Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
18-10-2021 08:20
Static task
static1
Behavioral task
behavioral1
Sample
RFQ W-1802-1889.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ W-1802-1889.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
RFQ W-1802-1889.exe
-
Size
1.3MB
-
MD5
5cceefb23aa8805a7d5320fac133b4b8
-
SHA1
e02218a4886cf5f954d6c6fa5704c2d72fad7fd1
-
SHA256
687a1d2494d31819195e196dbedb77debab11b228bf8ce58dddff6857c7a22e2
-
SHA512
329610962a3195f12213067ace300d98cef072a402dd8e3e6edb35b464aba2efd330a6d07b9e4ca41e977d0a0c6b7dd2f8deb8af8bdb29ce3549cbc631c7e5dd
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
RFQ W-1802-1889.exepid process 1700 RFQ W-1802-1889.exe 1700 RFQ W-1802-1889.exe 1700 RFQ W-1802-1889.exe 1700 RFQ W-1802-1889.exe 1700 RFQ W-1802-1889.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RFQ W-1802-1889.exedescription pid process Token: SeDebugPrivilege 1700 RFQ W-1802-1889.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
RFQ W-1802-1889.exedescription pid process target process PID 1700 wrote to memory of 1016 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1016 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1016 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1016 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1208 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1208 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1208 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1208 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 292 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 292 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 292 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 292 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1632 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1632 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1632 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1632 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1652 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1652 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1652 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe PID 1700 wrote to memory of 1652 1700 RFQ W-1802-1889.exe RFQ W-1802-1889.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ W-1802-1889.exe"C:\Users\Admin\AppData\Local\Temp\RFQ W-1802-1889.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\RFQ W-1802-1889.exe"{path}"2⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\RFQ W-1802-1889.exe"{path}"2⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\RFQ W-1802-1889.exe"{path}"2⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\RFQ W-1802-1889.exe"{path}"2⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\RFQ W-1802-1889.exe"{path}"2⤵PID:1652