Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER RFQ_CF-170419S3_.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER RFQ_CF-170419S3_.exe
Resource
win10v2004-20220812-en
General
-
Target
PURCHASE ORDER RFQ_CF-170419S3_.exe
-
Size
1.1MB
-
MD5
10e0c2c544c56f8bb1deb536590606ff
-
SHA1
99a8d3a2bc97c8941d0c78bb655e2d57244706f4
-
SHA256
77b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
-
SHA512
3fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
SSDEEP
24576:LCMmK3Aw7NM0AiSYLaTm4W0hZEd3/2dhJgM9bObUtv:LC+7q0tqT5No6wMl8Ut
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4728 VQwinup.exe 1304 VQwinup.exe 4032 VQwinup.exe 3632 VQwinup.exe 1216 VQwinup.exe 3608 VQwinup.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PURCHASE ORDER RFQ_CF-170419S3_.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TYboDhwl\ = "C:\\TYboDhwl\\VQHHtUoO.exe" PURCHASE ORDER RFQ_CF-170419S3_.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini regasm.exe File created C:\Windows\assembly\Desktop.ini regasm.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 5100 set thread context of 1360 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 82 PID 4728 set thread context of 4872 4728 VQwinup.exe 84 PID 1304 set thread context of 4548 1304 VQwinup.exe 88 PID 4032 set thread context of 2100 4032 VQwinup.exe 92 PID 3632 set thread context of 3896 3632 VQwinup.exe 94 PID 1216 set thread context of 1684 1216 VQwinup.exe 102 PID 3608 set thread context of 3752 3608 VQwinup.exe 104 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini regasm.exe File opened for modification C:\Windows\assembly\Desktop.ini regasm.exe File opened for modification C:\Windows\assembly regasm.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 4728 VQwinup.exe 4728 VQwinup.exe 1304 VQwinup.exe 1304 VQwinup.exe 4032 VQwinup.exe 4032 VQwinup.exe 3632 VQwinup.exe 3632 VQwinup.exe 1216 VQwinup.exe 1216 VQwinup.exe 3608 VQwinup.exe 3608 VQwinup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 regasm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1360 regasm.exe Token: 33 1360 regasm.exe Token: SeIncBasePriorityPrivilege 1360 regasm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1360 regasm.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3760 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 81 PID 5100 wrote to memory of 3760 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 81 PID 5100 wrote to memory of 3760 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 81 PID 5100 wrote to memory of 1360 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 82 PID 5100 wrote to memory of 1360 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 82 PID 5100 wrote to memory of 1360 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 82 PID 5100 wrote to memory of 1360 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 82 PID 5100 wrote to memory of 1360 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 82 PID 5100 wrote to memory of 4728 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 83 PID 5100 wrote to memory of 4728 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 83 PID 5100 wrote to memory of 4728 5100 PURCHASE ORDER RFQ_CF-170419S3_.exe 83 PID 4728 wrote to memory of 4872 4728 VQwinup.exe 84 PID 4728 wrote to memory of 4872 4728 VQwinup.exe 84 PID 4728 wrote to memory of 4872 4728 VQwinup.exe 84 PID 4728 wrote to memory of 4872 4728 VQwinup.exe 84 PID 4728 wrote to memory of 4872 4728 VQwinup.exe 84 PID 4728 wrote to memory of 1304 4728 VQwinup.exe 86 PID 4728 wrote to memory of 1304 4728 VQwinup.exe 86 PID 4728 wrote to memory of 1304 4728 VQwinup.exe 86 PID 1304 wrote to memory of 1288 1304 VQwinup.exe 87 PID 1304 wrote to memory of 1288 1304 VQwinup.exe 87 PID 1304 wrote to memory of 1288 1304 VQwinup.exe 87 PID 1304 wrote to memory of 4548 1304 VQwinup.exe 88 PID 1304 wrote to memory of 4548 1304 VQwinup.exe 88 PID 1304 wrote to memory of 4548 1304 VQwinup.exe 88 PID 1304 wrote to memory of 4548 1304 VQwinup.exe 88 PID 1304 wrote to memory of 4548 1304 VQwinup.exe 88 PID 1304 wrote to memory of 4032 1304 VQwinup.exe 90 PID 1304 wrote to memory of 4032 1304 VQwinup.exe 90 PID 1304 wrote to memory of 4032 1304 VQwinup.exe 90 PID 4032 wrote to memory of 3044 4032 VQwinup.exe 91 PID 4032 wrote to memory of 3044 4032 VQwinup.exe 91 PID 4032 wrote to memory of 3044 4032 VQwinup.exe 91 PID 4032 wrote to memory of 2100 4032 VQwinup.exe 92 PID 4032 wrote to memory of 2100 4032 VQwinup.exe 92 PID 4032 wrote to memory of 2100 4032 VQwinup.exe 92 PID 4032 wrote to memory of 2100 4032 VQwinup.exe 92 PID 4032 wrote to memory of 2100 4032 VQwinup.exe 92 PID 4032 wrote to memory of 3632 4032 VQwinup.exe 93 PID 4032 wrote to memory of 3632 4032 VQwinup.exe 93 PID 4032 wrote to memory of 3632 4032 VQwinup.exe 93 PID 3632 wrote to memory of 3896 3632 VQwinup.exe 94 PID 3632 wrote to memory of 3896 3632 VQwinup.exe 94 PID 3632 wrote to memory of 3896 3632 VQwinup.exe 94 PID 3632 wrote to memory of 3896 3632 VQwinup.exe 94 PID 3632 wrote to memory of 3896 3632 VQwinup.exe 94 PID 3632 wrote to memory of 1216 3632 VQwinup.exe 101 PID 3632 wrote to memory of 1216 3632 VQwinup.exe 101 PID 3632 wrote to memory of 1216 3632 VQwinup.exe 101 PID 1216 wrote to memory of 1684 1216 VQwinup.exe 102 PID 1216 wrote to memory of 1684 1216 VQwinup.exe 102 PID 1216 wrote to memory of 1684 1216 VQwinup.exe 102 PID 1216 wrote to memory of 1684 1216 VQwinup.exe 102 PID 1216 wrote to memory of 1684 1216 VQwinup.exe 102 PID 1216 wrote to memory of 3608 1216 VQwinup.exe 103 PID 1216 wrote to memory of 3608 1216 VQwinup.exe 103 PID 1216 wrote to memory of 3608 1216 VQwinup.exe 103 PID 3608 wrote to memory of 3752 3608 VQwinup.exe 104 PID 3608 wrote to memory of 3752 3608 VQwinup.exe 104 PID 3608 wrote to memory of 3752 3608 VQwinup.exe 104 PID 3608 wrote to memory of 3752 3608 VQwinup.exe 104 PID 3608 wrote to memory of 3752 3608 VQwinup.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER RFQ_CF-170419S3_.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"2⤵PID:3760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\VQwinup.exeC:\Users\Admin\AppData\Local\Temp\VQwinup.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"3⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\VQwinup.exeC:\Users\Admin\AppData\Local\Temp\VQwinup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"4⤵PID:1288
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"4⤵PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\VQwinup.exeC:\Users\Admin\AppData\Local\Temp\VQwinup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"5⤵PID:3044
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"5⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\VQwinup.exeC:\Users\Admin\AppData\Local\Temp\VQwinup.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"6⤵PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\VQwinup.exeC:\Users\Admin\AppData\Local\Temp\VQwinup.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"7⤵PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\VQwinup.exeC:\Users\Admin\AppData\Local\Temp\VQwinup.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"8⤵PID:3752
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
319B
MD5824ba7b7eed8b900a98dd25129c4cd83
SHA154478770b2158000ef365591d42977cb854453a1
SHA256d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03
SHA512ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea
-
Filesize
1.1MB
MD510e0c2c544c56f8bb1deb536590606ff
SHA199a8d3a2bc97c8941d0c78bb655e2d57244706f4
SHA25677b7607e09f39f64d606008da2c8009faf892f625843e3db0dff4ac304edba8d
SHA5123fed3afdc39e4635bc9fb6a2525e4850c00d882b15dc8fd218c64d4df1ad4e358564cf3e13f7909aa96c0afcca1c3e48245b83e91b83fa69dd578c98b409f1ea