Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/Users/cijythomas/AppData/Local/Temp/VGnVC/RxvUgid.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/Users/cijythomas/AppData/Local/Temp/VGnVC/RxvUgid.exe
Resource
win10v2004-20250314-en
General
-
Target
Device/HarddiskVolume3/Users/cijythomas/AppData/Local/Temp/VGnVC/RxvUgid.exe
-
Size
331KB
-
MD5
4070c1b2f119349afed9083deb6227cb
-
SHA1
df2fa904a5c7ac697acbc26f4b14825593c4e38c
-
SHA256
a61f108406734cdba760fd0f7e366fde2c5746bdbedd69ac16aa4553f3e09938
-
SHA512
f9de3fe0f0df7f5e601f0245a5f37c0f312755e0256423df97f1b89daeca032bdad35c6fbd430e2c4be56a0ec29202bd2a7e4171fbf7abf6b29308258c10325d
-
SSDEEP
6144:hhrZyfh3Ja/H2YTxpJrY/Lhr3iaYhmQL7Zwb7:frZyfRJa/H26xpJc/ZSaYht/Zw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/880-1-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral2/memory/880-3-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral2/memory/880-5-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral2/memory/4884-6-0x00000000012D0000-0x00000000012F9000-memory.dmp cryptone behavioral2/memory/880-9-0x0000000000400000-0x0000000000429000-memory.dmp cryptone behavioral2/memory/2936-13-0x00000000003F0000-0x0000000000419000-memory.dmp cryptone behavioral2/memory/4884-14-0x00000000012D0000-0x00000000012F9000-memory.dmp cryptone behavioral2/memory/2936-15-0x00000000003F0000-0x0000000000419000-memory.dmp cryptone behavioral2/memory/4884-21-0x00000000012D0000-0x00000000012F9000-memory.dmp cryptone behavioral2/memory/2936-17-0x00000000003F0000-0x0000000000419000-memory.dmp cryptone behavioral2/memory/2936-16-0x00000000003F0000-0x0000000000419000-memory.dmp cryptone behavioral2/memory/880-23-0x0000000000400000-0x0000000000429000-memory.dmp cryptone -
Deletes itself 1 IoCs
pid Process 2936 mspaint.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Erepet = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Erepet.exe" mspaint.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\F: mspaint.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\D: mspaint.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\E: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1840 set thread context of 880 1840 RxvUgid.exe 98 PID 880 set thread context of 1248 880 RxvUgid.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RxvUgid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RxvUgid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1840 RxvUgid.exe 1840 RxvUgid.exe 1840 RxvUgid.exe 1840 RxvUgid.exe 4884 svchost.exe 4884 svchost.exe 1248 RxvUgid.exe 1248 RxvUgid.exe 1248 RxvUgid.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1248 RxvUgid.exe Token: SeDebugPrivilege 4884 svchost.exe Token: SeDebugPrivilege 3920 calc.exe Token: SeDebugPrivilege 2936 mspaint.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 1840 wrote to memory of 880 1840 RxvUgid.exe 98 PID 880 wrote to memory of 4884 880 RxvUgid.exe 99 PID 880 wrote to memory of 4884 880 RxvUgid.exe 99 PID 880 wrote to memory of 4884 880 RxvUgid.exe 99 PID 880 wrote to memory of 4884 880 RxvUgid.exe 99 PID 880 wrote to memory of 3920 880 RxvUgid.exe 100 PID 880 wrote to memory of 3920 880 RxvUgid.exe 100 PID 880 wrote to memory of 3920 880 RxvUgid.exe 100 PID 880 wrote to memory of 3920 880 RxvUgid.exe 100 PID 880 wrote to memory of 3920 880 RxvUgid.exe 100 PID 4884 wrote to memory of 2936 4884 svchost.exe 101 PID 4884 wrote to memory of 2936 4884 svchost.exe 101 PID 4884 wrote to memory of 2936 4884 svchost.exe 101 PID 4884 wrote to memory of 2936 4884 svchost.exe 101 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 880 wrote to memory of 1248 880 RxvUgid.exe 102 PID 1248 wrote to memory of 4884 1248 RxvUgid.exe 99 PID 1248 wrote to memory of 4884 1248 RxvUgid.exe 99 PID 1248 wrote to memory of 3920 1248 RxvUgid.exe 100 PID 1248 wrote to memory of 3920 1248 RxvUgid.exe 100 PID 1248 wrote to memory of 2936 1248 RxvUgid.exe 101 PID 1248 wrote to memory of 2936 1248 RxvUgid.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\cijythomas\AppData\Local\Temp\VGnVC\RxvUgid.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\cijythomas\AppData\Local\Temp\VGnVC\RxvUgid.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\cijythomas\AppData\Local\Temp\VGnVC\RxvUgid.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\cijythomas\AppData\Local\Temp\VGnVC\RxvUgid.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\SysWOW64\mspaint.exe"4⤵
- Deletes itself
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\cijythomas\AppData\Local\Temp\VGnVC\RxvUgid.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\cijythomas\AppData\Local\Temp\VGnVC\RxvUgid.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248
-
-