Analysis
-
max time kernel
9s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-01-2021 09:37
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-B201902-0064.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ-B201902-0064.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
RFQ-B201902-0064.exe
-
Size
1.7MB
-
MD5
d1af8a2f27162d95da244e967d122648
-
SHA1
9dbc59b6fedd41c1545b4244874608f7d6bd1ec8
-
SHA256
abd18b2d7cfc702e56442f2549808b301f2e0fc214cdf2230d5fbefc9620fd42
-
SHA512
ec6b8c4ec0878fa79f5679f0e1b0956b3c9ab15534256d7e0df483a1e0fe47dd64a6c1024bedd3262acf7945b178d13b12a87913f2b4bc17ec9860f197582154
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
RFQ-B201902-0064.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ-B201902-0064.exe\"" RFQ-B201902-0064.exe -
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3272-10-0x0000000000400000-0x0000000000434000-memory.dmp netwire behavioral2/memory/3272-11-0x000000000040242D-mapping.dmp netwire behavioral2/memory/3272-12-0x0000000000400000-0x0000000000434000-memory.dmp netwire -
Drops startup file 2 IoCs
Processes:
RFQ-B201902-0064.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ-B201902-0064.exe RFQ-B201902-0064.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ-B201902-0064.exe RFQ-B201902-0064.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
RFQ-B201902-0064.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ-B201902-0064.exe" RFQ-B201902-0064.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\RFQ-B201902-0064.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RFQ-B201902-0064.exe" RFQ-B201902-0064.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ-B201902-0064.exedescription pid process target process PID 652 set thread context of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
RFQ-B201902-0064.exedescription pid process target process PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe PID 652 wrote to memory of 3272 652 RFQ-B201902-0064.exe RFQ-B201902-0064.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-B201902-0064.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-B201902-0064.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ-B201902-0064.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-B201902-0064.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/652-2-0x0000000073FF0000-0x00000000746DE000-memory.dmpFilesize
6.9MB
-
memory/652-3-0x0000000000550000-0x0000000000551000-memory.dmpFilesize
4KB
-
memory/652-5-0x0000000004F30000-0x0000000004F31000-memory.dmpFilesize
4KB
-
memory/652-6-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/652-7-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/652-8-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/652-9-0x0000000004FF0000-0x000000000502E000-memory.dmpFilesize
248KB
-
memory/3272-10-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3272-11-0x000000000040242D-mapping.dmp
-
memory/3272-12-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB