Analysis
-
max time kernel
95s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 17:28
Static task
static1
Behavioral task
behavioral1
Sample
rfq.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
rfq.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
rfq.exe
Resource
win10v2004-20240802-en
General
-
Target
rfq.exe
-
Size
3.5MB
-
MD5
16169512f2e05c8e01449e52ea10b525
-
SHA1
0724ad3ada6f7b87d0be9fe051da3e50449d9775
-
SHA256
0b232cd5b3cd6d2ba6d618a0bb68711901d2746be6dbdc67df1242459e0e5c5a
-
SHA512
7487faa357cdf96653d84d4b028725fa8650614bf6801ca61c78f2a4f42f8ac288172ae5eaa52365143aaf7edb9fd62ebdc40a6e578b897875eb682f8e299611
-
SSDEEP
98304:7trbTA1R2DHQaFMlXIolnL8eckZ6uWvBN3:hc1zC8YolnrckZ7K3
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral3/memory/3452-2-0x0000000004BF0000-0x00000000053F0000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1944 3452 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1968 3452 rfq.exe 82 PID 3452 wrote to memory of 1968 3452 rfq.exe 82 PID 3452 wrote to memory of 1968 3452 rfq.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\rfq.exe"C:\Users\Admin\AppData\Local\Temp\rfq.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\rfq.exe"2⤵PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 7362⤵
- Program crash
PID:1944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3452 -ip 34521⤵PID:3712