Overview
overview
10Static
static
3RC7.zip
windows7-x64
1RC7.zip
windows10-2004-x64
1RC7 (5) (1...s.json
windows7-x64
3RC7 (5) (1...s.json
windows10-2004-x64
3RC7 (5) (1)/First.exe
windows7-x64
1RC7 (5) (1)/First.exe
windows10-2004-x64
1RC7 (5) (1)/First.exe
windows7-x64
1RC7 (5) (1)/First.exe
windows10-2004-x64
10RC7 (5) (1)/First.pdb
windows7-x64
3RC7 (5) (1)/First.pdb
windows10-2004-x64
3RC7 (5) (1...g.json
windows7-x64
3RC7 (5) (1...g.json
windows10-2004-x64
3RC7 (5) (1...ME.txt
windows7-x64
1RC7 (5) (1...ME.txt
windows10-2004-x64
1RC7 (5) (1...ET.dll
windows7-x64
1RC7 (5) (1...ET.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-08-2024 23:51
Static task
static1
Behavioral task
behavioral1
Sample
RC7.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
RC7.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RC7 (5) (1)/First.deps.json
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
RC7 (5) (1)/First.deps.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RC7 (5) (1)/First.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
RC7 (5) (1)/First.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RC7 (5) (1)/First.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
RC7 (5) (1)/First.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RC7 (5) (1)/First.pdb
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
RC7 (5) (1)/First.pdb
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
RC7 (5) (1)/First.runtimeconfig.json
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
RC7 (5) (1)/First.runtimeconfig.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
RC7 (5) (1)/READ ME.txt
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
RC7 (5) (1)/READ ME.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
RC7 (5) (1)/ScintillaNET.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
RC7 (5) (1)/ScintillaNET.dll
Resource
win10v2004-20240802-en
General
-
Target
RC7 (5) (1)/First.pdb
-
Size
10KB
-
MD5
9b443e924bef08f021422fdc1a6edde7
-
SHA1
216e925a96f92827efac247904ba97343be57c1c
-
SHA256
5212b77b76e6b7e56551074c424a56d0c03d4e0fc8502dd836fa5c2627b1d4a6
-
SHA512
88162989db275d77bff04a9a0262d534272be23db430fdaa86321ff25780ed61c6aa256b69d6ceda958ca371f631fb8b9563df4ae144ad8d1c983b95e90941d6
-
SSDEEP
192:4MocM3yCgLm/cXpCZbd+auMDDtSbrUvT+TUgVhkXIh2/8tLcwkQH4raayHVfIUXJ:4MxErgCZbd+auMDDtSHaT+1VhkXIhvt9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pdb_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pdb_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pdb_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pdb rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pdb\ = "pdb_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pdb_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pdb_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pdb_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1588 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1588 AcroRd32.exe 1588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2900 2240 cmd.exe 29 PID 2240 wrote to memory of 2900 2240 cmd.exe 29 PID 2240 wrote to memory of 2900 2240 cmd.exe 29 PID 2900 wrote to memory of 1588 2900 rundll32.exe 30 PID 2900 wrote to memory of 1588 2900 rundll32.exe 30 PID 2900 wrote to memory of 1588 2900 rundll32.exe 30 PID 2900 wrote to memory of 1588 2900 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.pdb"1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.pdb2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.pdb"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD517166a816381be827b3aaa79b5fb38fe
SHA10119cf68db6abf45c64c30493106332237768ecc
SHA25659a653651c4eb7aae0d4e44d9a8724564cef2b2752478b84e68c6847aa46dd95
SHA512104b42a237eb0d687d2563944cf2f2594941d0e502d3afce27a32413112347b659d5d5d8089d4a9c382f3a0d68f0e4a2c34574191d71702a4ba3b99211a1daaa