Resubmissions
27-11-2024 09:42
241127-lpfldsyjew 701-04-2023 15:23
230401-sskg3scc21 701-04-2023 15:20
230401-sqs2facb9y 7Analysis
-
max time kernel
241s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
RE4T Folder/RE4T.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RE4T Folder/RE4T.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RE4T Folder/bin/msgbox.vbs
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
RE4T Folder/bin/msgbox.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
RE4T Folder/bin/reatcommands.bat
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
RE4T Folder/bin/reatcommands.bat
Resource
win10v2004-20241007-en
General
-
Target
RE4T Folder/RE4T.lnk
-
Size
2KB
-
MD5
64f856fa76e59967a3bb8eeb93053bc6
-
SHA1
fbba2b429bdf129e0a6c3773f0eb03edde31572e
-
SHA256
004f367e84b905a1b10b1efe99bc06416037e008df1b5fc522e8fbdfc4be436f
-
SHA512
a51f867c3d24cac189e88212a0eb1bf502d28d0fe0ad1bc15561cbfdde9e88b423ea4608a328667aeb7d6d75051369e3329fd90c549640cfc837a46361ab74c4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 4416 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4416 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3084 wrote to memory of 1144 3084 cmd.exe 83 PID 3084 wrote to memory of 1144 3084 cmd.exe 83 PID 1144 wrote to memory of 4416 1144 cmd.exe 85 PID 1144 wrote to memory of 4416 1144 cmd.exe 85 PID 1144 wrote to memory of 516 1144 cmd.exe 87 PID 1144 wrote to memory of 516 1144 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RE4T Folder\RE4T.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RE4T Folder\bin\reatcommands.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\taskkill.exetaskkill /f /IM explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\system32\cscript.exeCSCRIPT //nologo "C:\Users\Admin\AppData\Local\Temp\~tmpSendKeysTemp.vbs"3⤵PID:516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD50b8c469ceec9ea2bc321274a72a04c89
SHA18cb7e2500a9a4d1c48d4337adcaee7eeb978058a
SHA256e27fd479fa6fdc623b3180a5abaa300b8f9eca639bba48dba7c332c49c6f5adb
SHA5129c23d34b1f7a0577735f529efeeef090218d6b0228802e0d97f629586ae62059b0e955efa95c19244cdab7cae2a5f09f863cc28c6eaff80c9dcc292b1e0ef3b0