Analysis
-
max time kernel
78s -
max time network
82s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
RDPCheck.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
RDPConf.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
RDPWInst.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
install.bat
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
uninstall.bat
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
update.bat
Resource
win10-20240404-en
General
-
Target
uninstall.bat
-
Size
249B
-
MD5
eccb8a01d0427ef29c2380d7dda399f3
-
SHA1
302601e99d6b02e2e84a0de5c0dce3df139cba31
-
SHA256
083cd340c800cc021d4a59388680ce0e7ab0f8b998e67def6a507070e7fa01b7
-
SHA512
78d51882fe04cb64f9f6a82b604ef20e4324e5bc37701747fa55b3c153baa5942774daf737ff204f9e75e81a745ed95cc7ec115da91b9e27e646ed41d3f103f9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2908 wrote to memory of 1592 2908 cmd.exe 74 PID 2908 wrote to memory of 1592 2908 cmd.exe 74 PID 2908 wrote to memory of 1592 2908 cmd.exe 74
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\uninstall.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\RDPWInst.exe"C:\Users\Admin\AppData\Local\Temp\RDPWInst" -u2⤵
- System Location Discovery: System Language Discovery
PID:1592
-