Analysis
-
max time kernel
119s -
max time network
109s -
platform
windows10_x64 -
resource
win10 -
submitted
08-07-2020 07:14
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10
General
-
Target
RFQ.exe
-
Size
400KB
-
MD5
90003ac64105d46135fa50dd89d2de04
-
SHA1
49a7177b4dca23eb1e42b1a009d3bc762a0c90db
-
SHA256
b9fbd47b1c2b112277e35d94b125107262e9fba1dfe33bcd3842795432bc78d5
-
SHA512
4e55b099b6376fbe3dd51f3a55b5c2587076b97f7ee802965923aab6164b0d3758b6d88155bf4ca80af91748daa89e377e1a267a73711db19fc475d06102e08d
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
@jaffinmarknma@344
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3176 RFQ.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RFQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RFQ.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools RFQ.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1768 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3932 wrote to memory of 1768 3932 RFQ.exe 74 PID 3932 wrote to memory of 1768 3932 RFQ.exe 74 PID 3932 wrote to memory of 1768 3932 RFQ.exe 74 PID 3932 wrote to memory of 3176 3932 RFQ.exe 76 PID 3932 wrote to memory of 3176 3932 RFQ.exe 76 PID 3932 wrote to memory of 3176 3932 RFQ.exe 76 PID 3932 wrote to memory of 3176 3932 RFQ.exe 76 PID 3932 wrote to memory of 3176 3932 RFQ.exe 76 PID 3932 wrote to memory of 3176 3932 RFQ.exe 76 PID 3932 wrote to memory of 3176 3932 RFQ.exe 76 PID 3932 wrote to memory of 3176 3932 RFQ.exe 76 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3932 set thread context of 3176 3932 RFQ.exe 76 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3176 RFQ.exe 3176 RFQ.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions RFQ.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RFQ.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 RFQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.exe"1⤵
- Checks BIOS information in registry
- Looks for VMWare Tools registry key
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Looks for VirtualBox Guest Additions in registry
- Maps connected drives based on registry
PID:3932 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HEJtLPiuhcJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF9CC.tmp"2⤵
- Creates scheduled task(s)
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3176
-