Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2023 02:57
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_Brazil.exe
Resource
win7-20230831-en
General
-
Target
RFQ_Brazil.exe
-
Size
665KB
-
MD5
8c9063c775cdc83e37cc1627c2db4e35
-
SHA1
fdb299c90896fe4da7296eea45e435eeaea01a93
-
SHA256
ee68eb97a5b52851a5154c7078391f42c63dc93e093cfce520f57146bc1b2973
-
SHA512
7deb68cc997fd3e049654c42c294317ab881ba72cb6bcb9d4ce0f499594d9c2a3a49125a217761c4a8d712e7838a50533bda464270cd309f3075fefe8fd91ae1
-
SSDEEP
12288:+6n+XfJw1UN1PLRksi04MgJjIMbDu5innGNMd4MxajKRM9Hg:DKBw+JNc0EtSq5PIH
Malware Config
Extracted
formbook
4.1
m0u5
thefdigroup.com
ashirovinc.com
nbkbj.com
sundirect.cloud
watertreegirls.com
transportevolpara.com
shohagit.com
warna99.net
infsodex.online
fansjolt.com
ourrajasthan.com
secretgardenbuys.com
italyimportvinhos.com
gxzfwx.com
aujhgk.buzz
75313a.com
tertians.com
asansys.net
jacksonsportsmemorabilia.com
globalkamp305.com
2889388.com
houseofbrands.info
nicebatting.com
multconversa.net
topdelta9.com
hyatth.com
doop.store
7jr5z3sq.click
teachingmetech.com
cinema24hd.com
twsyywvz.click
shoptidyhaven.com
heartfulhealingandwellness.com
nowpropel.com
lpmvacationvillas.com
musclemagnate.com
qpicusa.online
wolfonic.com
southwaltoncity.com
poicxz.xyz
azoden.com
spphn.com
collinshumaker.com
spotlightand.com
skillfixr.com
royalplywoods.com
florencemedicareagency.com
elixirjuicessv.com
deluxert.shop
flexicapitals.com
orvmanga.com
kaijurust.com
baodainovel.com
513943440.xyz
worldwidelogisticsco.com
fhmixtvh.click
gilbertdoggroomer.com
yth00001.com
canyouwoohoo.com
heraldmechanic.com
page-to-starts-game.website
lynkeechow.net
paigejaphet.shop
jokerbet550.com
usiclfdl.click
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3672-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3672-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4512-25-0x0000000000880000-0x00000000008AF000-memory.dmp formbook behavioral2/memory/4512-27-0x0000000000880000-0x00000000008AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2964 set thread context of 3672 2964 RFQ_Brazil.exe 90 PID 3672 set thread context of 3148 3672 RFQ_Brazil.exe 27 PID 4512 set thread context of 3148 4512 msdt.exe 27 -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2964 RFQ_Brazil.exe 2964 RFQ_Brazil.exe 2964 RFQ_Brazil.exe 2964 RFQ_Brazil.exe 2964 RFQ_Brazil.exe 2964 RFQ_Brazil.exe 2964 RFQ_Brazil.exe 3672 RFQ_Brazil.exe 3672 RFQ_Brazil.exe 3672 RFQ_Brazil.exe 3672 RFQ_Brazil.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe 4512 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3672 RFQ_Brazil.exe 3672 RFQ_Brazil.exe 3672 RFQ_Brazil.exe 4512 msdt.exe 4512 msdt.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2964 RFQ_Brazil.exe Token: SeDebugPrivilege 3672 RFQ_Brazil.exe Token: SeDebugPrivilege 4512 msdt.exe Token: SeShutdownPrivilege 3148 Explorer.EXE Token: SeCreatePagefilePrivilege 3148 Explorer.EXE Token: SeShutdownPrivilege 3148 Explorer.EXE Token: SeCreatePagefilePrivilege 3148 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3148 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3672 2964 RFQ_Brazil.exe 90 PID 2964 wrote to memory of 3672 2964 RFQ_Brazil.exe 90 PID 2964 wrote to memory of 3672 2964 RFQ_Brazil.exe 90 PID 2964 wrote to memory of 3672 2964 RFQ_Brazil.exe 90 PID 2964 wrote to memory of 3672 2964 RFQ_Brazil.exe 90 PID 2964 wrote to memory of 3672 2964 RFQ_Brazil.exe 90 PID 3148 wrote to memory of 4512 3148 Explorer.EXE 91 PID 3148 wrote to memory of 4512 3148 Explorer.EXE 91 PID 3148 wrote to memory of 4512 3148 Explorer.EXE 91 PID 4512 wrote to memory of 2716 4512 msdt.exe 92 PID 4512 wrote to memory of 2716 4512 msdt.exe 92 PID 4512 wrote to memory of 2716 4512 msdt.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"3⤵PID:2716
-
-