Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
RFQ410000003438995755100004.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
RFQ410000003438995755100004.exe
Resource
win10v2004-20230703-en
General
-
Target
RFQ410000003438995755100004.exe
-
Size
50.0MB
-
MD5
67b5cb033c2e594700892d3d816167a3
-
SHA1
e3cba46a5b06af6900df801cbb93c069b4617317
-
SHA256
7926ce87de7fbcd875b3807137e9f22edb6e537410952f41094edcdac79e4d14
-
SHA512
adbfe696689ab6fb95cb68d6537565ef47453abfc7fdaaa4e568e4d465156b414c1d118e33c30d07cee9d7ed40222be688847b38bb89fc50cf56812f7536659f
-
SSDEEP
768:tJXX35YpGtuS+rmbWH2pTQJkLASChYHBFvetUGv006MF+DvsYHWwqDrOjfuohAcq:tBiGtujX2OKLsI3o6q+DvsTru/HDU
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2448 set thread context of 2256 2448 RFQ410000003438995755100004.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 RFQ410000003438995755100004.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2256 2448 RFQ410000003438995755100004.exe 30 PID 2448 wrote to memory of 2256 2448 RFQ410000003438995755100004.exe 30 PID 2448 wrote to memory of 2256 2448 RFQ410000003438995755100004.exe 30 PID 2448 wrote to memory of 2256 2448 RFQ410000003438995755100004.exe 30 PID 2448 wrote to memory of 2256 2448 RFQ410000003438995755100004.exe 30 PID 2448 wrote to memory of 2256 2448 RFQ410000003438995755100004.exe 30 PID 2448 wrote to memory of 2256 2448 RFQ410000003438995755100004.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ410000003438995755100004.exe"C:\Users\Admin\AppData\Local\Temp\RFQ410000003438995755100004.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:2256
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27