Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe
Resource
win10v2004-20241007-en
General
-
Target
993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe
-
Size
195KB
-
MD5
1c447663e8073593b337440a1940d9da
-
SHA1
15195b6f82de7b0bad6885170bb7af1bc062115c
-
SHA256
993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244
-
SHA512
8a94bcb79bbb4b1a8144b8feb367f3a8cbc3d1b96e6fbbeb73bd23c50a122ebfc078ffd315985f14407269b8b986b6252131e2a917b454462a3ffb305ea7b7da
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOh:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3048 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2876 rwmhost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\rwmhost.exe 993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe File opened for modification C:\Windows\Debug\rwmhost.exe 993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwmhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rwmhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rwmhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2776 993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3048 2776 993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe 31 PID 2776 wrote to memory of 3048 2776 993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe 31 PID 2776 wrote to memory of 3048 2776 993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe 31 PID 2776 wrote to memory of 3048 2776 993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe"C:\Users\Admin\AppData\Local\Temp\993920a446828bc0e120049d834bf773b4f681d8bb202f36c0c313c2fec2a244.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\993920~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\Debug\rwmhost.exeC:\Windows\Debug\rwmhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD584eed70ef45a7f571d3ad571f83717eb
SHA19231c03a7f678ecf9d872df2a6e5ac96af65fa25
SHA256b4b78383213260456cf3ba3e0aae9a47cb22ead186e024c68964271a3c7df79b
SHA512701492fa44237806d0a67938d85fdd68502af9c1fc41a2b8b5f1b67670eae99758280387ea3e4d52a43b282a002a5c70fab1315becfc2a5d776ea4a8e3d5841a