Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe
Resource
win10v2004-20240508-en
General
-
Target
a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe
-
Size
289KB
-
MD5
6b174efad313abd4df83a766dcc23985
-
SHA1
e8149b99798ed214d522ad2225ce47e1ea3e81b4
-
SHA256
a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed
-
SHA512
88629ff0558658c9b5b6675ac45eab33180f16b09567fecc7073dd9f86eb4e428cf17418bf9740ee68f447ef8344c283948ed8999f9830911a3b151cdc705198
-
SSDEEP
3072:5A0EIRXX1P2UgAFxY3m5OZjSg9Z4hNeND55N4pLthECQT68VMJLaQljVvzUpz:5AzIdFuUgAFxm7SizNkECzJLaQVbU5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 RKFQT.exe -
Loads dropped DLL 2 IoCs
pid Process 2260 cmd.exe 2260 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\RKFQT.exe a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe File created C:\windows\SysWOW64\RKFQT.exe.bat a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe File created C:\windows\SysWOW64\RKFQT.exe a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 2720 RKFQT.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2368 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 2368 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 2720 RKFQT.exe 2720 RKFQT.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2260 2368 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 28 PID 2368 wrote to memory of 2260 2368 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 28 PID 2368 wrote to memory of 2260 2368 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 28 PID 2368 wrote to memory of 2260 2368 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 28 PID 2260 wrote to memory of 2720 2260 cmd.exe 30 PID 2260 wrote to memory of 2720 2260 cmd.exe 30 PID 2260 wrote to memory of 2720 2260 cmd.exe 30 PID 2260 wrote to memory of 2720 2260 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe"C:\Users\Admin\AppData\Local\Temp\a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\RKFQT.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\windows\SysWOW64\RKFQT.exeC:\windows\system32\RKFQT.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD5d3117b64452ccc19217319b22ea0ee5f
SHA1b473c4cec9c28c1f2b69f12107667884044c96e0
SHA256e3723fad55ef2f39f39033bf241895b750311f1842214a6468414fd7cdd97006
SHA512199af55b9b01dc8aed01d6a5d6bb12cf7f57b623acb2ccf2db163323a5b0d49472716713f08b784674e75d284bcf044d8475afb7e0cf7523e6369626c3315afa
-
Filesize
289KB
MD54d3a26e83615de3871788b4ea23538df
SHA122d6384d918bc335fa9ac94875cb57d226e003dd
SHA2565e93a1b6b64267e6563921d4d017fc67a27f4ca78e8f85e9084b87c5f44b4725
SHA512de6447d9f6cdfca39f19e376304c8de044385693986962f03e50929eb75b4d00a24ebca6dc58af8b46a44be836cdb509540c4d12ed8f3bb7017bcc853bb7dd07