Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 10:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
RFQSA,PROJECTENQ-0090FOBUSD.exe
Resource
win7-20230712-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
RFQSA,PROJECTENQ-0090FOBUSD.exe
Resource
win10v2004-20230703-en
4 signatures
150 seconds
General
-
Target
RFQSA,PROJECTENQ-0090FOBUSD.exe
-
Size
584KB
-
MD5
cab00c7d38e22b577abd3fb0679aa231
-
SHA1
6af98a27937989d4a10e2390c99552c5cb9a2695
-
SHA256
ac254c8f30ac538efa1c6774d3b7e6a1b379af081c6cb15d36440e4913bc41c1
-
SHA512
85bd383e2af799eba6d92c6f5a1cc0507a4e6d578c0c11ac5afc5cac06449072293e94aaa76302ca3d7aa570a99dd74a07325d98f8a92800cb6322cde654e950
-
SSDEEP
12288:Byd04uf1RZga7CcluTo/OpkccX9ZR/FjRGCg/dq8sf70iHuBJ:sd+fqa7CcljOmccX9lRfglq8W70iOB
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1404 set thread context of 4192 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 85 -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe 4192 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe Token: SeDebugPrivilege 4192 RegSvcs.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1404 wrote to memory of 4192 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 85 PID 1404 wrote to memory of 4192 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 85 PID 1404 wrote to memory of 4192 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 85 PID 1404 wrote to memory of 4192 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 85 PID 1404 wrote to memory of 4192 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 85 PID 1404 wrote to memory of 4192 1404 RFQSA,PROJECTENQ-0090FOBUSD.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQSA,PROJECTENQ-0090FOBUSD.exe"C:\Users\Admin\AppData\Local\Temp\RFQSA,PROJECTENQ-0090FOBUSD.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-