overview
7Static
static
3RTSSSetup736.exe
windows7-x64
7RTSSSetup736.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDI...64.dll
windows7-x64
1$PLUGINSDI...64.dll
windows10-2004-x64
1$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$R0.dll
windows7-x64
1$R0.dll
windows10-2004-x64
1Codec/rtvcvfw32.dll
windows7-x64
1Codec/rtvcvfw32.dll
windows10-2004-x64
1DesktopOve...st.exe
windows7-x64
1DesktopOve...st.exe
windows10-2004-x64
1DesktopOve...er.exe
windows7-x64
3DesktopOve...er.exe
windows10-2004-x64
7EncoderServer.cfg
windows7-x64
3EncoderServer.cfg
windows10-2004-x64
3EncoderServer.exe
windows7-x64
1EncoderServer.exe
windows10-2004-x64
1EncoderServer64.exe
windows7-x64
1EncoderServer64.exe
windows10-2004-x64
1RTFC.dll
windows7-x64
3RTFC.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
RTSSSetup736.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
RTSSSetup736.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LockedList.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LockedList.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LockedList64.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LockedList64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$R0.dll
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
$R0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Codec/rtvcvfw32.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Codec/rtvcvfw32.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
DesktopOverlayHost.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
DesktopOverlayHost.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
DesktopOverlayHostLoader.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
DesktopOverlayHostLoader.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
EncoderServer.cfg
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
EncoderServer.cfg
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
EncoderServer.exe
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
EncoderServer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
EncoderServer64.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
EncoderServer64.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
RTFC.dll
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
RTFC.dll
Resource
win10v2004-20240226-en
General
-
Target
EncoderServer.cfg
-
Size
89B
-
MD5
d81d3a63c3597a1ac1f61e7862e174f1
-
SHA1
416c43386386a8916ae80482aacd5a998e9d4e83
-
SHA256
d505f1850d38d5d6b5d4924cca0f7ed679bbae6ae1ecd8e5c24257fce01f602e
-
SHA512
72188bb3629c4938a5b1c93e5be7b8fd87ed3ca946feccf36de4b3acb999585b3edde4bd517a173c32774ce46492bf94819e5a49350135ebb370648478685f14
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\cfg_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.cfg rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.cfg\ = "cfg_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\cfg_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\cfg_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\cfg_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\cfg_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\cfg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2172 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2172 AcroRd32.exe 2172 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2740 2164 cmd.exe 29 PID 2164 wrote to memory of 2740 2164 cmd.exe 29 PID 2164 wrote to memory of 2740 2164 cmd.exe 29 PID 2740 wrote to memory of 2172 2740 rundll32.exe 30 PID 2740 wrote to memory of 2172 2740 rundll32.exe 30 PID 2740 wrote to memory of 2172 2740 rundll32.exe 30 PID 2740 wrote to memory of 2172 2740 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\EncoderServer.cfg1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\EncoderServer.cfg2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\EncoderServer.cfg"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD503b9bf6990e600bfbabbc657bad5db1e
SHA130f786b46e26e513aa300f0034707dbee8616d84
SHA256d38d37f94d2a70215e3dc343bc7782b36a545d6a5c2a3378c0467104d1539db1
SHA51251b8e28a5bbfc21753fe36ee0911cfeba272fdfc5c5eb61ab797f18eecd1c5cddb60a59ce271aa86640a8131dfc9b4e90f3ffe9ad3ebbe261e36cd148f5c9e36