Overview
overview
10Static
static
3RC7.zip
windows7-x64
1RC7.zip
windows10-2004-x64
1RC7 (5) (1...s.json
windows7-x64
3RC7 (5) (1...s.json
windows10-2004-x64
3RC7 (5) (1)/First.exe
windows7-x64
1RC7 (5) (1)/First.exe
windows10-2004-x64
1RC7 (5) (1)/First.exe
windows7-x64
1RC7 (5) (1)/First.exe
windows10-2004-x64
10RC7 (5) (1)/First.pdb
windows7-x64
3RC7 (5) (1)/First.pdb
windows10-2004-x64
3RC7 (5) (1...g.json
windows7-x64
3RC7 (5) (1...g.json
windows10-2004-x64
3RC7 (5) (1...ME.txt
windows7-x64
1RC7 (5) (1...ME.txt
windows10-2004-x64
1RC7 (5) (1...ET.dll
windows7-x64
1RC7 (5) (1...ET.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-08-2024 23:51
Static task
static1
Behavioral task
behavioral1
Sample
RC7.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
RC7.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RC7 (5) (1)/First.deps.json
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
RC7 (5) (1)/First.deps.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RC7 (5) (1)/First.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
RC7 (5) (1)/First.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RC7 (5) (1)/First.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
RC7 (5) (1)/First.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RC7 (5) (1)/First.pdb
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
RC7 (5) (1)/First.pdb
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
RC7 (5) (1)/First.runtimeconfig.json
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
RC7 (5) (1)/First.runtimeconfig.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
RC7 (5) (1)/READ ME.txt
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
RC7 (5) (1)/READ ME.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
RC7 (5) (1)/ScintillaNET.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
RC7 (5) (1)/ScintillaNET.dll
Resource
win10v2004-20240802-en
General
-
Target
RC7 (5) (1)/First.deps.json
-
Size
407B
-
MD5
1c6af07f5e054bc005f172fa8487c5ed
-
SHA1
4880dd8a6e9b72809b1bbd36bf679690ac9c7931
-
SHA256
13b10c533eafa0a1111ee62f978d4407bad2e5efe86c1d11cb1ef07d67796fd8
-
SHA512
24e4099df987b8a9170220d2d58e4bafc72927ddf07b7dd0b400f8b8f416501d112cdb8fd6d7968025d02090e5bf6f8e9ffa4e4cc785fbc5175fbd160d0c46ac
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.json rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2768 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2768 AcroRd32.exe 2768 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2776 2084 cmd.exe 31 PID 2084 wrote to memory of 2776 2084 cmd.exe 31 PID 2084 wrote to memory of 2776 2084 cmd.exe 31 PID 2776 wrote to memory of 2768 2776 rundll32.exe 32 PID 2776 wrote to memory of 2768 2776 rundll32.exe 32 PID 2776 wrote to memory of 2768 2776 rundll32.exe 32 PID 2776 wrote to memory of 2768 2776 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.deps.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.deps.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.deps.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5053e7f65dc4c9a49a53cb25e8d1d7d29
SHA152d26080e38b808791a9178b5a0a3b3c75890c76
SHA2562ae7600e3d5de3bc098af0f426e580a0bec6af0ce486c1600b4046b43200b2ce
SHA512236cad148c352eb0b3a43be77063c37edfaf9febc511790ba1aae368a896f2463463abd6abdda745ca972c4889e713ec4dd9f48118492540bce30f71308ef792