Analysis
-
max time kernel
7s -
max time network
112s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-01-2021 09:37
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-B201902-0064.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ-B201902-0064.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
RFQ-B201902-0064.exe
-
Size
1.7MB
-
MD5
d1af8a2f27162d95da244e967d122648
-
SHA1
9dbc59b6fedd41c1545b4244874608f7d6bd1ec8
-
SHA256
abd18b2d7cfc702e56442f2549808b301f2e0fc214cdf2230d5fbefc9620fd42
-
SHA512
ec6b8c4ec0878fa79f5679f0e1b0956b3c9ab15534256d7e0df483a1e0fe47dd64a6c1024bedd3262acf7945b178d13b12a87913f2b4bc17ec9860f197582154
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
RFQ-B201902-0064.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ-B201902-0064.exe\"" RFQ-B201902-0064.exe -
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/516-6-0x0000000000400000-0x0000000000434000-memory.dmp netwire behavioral1/memory/516-7-0x000000000040242D-mapping.dmp netwire behavioral1/memory/516-8-0x0000000000400000-0x0000000000434000-memory.dmp netwire -
Drops startup file 2 IoCs
Processes:
RFQ-B201902-0064.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ-B201902-0064.exe RFQ-B201902-0064.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ-B201902-0064.exe RFQ-B201902-0064.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
RFQ-B201902-0064.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ-B201902-0064.exe" RFQ-B201902-0064.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\RFQ-B201902-0064.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ-B201902-0064.exe" RFQ-B201902-0064.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ-B201902-0064.exedescription pid process target process PID 1200 set thread context of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
RFQ-B201902-0064.exedescription pid process target process PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 1200 wrote to memory of 516 1200 RFQ-B201902-0064.exe RFQ-B201902-0064.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-B201902-0064.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-B201902-0064.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ-B201902-0064.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-B201902-0064.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/516-6-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/516-7-0x000000000040242D-mapping.dmp
-
memory/516-8-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1200-2-0x0000000074580000-0x0000000074C6E000-memory.dmpFilesize
6.9MB
-
memory/1200-3-0x0000000000B30000-0x0000000000B31000-memory.dmpFilesize
4KB
-
memory/1200-5-0x0000000000450000-0x000000000048E000-memory.dmpFilesize
248KB