Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-04-2021 22:04
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7v20210410
General
-
Target
RFQ.exe
-
Size
845KB
-
MD5
90064098dcdf665a8affc5825e4e7815
-
SHA1
81adbb9921401a4bb567f665d3dabeff61278a04
-
SHA256
9ca276f44ec7a1e4745a4d880072d374fd6db44efb6e9c2b44e80cfcf0274472
-
SHA512
e01a5d638e81a9665e49743229f2194b3201832e50855ce1c4a701985c0902ed4e21954d4afab1d1f99c348461eeb58121b7d2b0a05f9ce53abc4190d9382f79
Malware Config
Extracted
formbook
4.1
http://www.consultinggroupwv.com/ple/
antibuildshop.com
saveyourgrandchildren.com
nelivo.com
skatelife.net
shiftingbaba.com
5daykitchen.contractors
influenciadoradesucesso.com
fuutu.com
mejor-producto.com
xianqianbao99.com
uq6eik5mo4.com
kn-security.com
dangerouslyme.com
whmznx.club
teteperformance.com
gospelofrecovery.com
lakidsacting.com
halojabar.com
easytolovehardtodefine.com
safeairseal.com
ks6089.com
intelligentdesigncarpentry.com
nobrokerage.online
nocionlinguistica.xyz
riskmanagementnews.com
slingshotsmd.com
unifipayments.com
themoderncolonial.com
lopva.com
studioeats.com
beingthehands.com
veka-spb.com
qispiayway.com
goldbarrgifts.com
yomeactivoxfasan.com
xn--ekremimamolu-myb.com
fibergourmetpasta.com
twoworkers.com
diasporalifedominicans.com
giapankhang.website
pawmawclaw.info
ponderingelephant.com
mailinno.com
bonzacbdoil.com
enigmamedicalsolutions.co.uk
bbbsportscardz.com
scarabmag.com
dietvex.xyz
care-match.com
canyibang.com
handicapvansnews.info
trichocereususa.com
depositopalmeiras.com
bleepbloop.agency
betyen1.com
studiovelicham.com
izmoo2-hoeiprotein-review.com
tampasports.net
iphonelcd-supplier.com
gegepaa.com
sapirdavid.com
lankaplaza.com
guardianangelgifttree.com
universityrating.net
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3628-126-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3628-127-0x000000000041EBE0-mapping.dmp formbook behavioral2/memory/3180-134-0x0000000000D60000-0x0000000000D8E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RFQ.exeRFQ.execontrol.exedescription pid process target process PID 4044 set thread context of 3628 4044 RFQ.exe RFQ.exe PID 3628 set thread context of 3028 3628 RFQ.exe Explorer.EXE PID 3180 set thread context of 3028 3180 control.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
RFQ.exeRFQ.execontrol.exepid process 4044 RFQ.exe 4044 RFQ.exe 4044 RFQ.exe 3628 RFQ.exe 3628 RFQ.exe 3628 RFQ.exe 3628 RFQ.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe 3180 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RFQ.execontrol.exepid process 3628 RFQ.exe 3628 RFQ.exe 3628 RFQ.exe 3180 control.exe 3180 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ.exeRFQ.execontrol.exedescription pid process Token: SeDebugPrivilege 4044 RFQ.exe Token: SeDebugPrivilege 3628 RFQ.exe Token: SeDebugPrivilege 3180 control.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
RFQ.exeExplorer.EXEcontrol.exedescription pid process target process PID 4044 wrote to memory of 3628 4044 RFQ.exe RFQ.exe PID 4044 wrote to memory of 3628 4044 RFQ.exe RFQ.exe PID 4044 wrote to memory of 3628 4044 RFQ.exe RFQ.exe PID 4044 wrote to memory of 3628 4044 RFQ.exe RFQ.exe PID 4044 wrote to memory of 3628 4044 RFQ.exe RFQ.exe PID 4044 wrote to memory of 3628 4044 RFQ.exe RFQ.exe PID 3028 wrote to memory of 3180 3028 Explorer.EXE control.exe PID 3028 wrote to memory of 3180 3028 Explorer.EXE control.exe PID 3028 wrote to memory of 3180 3028 Explorer.EXE control.exe PID 3180 wrote to memory of 3868 3180 control.exe cmd.exe PID 3180 wrote to memory of 3868 3180 control.exe cmd.exe PID 3180 wrote to memory of 3868 3180 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\RFQ.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\RFQ.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3628 -
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3892
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ.exe"3⤵PID:3868