Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 00:52
Behavioral task
behavioral1
Sample
a08910062698fb646d33247577a990f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a08910062698fb646d33247577a990f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a08910062698fb646d33247577a990f0N.exe
-
Size
212KB
-
MD5
a08910062698fb646d33247577a990f0
-
SHA1
e25ffc355b69eae3702047693d383a82a3f782e3
-
SHA256
d80da3a9bd6f2fa02bd4e2dcc4bd99510b7f241af45237767fd0af72da17d0dc
-
SHA512
a3b2a0fcdd29c608e3370c78a2ab8feb7cac8dd641e302cd015835d6d781c327f97eb9db19276b7e7b74306707cbb233f46317aef9c7ca0731a5eb2af7e7e829
-
SSDEEP
6144:rNaGArfd6E8nPlOR+0syugliKK329wMDHzA52M:IGArYEtRbsVei/3zMDTTM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,riodrv.exe" a08910062698fb646d33247577a990f0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1804 riodrv.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 a08910062698fb646d33247577a990f0N.exe 2112 a08910062698fb646d33247577a990f0N.exe -
resource yara_rule behavioral1/memory/2112-0-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/files/0x000e000000012262-4.dat upx behavioral1/memory/1804-12-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/memory/2112-16-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/memory/1804-14-0x0000000000400000-0x0000000000488000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\riodrv.exe a08910062698fb646d33247577a990f0N.exe File opened for modification C:\Windows\SysWOW64\riodrv.exe a08910062698fb646d33247577a990f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a08910062698fb646d33247577a990f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language riodrv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1804 2112 a08910062698fb646d33247577a990f0N.exe 30 PID 2112 wrote to memory of 1804 2112 a08910062698fb646d33247577a990f0N.exe 30 PID 2112 wrote to memory of 1804 2112 a08910062698fb646d33247577a990f0N.exe 30 PID 2112 wrote to memory of 1804 2112 a08910062698fb646d33247577a990f0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a08910062698fb646d33247577a990f0N.exe"C:\Users\Admin\AppData\Local\Temp\a08910062698fb646d33247577a990f0N.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\riodrv.exeC:\Windows\system32\riodrv.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD50e2e2b07714e279a285f289efa53d90e
SHA13f704178f5fe2ce7bac69415f43983b4432b9f5d
SHA2565b297c7567724e1effcc15abf30cd4afa53722a4c217798ca4cc6100cfd94150
SHA512915b5eec891c371eb10aaa2d668de4bafb92891aad05d5a424713fd979dc2f835eb2fdc87e5a8c1bfb04f94887b2369e86c7a25998686801431c41c354d89702