Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe
-
Size
3.0MB
-
MD5
2e5cc2ed04be92b41c884429693bc8bd
-
SHA1
163015557c5fc3258f988e4da0fcc668c230e19a
-
SHA256
578449d310dfe30a1bec653337bd51f621ed1fc41e9bb5d1efe4646c3c8ec39e
-
SHA512
670dff7c7467977ff0a08c417545c0661ded50ba6fec9c24f110d048b2cf2e9797135bb0d9466341ce9f9b6b6882f8db238518a0636681cb5a08885fc0792103
-
SSDEEP
49152:T3v+7/5QyIeGth/6p+JchOb80NzEBqF080SE1CZAfMoUY/jeODxWHe+MxgVFaZ6:T3v+7plplirEE8NMW/j9DsHe+MiVF/
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nonsubmerged.vbs nonsubmerged.exe -
Executes dropped EXE 1 IoCs
pid Process 3404 nonsubmerged.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b95-5.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3764 3404 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nonsubmerged.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 736 wrote to memory of 3404 736 RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe 87 PID 736 wrote to memory of 3404 736 RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe 87 PID 736 wrote to memory of 3404 736 RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe 87 PID 3404 wrote to memory of 1552 3404 nonsubmerged.exe 88 PID 3404 wrote to memory of 1552 3404 nonsubmerged.exe 88 PID 3404 wrote to memory of 1552 3404 nonsubmerged.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\apostrophise\nonsubmerged.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_23K038~41A-22-PO 00561~579-H2566~9.exe"3⤵PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 7363⤵
- Program crash
PID:3764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3404 -ip 34041⤵PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD52e5cc2ed04be92b41c884429693bc8bd
SHA1163015557c5fc3258f988e4da0fcc668c230e19a
SHA256578449d310dfe30a1bec653337bd51f621ed1fc41e9bb5d1efe4646c3c8ec39e
SHA512670dff7c7467977ff0a08c417545c0661ded50ba6fec9c24f110d048b2cf2e9797135bb0d9466341ce9f9b6b6882f8db238518a0636681cb5a08885fc0792103