Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
Drawing.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Drawing.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kwwsdijia.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
kwwsdijia.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Spare part list.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Spare part list.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
rkkzui.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
rkkzui.exe
Resource
win10v2004-20241007-en
General
-
Target
rkkzui.exe
-
Size
4KB
-
MD5
5504a85ec9912968d5730c57ee61c10b
-
SHA1
93a21109de21536b28dc51183c26c65d174fbb4a
-
SHA256
9ac40b495a05fd8d5b2f4dd668d8e0aa5932dd7171aa070e1ad6cb0a96cd6ee4
-
SHA512
e9dffb4a48237d4621f8d379f491dbee1879d4f6bd834d892d4cc22f30a92b2103e5bb231b0293f8b5f8848f2a050a2f295cfc8ad5c9392418519a00a1576e14
-
SSDEEP
48:vpg+4SV3NH8XTznyy+deKI6ve6vDliv/zdS/j4rt3Zfmq8MT+/VYmRSSnM:BlV3Y6HdeK2/zdNrlZ+vMkVRSSM
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2380 2552 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkkzui.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2380 2552 rkkzui.exe 30 PID 2552 wrote to memory of 2380 2552 rkkzui.exe 30 PID 2552 wrote to memory of 2380 2552 rkkzui.exe 30 PID 2552 wrote to memory of 2380 2552 rkkzui.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\rkkzui.exe"C:\Users\Admin\AppData\Local\Temp\rkkzui.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 1602⤵
- Program crash
PID:2380
-