Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 07:00
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 096300.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ 096300.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
RFQ 096300.exe
-
Size
368KB
-
MD5
802c413ef3a40b505e5b8e2e0fc7bada
-
SHA1
02f663db266a9151430cc3433b1497b170971769
-
SHA256
7f4d53805b50624cb5e92857423661c3aef89e24c4ca63e79fdf62cbe2cb694c
-
SHA512
d9e76abb4840e9d9f253c9ec710fafd69fad38c66097e9143269279ba48a668165402a46854f2052e520535299a6f410b34f0e23a4ca0ec9e398c4ff5a85a453
Score
5/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
RFQ 096300.exeRFQ 096300.exeraserver.exepid process 732 RFQ 096300.exe 1248 RFQ 096300.exe 1248 RFQ 096300.exe 1248 RFQ 096300.exe 1248 RFQ 096300.exe 1248 RFQ 096300.exe 1248 RFQ 096300.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe 3668 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RFQ 096300.exeraserver.exepid process 1248 RFQ 096300.exe 1248 RFQ 096300.exe 1248 RFQ 096300.exe 1248 RFQ 096300.exe 3668 raserver.exe 3668 raserver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
RFQ 096300.exeExplorer.EXEraserver.exedescription pid process target process PID 732 wrote to memory of 1248 732 RFQ 096300.exe RFQ 096300.exe PID 732 wrote to memory of 1248 732 RFQ 096300.exe RFQ 096300.exe PID 732 wrote to memory of 1248 732 RFQ 096300.exe RFQ 096300.exe PID 732 wrote to memory of 1248 732 RFQ 096300.exe RFQ 096300.exe PID 732 wrote to memory of 1248 732 RFQ 096300.exe RFQ 096300.exe PID 732 wrote to memory of 1248 732 RFQ 096300.exe RFQ 096300.exe PID 2984 wrote to memory of 3668 2984 Explorer.EXE raserver.exe PID 2984 wrote to memory of 3668 2984 Explorer.EXE raserver.exe PID 2984 wrote to memory of 3668 2984 Explorer.EXE raserver.exe PID 3668 wrote to memory of 488 3668 raserver.exe cmd.exe PID 3668 wrote to memory of 488 3668 raserver.exe cmd.exe PID 3668 wrote to memory of 488 3668 raserver.exe cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
RFQ 096300.exeRFQ 096300.exeraserver.exedescription pid process target process PID 732 set thread context of 1248 732 RFQ 096300.exe RFQ 096300.exe PID 1248 set thread context of 2984 1248 RFQ 096300.exe Explorer.EXE PID 1248 set thread context of 2984 1248 RFQ 096300.exe Explorer.EXE PID 3668 set thread context of 2984 3668 raserver.exe Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ 096300.exeRFQ 096300.exeraserver.exedescription pid process Token: SeDebugPrivilege 732 RFQ 096300.exe Token: SeDebugPrivilege 1248 RFQ 096300.exe Token: SeDebugPrivilege 3668 raserver.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:732 -
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"{path}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1248 -
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3668 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"3⤵PID:488
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:2620
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/488-5-0x0000000000000000-mapping.dmp
-
memory/1248-0-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1248-1-0x000000000041E2A0-mapping.dmp
-
memory/2984-7-0x0000000001000000-0x00000000010E3000-memory.dmpFilesize
908KB
-
memory/3668-2-0x0000000000000000-mapping.dmp
-
memory/3668-3-0x0000000000B00000-0x0000000000B1F000-memory.dmpFilesize
124KB
-
memory/3668-4-0x0000000000B00000-0x0000000000B1F000-memory.dmpFilesize
124KB
-
memory/3668-6-0x0000000005640000-0x0000000005721000-memory.dmpFilesize
900KB