Analysis
-
max time kernel
151s -
max time network
22s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13-07-2020 07:00
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 096300.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ 096300.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
RFQ 096300.exe
-
Size
368KB
-
MD5
802c413ef3a40b505e5b8e2e0fc7bada
-
SHA1
02f663db266a9151430cc3433b1497b170971769
-
SHA256
7f4d53805b50624cb5e92857423661c3aef89e24c4ca63e79fdf62cbe2cb694c
-
SHA512
d9e76abb4840e9d9f253c9ec710fafd69fad38c66097e9143269279ba48a668165402a46854f2052e520535299a6f410b34f0e23a4ca0ec9e398c4ff5a85a453
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
RFQ 096300.exeRFQ 096300.exeexplorer.exepid process 376 RFQ 096300.exe 376 RFQ 096300.exe 1844 RFQ 096300.exe 1844 RFQ 096300.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RFQ 096300.exeRFQ 096300.exeexplorer.exedescription pid process target process PID 376 set thread context of 1844 376 RFQ 096300.exe RFQ 096300.exe PID 1844 set thread context of 1304 1844 RFQ 096300.exe Explorer.EXE PID 1776 set thread context of 1304 1776 explorer.exe Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RFQ 096300.exeexplorer.exepid process 1844 RFQ 096300.exe 1844 RFQ 096300.exe 1844 RFQ 096300.exe 1776 explorer.exe 1776 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 324 cmd.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
RFQ 096300.exeExplorer.EXEexplorer.exedescription pid process target process PID 376 wrote to memory of 1832 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1832 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1832 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1832 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1844 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1844 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1844 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1844 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1844 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1844 376 RFQ 096300.exe RFQ 096300.exe PID 376 wrote to memory of 1844 376 RFQ 096300.exe RFQ 096300.exe PID 1304 wrote to memory of 1776 1304 Explorer.EXE explorer.exe PID 1304 wrote to memory of 1776 1304 Explorer.EXE explorer.exe PID 1304 wrote to memory of 1776 1304 Explorer.EXE explorer.exe PID 1304 wrote to memory of 1776 1304 Explorer.EXE explorer.exe PID 1776 wrote to memory of 324 1776 explorer.exe cmd.exe PID 1776 wrote to memory of 324 1776 explorer.exe cmd.exe PID 1776 wrote to memory of 324 1776 explorer.exe cmd.exe PID 1776 wrote to memory of 324 1776 explorer.exe cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ 096300.exeRFQ 096300.exeexplorer.exedescription pid process Token: SeDebugPrivilege 376 RFQ 096300.exe Token: SeDebugPrivilege 1844 RFQ 096300.exe Token: SeDebugPrivilege 1776 explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"{path}"3⤵
-
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"{path}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/324-4-0x0000000000000000-mapping.dmp
-
memory/1776-2-0x0000000000000000-mapping.dmp
-
memory/1776-3-0x0000000000E50000-0x00000000010D1000-memory.dmpFilesize
2.5MB
-
memory/1776-5-0x00000000033C0000-0x00000000034DF000-memory.dmpFilesize
1.1MB
-
memory/1844-0-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1844-1-0x000000000041E2A0-mapping.dmp