Analysis
-
max time kernel
141s -
max time network
21s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
08-07-2020 07:14
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10
General
-
Target
RFQ.exe
-
Size
400KB
-
MD5
90003ac64105d46135fa50dd89d2de04
-
SHA1
49a7177b4dca23eb1e42b1a009d3bc762a0c90db
-
SHA256
b9fbd47b1c2b112277e35d94b125107262e9fba1dfe33bcd3842795432bc78d5
-
SHA512
4e55b099b6376fbe3dd51f3a55b5c2587076b97f7ee802965923aab6164b0d3758b6d88155bf4ca80af91748daa89e377e1a267a73711db19fc475d06102e08d
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 464 1520 RFQ.exe 29 -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools RFQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RFQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RFQ.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions RFQ.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1784 1520 RFQ.exe 27 PID 1520 wrote to memory of 1784 1520 RFQ.exe 27 PID 1520 wrote to memory of 1784 1520 RFQ.exe 27 PID 1520 wrote to memory of 1784 1520 RFQ.exe 27 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 PID 1520 wrote to memory of 464 1520 RFQ.exe 29 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 464 RFQ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 464 RFQ.exe 464 RFQ.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RFQ.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 RFQ.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.exe"1⤵
- Suspicious use of SetThreadContext
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Looks for VirtualBox Guest Additions in registry
- Suspicious use of WriteProcessMemory
- Maps connected drives based on registry
PID:1520 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HEJtLPiuhcJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC81E.tmp"2⤵
- Creates scheduled task(s)
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:464
-