Analysis

  • max time kernel
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2023 08:12

General

  • Target

    RFQ 6000066536.exe

  • Size

    373KB

  • MD5

    e27c0c55beced8afe48593bfd8bf330a

  • SHA1

    65d99ebb9c66bd65738c318727617e145cb7a331

  • SHA256

    4f46b17d1db8bdb30b33dfa8ed5335149bb4f920780e349b6b02155e337c8b57

  • SHA512

    0b11e5e5ac89fec53a57b7dcce85d01a7a9dd9774a1964644db2ec6ebdaa6cd7a465c088601b19c635534568100e10f6cbff711cf3368a5aea82d6af664d5214

  • SSDEEP

    6144:vYa6fNfrzvw86FftvVMUVHS0ldyYcpco7Kk02gtZvvFcijeWUofUVkdyZ4:vYVNo86fSUVy0ObBivFtSdofeW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ 6000066536.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ 6000066536.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\RFQ 6000066536.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ 6000066536.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsw64D6.tmp\egicixibq.dll

    Filesize

    277KB

    MD5

    6335f447e0555fca1d51629ae9a39f35

    SHA1

    a3c6efb1e8d5691f92036ef558a45e0f16ca9f9c

    SHA256

    94dcfc7778c2e65c6d565a5ea966a5774667e25c325a932a43cb3da0d97bd98a

    SHA512

    c987a6431663e9a82f27afda024731b667bc794cca7a6623efe4c4e55c74cc900d22795f8e78af83d12fc9d632e8ac129e41d406b54bba9b84276a11b2223cc4

  • memory/2392-140-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2392-141-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2392-142-0x0000000000AD0000-0x0000000000E1A000-memory.dmp

    Filesize

    3.3MB

  • memory/2392-143-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB