Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_EDM202011.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ_EDM202011.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
RFQ_EDM202011.exe
-
Size
524KB
-
MD5
b20f108e61c409deeb691fbab3120a42
-
SHA1
0d486d407d650aea66d87d61af363da24c2c5dfe
-
SHA256
0a0ac8e138fdddc9e18357375ff41da88e340ac4dfc225d2d60976607dac8d8c
-
SHA512
1279f57366a776db447720f34756268da67b4b764c90b1cbc22769bde14fd0f99c49d1eb53d74c3e289b3f7996502295cef657ca2c82c96f3f90bbdc34ffd1cd
Score
7/10
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\K5jr\help_nux.exe mstsc.exe -
description ioc Process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1800 1232 RFQ_EDM202011.exe 26 PID 1232 wrote to memory of 1800 1232 RFQ_EDM202011.exe 26 PID 1232 wrote to memory of 1800 1232 RFQ_EDM202011.exe 26 PID 1232 wrote to memory of 1800 1232 RFQ_EDM202011.exe 26 PID 1232 wrote to memory of 1796 1232 RFQ_EDM202011.exe 28 PID 1232 wrote to memory of 1796 1232 RFQ_EDM202011.exe 28 PID 1232 wrote to memory of 1796 1232 RFQ_EDM202011.exe 28 PID 1232 wrote to memory of 1796 1232 RFQ_EDM202011.exe 28 PID 1232 wrote to memory of 1796 1232 RFQ_EDM202011.exe 28 PID 1232 wrote to memory of 1796 1232 RFQ_EDM202011.exe 28 PID 1232 wrote to memory of 1796 1232 RFQ_EDM202011.exe 28 PID 1348 wrote to memory of 1804 1348 Explorer.EXE 29 PID 1348 wrote to memory of 1804 1348 Explorer.EXE 29 PID 1348 wrote to memory of 1804 1348 Explorer.EXE 29 PID 1348 wrote to memory of 1804 1348 Explorer.EXE 29 PID 1804 wrote to memory of 320 1804 mstsc.exe 30 PID 1804 wrote to memory of 320 1804 mstsc.exe 30 PID 1804 wrote to memory of 320 1804 mstsc.exe 30 PID 1804 wrote to memory of 320 1804 mstsc.exe 30 PID 1804 wrote to memory of 1860 1804 mstsc.exe 33 PID 1804 wrote to memory of 1860 1804 mstsc.exe 33 PID 1804 wrote to memory of 1860 1804 mstsc.exe 33 PID 1804 wrote to memory of 1860 1804 mstsc.exe 33 PID 1804 wrote to memory of 1860 1804 mstsc.exe 33 -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1232 set thread context of 1796 1232 RFQ_EDM202011.exe 28 PID 1796 set thread context of 1348 1796 RFQ_EDM202011.exe 20 PID 1804 set thread context of 1348 1804 mstsc.exe 20 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1796 RFQ_EDM202011.exe 1796 RFQ_EDM202011.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1796 RFQ_EDM202011.exe Token: SeDebugPrivilege 1804 mstsc.exe -
Deletes itself 1 IoCs
pid Process 320 cmd.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1796 RFQ_EDM202011.exe 1796 RFQ_EDM202011.exe 1796 RFQ_EDM202011.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe 1804 mstsc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1348 Explorer.EXE 1348 Explorer.EXE 1348 Explorer.EXE 1348 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1348 Explorer.EXE 1348 Explorer.EXE 1348 Explorer.EXE 1348 Explorer.EXE -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run mstsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\6L3DUFWH = "C:\\Program Files (x86)\\K5jr\\help_nux.exe" mstsc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1800 schtasks.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\RFQ_EDM202011.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_EDM202011.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1232 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KxoKwFW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp41D0.tmp"3⤵
- Creates scheduled task(s)
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ_EDM202011.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:1796
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Adds Run entry to start application
PID:1804 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ_EDM202011.exe"3⤵
- Deletes itself
PID:320
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1860
-
-