Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe
Resource
win10v2004-20240802-en
General
-
Target
cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe
-
Size
66KB
-
MD5
3c63277089fd6c6a3a98de9b524aeae1
-
SHA1
c1401ed37a281b76e6b568db99b021bef1b215e3
-
SHA256
cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21
-
SHA512
3073d7ad52c758d493ceba9d81731e9ad762b8512c1ae69aea83be65765313692d6931cd2ef336ec41fa79493e5c2cc4ff144b660d51f07106c4b72bda64ea49
-
SSDEEP
1536:2LFbQafrACEVLUQ/HItWt68/gQGSdsPoooozEEEEEk:Af8CE/HIM68/gtSsLX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1164 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 796 rwmhost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\rwmhost.exe cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe File opened for modification C:\Windows\Debug\rwmhost.exe cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwmhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rwmhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rwmhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2524 cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1164 2524 cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe 32 PID 2524 wrote to memory of 1164 2524 cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe 32 PID 2524 wrote to memory of 1164 2524 cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe 32 PID 2524 wrote to memory of 1164 2524 cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe"C:\Users\Admin\AppData\Local\Temp\cc281f4d7259ee2ef590d1ca21e386f44ff52021b307dff6ec20ad9b6e623d21.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\CC281F~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1164
-
-
C:\Windows\Debug\rwmhost.exeC:\Windows\Debug\rwmhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD57c47ba5fd38f504e6dad5c3d5c3e23cb
SHA105c47a5d3b489a6c9c630b46adcaa224adf888c1
SHA25658083c73e147acae6b23dc6beea90170cd55d60a572799c6a9fd4e3818eee930
SHA51279a73d2a5647bde9f926b95eb30470ca2d38af548f18c34aef3e5dab3f30db7dcf3f92913e30a9d2a17f6f5de7ef0072293565e1d73f48cf69efb897fa1a0f24