Analysis

  • max time kernel
    75s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 19:37

General

  • Target

    RFQ#2071466.exe

  • Size

    516KB

  • MD5

    1ac5867a0b75d47c788950d1a273b83d

  • SHA1

    4758d69b44dc4ea857a91b5401f6f9cb316679c6

  • SHA256

    9c61e23500bd96aacabe33bf81afe48cddb5bb6bfa61366ba663dff5f58f5034

  • SHA512

    5c1141cecdf7f55d3c7f9d6c8ab14b0a7c1b3f9f1532c401cd22454cc95108926603364466df6ab7c8968f6ad6d19e566d7348cc18c1b834e545ba41df1504e4

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ#2071466.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ#2071466.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:364

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1616-59-0x000007FEF7500000-0x000007FEF777A000-memory.dmp
    Filesize

    2.5MB