Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2023 01:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
RFQ410000003438995755100004.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
RFQ410000003438995755100004.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
RFQ410000003438995755100004.exe
-
Size
50.0MB
-
MD5
67b5cb033c2e594700892d3d816167a3
-
SHA1
e3cba46a5b06af6900df801cbb93c069b4617317
-
SHA256
7926ce87de7fbcd875b3807137e9f22edb6e537410952f41094edcdac79e4d14
-
SHA512
adbfe696689ab6fb95cb68d6537565ef47453abfc7fdaaa4e568e4d465156b414c1d118e33c30d07cee9d7ed40222be688847b38bb89fc50cf56812f7536659f
-
SSDEEP
768:tJXX35YpGtuS+rmbWH2pTQJkLASChYHBFvetUGv006MF+DvsYHWwqDrOjfuohAcq:tBiGtujX2OKLsI3o6q+DvsTru/HDU
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 464 set thread context of 4316 464 RFQ410000003438995755100004.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4316 MSBuild.exe 4316 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 464 RFQ410000003438995755100004.exe Token: SeDebugPrivilege 4316 MSBuild.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 464 wrote to memory of 4316 464 RFQ410000003438995755100004.exe 90 PID 464 wrote to memory of 4316 464 RFQ410000003438995755100004.exe 90 PID 464 wrote to memory of 4316 464 RFQ410000003438995755100004.exe 90 PID 464 wrote to memory of 4316 464 RFQ410000003438995755100004.exe 90 PID 464 wrote to memory of 4316 464 RFQ410000003438995755100004.exe 90 PID 464 wrote to memory of 4316 464 RFQ410000003438995755100004.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ410000003438995755100004.exe"C:\Users\Admin\AppData\Local\Temp\RFQ410000003438995755100004.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-