Overview
overview
10Static
static
10Rekt/Rekt/...LS.rtf
windows7-x64
4Rekt/Rekt/...LS.rtf
windows10-2004-x64
1Rekt/Rekt/...ol.exe
windows7-x64
3Rekt/Rekt/...ol.exe
windows10-2004-x64
3Rekt/Rekt/...33.exe
windows7-x64
10Rekt/Rekt/...33.exe
windows10-2004-x64
10Rekt/Rekt/JRPC.dll
windows7-x64
3Rekt/Rekt/JRPC.dll
windows10-2004-x64
3Rekt/Rekt/...rk.dll
windows7-x64
1Rekt/Rekt/...rk.dll
windows10-2004-x64
1Rekt/Rekt/Nipples.dll
windows7-x64
3Rekt/Rekt/Nipples.dll
windows10-2004-x64
3Rekt/Rekt/...ss.exe
windows7-x64
10Rekt/Rekt/...ss.exe
windows10-2004-x64
10Rekt/Rekt/xdevkit.dll
windows7-x64
1Rekt/Rekt/xdevkit.dll
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 23:55
Behavioral task
behavioral1
Sample
Rekt/Rekt/#REKTEDTOOLS.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rekt/Rekt/#REKTEDTOOLS.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Rekt/Rekt/#RektedToolsMultiGameTool.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Rekt/Rekt/#RektedToolsMultiGameTool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Rekt/Rekt/33333333333.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Rekt/Rekt/33333333333.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Rekt/Rekt/JRPC.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Rekt/Rekt/JRPC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Rekt/Rekt/MetroFramework.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Rekt/Rekt/MetroFramework.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Rekt/Rekt/Nipples.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Rekt/Rekt/Nipples.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Rekt/Rekt/UpdaterBypass.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Rekt/Rekt/UpdaterBypass.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Rekt/Rekt/xdevkit.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Rekt/Rekt/xdevkit.dll
Resource
win10v2004-20240802-en
General
-
Target
Rekt/Rekt/JRPC.dll
-
Size
26KB
-
MD5
3141fa33649b9579a7eec662e917ac3f
-
SHA1
7f2e836d2a3fd9adf5958cbdd22103139598551b
-
SHA256
911366a82f457e2a65e1bebd6eafde9ce561b33555aa54e0844d2adb27f69662
-
SHA512
71f717c66bf5172797dbfc476e89325a875e715c1d2dc428eb6c31bfd610b953ac9b9aaea8019057163750e8a760adeeb5fb67292562e5a39cba4cef5a257ea9
-
SSDEEP
384:ey+EX+XyDf3pnyonEI05dYkCTex+t9jOyDCSbtVpF1JoAMr5w+:ey+er3y5pqCC1EAS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31 PID 2024 wrote to memory of 2612 2024 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Rekt\Rekt\JRPC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Rekt\Rekt\JRPC.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2612
-