Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
RMOD002/misc.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RMOD002/misc.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RMOD002/rBot.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RMOD002/rBot.html
Resource
win10v2004-20241007-en
General
-
Target
RMOD002/rBot.html
-
Size
6KB
-
MD5
f20f6d4fa742357a10a42a7dd0a41458
-
SHA1
087e71bcfaf24047eb932741445800eb14f76ed4
-
SHA256
1b190964987b384033beb90a630812a7fb6254bce81cea4b59bdb004e0c615e8
-
SHA512
c055441f028becc8e8db8a7d188e53f44558f57d1ce2237a4342bcde66bf53384cfcc820a21a896c80e828e40578e9191afd129fd790c6d47d96cc49e8e0ca52
-
SSDEEP
96:vOSMbn7qt9/dT5FTevmdW+gQmQRep5/g0:vS7O9J7T4ekcez/n
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F4C8AE1-8892-11EF-A51B-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000984a65a10a3ffdb171b47c63d6b0fda85abc0d4046af0decde52674f3321177b000000000e800000000200002000000067dd2cc496986efc5f981bc9264b46547b4065ecc7c9025c526f86303d29052920000000cbdec94e02f19c366ca8cea0b8d0e2fde51970fe3f7be327763b2ca11e9cd24d40000000289c670bc334547fae00ceff13e3478ccad09b1c260824805ec05d2a4707d9e8b02d63070124a67da14fc5d490187639ab319bc642d40eed35e441fdf0327f05 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434896505" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a6bfe39e1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2696 2636 iexplore.exe 31 PID 2636 wrote to memory of 2696 2636 iexplore.exe 31 PID 2636 wrote to memory of 2696 2636 iexplore.exe 31 PID 2636 wrote to memory of 2696 2636 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RMOD002\rBot.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50968120311db762baa692339f00c1667
SHA159565c666766f1c2b8eea65a2f4c738e69a65d31
SHA256d8d9e9b570a0ad85de052ec3950e80ba73768df1ad4142ee1cc77cd8feac58e1
SHA5128726659827269e55b2f4394e97a779d6de8aec9c4036006b1f8257232171257dcf99f16e0cc539930f82f78fd8fd51751f8513ab992e7fffb07dac0b526ce2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caec1a9d801b638d6ba581dfc8e17664
SHA198f38caacc1c83d13c72f4d6192e4ae9d3c5f799
SHA2566edad0f3ea266090f408da66b75ba90a0e688eb7d477cef8d66e59bd7feffb9a
SHA5127263273e579a4d6ba9ab1ac04982870f887b173475414bd513f1919c8e579d487cac56d10a9359b5a08b74c98210179ffb597852ebf91944d295c555f6a4e32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca3b98be8d2d910ec0dfd97b110766c
SHA1d70bbc0609c9fa6833e2626350164bea828a3962
SHA256d0da0635958401d8cb7c7b1ad886a28915db4fe8314250b785adbcac5308434c
SHA512c40bc43ff787f0d0dc2dea2b83b64097c8775fa171bf0dca93c75b7df22e0c9a5552c741230c6e0f7c3555e9913fc4afc464fc5454a8d5641a7b14a250c281f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e0c22085919b7e0b832a3fb16ba82d
SHA192256b39d087276007420fe2d14ff2d9c63b7ea2
SHA256c867af933f658e37019beada6900803d7a1499de6c26225b44f4f0b2b2033250
SHA5122ff3699a9ec3bc81e75f2d256e3a5121baa587f6cfdd74001f2f6cf409faab0ced600677228529965f6f10beba9491f713a74742f38f26a0e4a98e9b740490ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715357900990bf1b27a784163976d4f6
SHA196d424fbfd774404bef0f1288f5b112f8324cdc9
SHA256514ad553c34efd92a2fd8e4b24469065c9e9fa995b40bc9f3840ece18b95018d
SHA5127b8343a27ba4f44188a6c6020eb2ab5d9eb7d2553c85bac7c0840cdbd25a96da9b5c44575d858e79f8851f24e7e6b97d8f3d55692224cc8552fa2112f916e121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f5de3b70e30f68ce008dc4f8062d52
SHA18f61b9c305ada26140035047d8f7eee43bd00446
SHA25684fd7e0021b227c208f97990bbdd3ec3b8a261c30776721cbf4444a4ff4996ae
SHA5129a103474cd0f01fb7ea5bd21581fb58b278561c0e2102d8163c6f092bd3587c549a152c75ede4ae4f289e84f4cd0508c5df5109aefb985d793c9808b3b964f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a8d4d9a3372ef8f054bf204ace82fe
SHA192d8ae9ef880e8b361c7ab522c41e5fdd41c3065
SHA2560ab2cae998803bbc960beba09c51c4cd1fc12e8e1b43a709cbc4bb50673099f8
SHA51292fd6eed44228792e75b617c727ebd24bb5fd7d41014d03ef5076a6d178b73bb2e4903fa7a4ca95b3c008ffde19f0abcac0070e2ee6361f808c9326b407dc0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e29a6a34f28cb29e6e75b8ebd6d970
SHA18ab8a9945ec36f216048ac84ae941904c5991bea
SHA25677fdb86ef269841f5b8118ed2c39875d95771fa37ef22481cd53d645e7a26f56
SHA512eb080455267a79c8a93351f61a885243d50320f56628dea60d908a35d030c884dbc2379c1f428e2dc82aa2873e6eaaa7eb4b74c47407c0aee215c322d6f36d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f1d38f45703ccc9c5a54bde6fbffdd1
SHA19a4671601d6eb4a65ad4789e10ef036949183dba
SHA25662a0daf52bbe59d655ea2fabaa7df37e200117345822a97b1300f47d1532652f
SHA51295c0f5158404e27958baa8665108139ed27207e66b39c7baa0babaf8e2bd7f172bb9d4d5431f610e70a6a0207965a9a3804442455be641ff8f72b9c102bb5801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a542dd59c377e2886b8c79e3f7e3337d
SHA1443eba2035910e65b3fe95fb36ccbec21e9fbeb0
SHA2561ed4c2f4d86bb151e8e3d557218a0019b34b2affeaefbfd69bf1054ca2b3927d
SHA5120b28ac360cc82b74081e797d978718c32c4b187a33f3aefc2bbdd96905ad28e9d85957ede1ca6c90025a66a32a4af96937978d12898b30eac66d5bb3e2990b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd7419078e2ed53bd2732fa6a4b2928
SHA18ff2d735ca08c035260159b0dc1d3784528c16ca
SHA25629bb8a721f5e263a6721a20f089e78d06ed660c0aa2baede878b95edd989b0e1
SHA512b364c2b796f605bd790c9770d46510150c1e2615b66238e67b6dab007c15f069979275dd0c82b3cca312a430795dff04b4c565c9ca693b79c4e0dfc4d5ea860b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe0d65cc127f840d57fcb7c865c0251
SHA1a6d222489796c3decd6ffad693f345e2d456bc8a
SHA25657b507fa1e4166e3a47b316f61e4a4748a78d8dc6088fc34c57ff74ce0f17231
SHA5121bd05daa7c304844ffe0523cda482da54a96aa22f6879d74fa854240a02dded7d4c1fd495263ad6a71edd7d77fa58e173a38513a59aa402d55f281bd565eba35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855e3f6594e375ecbbb99cb6da4e4ac7
SHA1b20aff3e03112e634395ecdccffafa1bf179f408
SHA2566936aac3c7757df88195de99b49c0b8c43d634c02941640845315807039240b6
SHA512d665821c8215007dbc05c93a3de1558655b65f48b0f396e0fb2dd06d5d9db36d36cd5d2a54efc6c0b1ed04503f83894dcd955a11c23b5d33e8a02fd2bc41668f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50550b4886b91a52cfb9264446fd5bfa6
SHA130f46a54cda3aaf323b046904d2b8480c8ab23f2
SHA256a43753622fe66584d29b55f885d98d5619d3f0dce05f95071dcc6118ab7eb9c7
SHA5124b5322c1deead8215e009fa43999c2c298ff2ab9ccf86742a073fb2d26d84ad3d6d76a04a89d5bc680764d727dedb1cdd3c8d8658f24c7fc0f4faed90f3ff9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516451e2c1d690ba2504fe97ee4d478f
SHA17a0c11b5fe3a07f0ed67aef5b5a530f7a41874be
SHA256b0aac83db4653544594365348571b7476d171f52affbe9e5fb572b0bcb32e09c
SHA512626363553a0a60d437182631d04cf6a508afe8cf3bef78e35bb20e930da7948b939b1eadd01dccc8c0434c1f239536079a1b738e67d1175b80573208896952ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b15b175a3aa49090d892e3ee54e3d5f8
SHA1f8e7e33d59b3b30620b6e8bab0cd4ab35bcdccdd
SHA256d6548738615b161a8b8736f5facb62202d42619456c0fd3c0e2bb1fe26487e98
SHA512ca8b847d7a7af20953d7acaaba1b1f69340f611b0c43487d232b018c508bfb46a150dd94411f6c5be6ca0deff540e0009c2921d536d6e587c7f20c31cb3b8e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbe9e9cad0ced05805ff86d445ad836
SHA170032baa440fdef7f3de3c93990d46e6e1fd1f38
SHA256eea4cebab268dfe9b65ecc43db19a015525fe9b705ae7eb69c9e882a15c00ed2
SHA512210f7b393349feae281f1751b2d22278d58c3191df3e2b5f581cb23c85e73fe8b095f34e522f2f26c244d113d9c7f53826d96fbd8c51c0de91a952fa59cc61b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7cbda912fb67bfd131ed2c9be8b288
SHA1db01244d307d5ca20e64ac8ac2eca220a3287cd5
SHA25633d3eda07ae224bc6b4e8911bda37f7eecee6fa3381ea24e9efa38e8e036a01b
SHA5129859569cc0ff7737700325ff1ddf1bef8616627da15d9e2d8030816e20100f882de8ae682a453c0a6a7caf3bc2dc3b6d8c404c0218d04097d065403f61598746
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b