Overview
overview
8Static
static
3RDPWrap-v1.6.2.zip
windows7-x64
RDPWrap-v1.6.2.zip
windows10-2004-x64
1RDPCheck.exe
windows7-x64
8RDPCheck.exe
windows10-2004-x64
8RDPConf.exe
windows7-x64
8RDPConf.exe
windows10-2004-x64
8RDPWInst.exe
windows7-x64
3RDPWInst.exe
windows10-2004-x64
3install.bat
windows7-x64
8install.bat
windows10-2004-x64
8uninstall.bat
windows7-x64
3uninstall.bat
windows10-2004-x64
3update.bat
windows7-x64
3update.bat
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
RDPWrap-v1.6.2.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RDPWrap-v1.6.2.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RDPCheck.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
RDPCheck.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RDPConf.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RDPConf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RDPWInst.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
RDPWInst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
install.bat
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
uninstall.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
uninstall.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
update.bat
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
update.bat
Resource
win10v2004-20240802-en
General
-
Target
uninstall.bat
-
Size
249B
-
MD5
eccb8a01d0427ef29c2380d7dda399f3
-
SHA1
302601e99d6b02e2e84a0de5c0dce3df139cba31
-
SHA256
083cd340c800cc021d4a59388680ce0e7ab0f8b998e67def6a507070e7fa01b7
-
SHA512
78d51882fe04cb64f9f6a82b604ef20e4324e5bc37701747fa55b3c153baa5942774daf737ff204f9e75e81a745ed95cc7ec115da91b9e27e646ed41d3f103f9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 4444 744 cmd.exe 83 PID 744 wrote to memory of 4444 744 cmd.exe 83 PID 744 wrote to memory of 4444 744 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\uninstall.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\RDPWInst.exe"C:\Users\Admin\AppData\Local\Temp\RDPWInst" -u2⤵
- System Location Discovery: System Language Discovery
PID:4444
-