Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
RFQ02212420.exe
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
RFQ02212420.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
RFQ02212420.exe
-
Size
753KB
-
MD5
a8bd1b12d450b9f4513524f0eacb7359
-
SHA1
30d688c3923e089ff08facbacbc0cd55499bbca8
-
SHA256
66fa9e8d1cb0406ee13e9441b65b0f0405d6c847dc5cfa2e232342d0d8081dec
-
SHA512
7f7f78c08250dcafc0ba3ceb9b2d05e3bf2e62deeba0def71cf6de9e3fc5fee21a7855e2a37b753c1f47ee101ddfbf0801f3daf424cbff58b0de683520a27c4d
-
SSDEEP
12288:T+DbgnB778QeyRP4az8lAU7Bg6CptS+DWByepN7R6soWWot21y1PknyjVn6cFc4H:6gnBlP4aYlAU9dC/SgMyszFWoQQ8nyj3
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2292 set thread context of 3068 2292 RFQ02212420.exe 29 PID 3068 set thread context of 1208 3068 RFQ02212420.exe 21 PID 3068 set thread context of 3020 3068 RFQ02212420.exe 32 PID 3020 set thread context of 1208 3020 replace.exe 21 -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2292 RFQ02212420.exe 3068 RFQ02212420.exe 3068 RFQ02212420.exe 3068 RFQ02212420.exe 3068 RFQ02212420.exe 3068 RFQ02212420.exe 3068 RFQ02212420.exe 3068 RFQ02212420.exe 3068 RFQ02212420.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe 3020 replace.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3068 RFQ02212420.exe 3068 RFQ02212420.exe 3020 replace.exe 3020 replace.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2292 RFQ02212420.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2640 2292 RFQ02212420.exe 28 PID 2292 wrote to memory of 2640 2292 RFQ02212420.exe 28 PID 2292 wrote to memory of 2640 2292 RFQ02212420.exe 28 PID 2292 wrote to memory of 2640 2292 RFQ02212420.exe 28 PID 2292 wrote to memory of 3068 2292 RFQ02212420.exe 29 PID 2292 wrote to memory of 3068 2292 RFQ02212420.exe 29 PID 2292 wrote to memory of 3068 2292 RFQ02212420.exe 29 PID 2292 wrote to memory of 3068 2292 RFQ02212420.exe 29 PID 2292 wrote to memory of 3068 2292 RFQ02212420.exe 29 PID 2292 wrote to memory of 3068 2292 RFQ02212420.exe 29 PID 2292 wrote to memory of 3068 2292 RFQ02212420.exe 29 PID 3068 wrote to memory of 3020 3068 RFQ02212420.exe 32 PID 3068 wrote to memory of 3020 3068 RFQ02212420.exe 32 PID 3068 wrote to memory of 3020 3068 RFQ02212420.exe 32 PID 3068 wrote to memory of 3020 3068 RFQ02212420.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\RFQ02212420.exe"C:\Users\Admin\AppData\Local\Temp\RFQ02212420.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\RFQ02212420.exe"C:\Users\Admin\AppData\Local\Temp\RFQ02212420.exe"3⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ02212420.exe"C:\Users\Admin\AppData\Local\Temp\RFQ02212420.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\replace.exe"C:\Windows\SysWOW64\replace.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3020
-
-
-