Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 3100185 MAHAD.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RFQ 3100185 MAHAD.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ 3100185 MAHAD.exe
-
Size
1.2MB
-
MD5
9d6670fbee5ffd65a666a3238db4f622
-
SHA1
ea392d5a0a4007170be83b4d17ebd6d346b39629
-
SHA256
4a918ba2805dd458e2b776cae6fd6dd1a2a8ef1c4d8cbd02c2feaa69c49d4367
-
SHA512
0f1c0e1da310d593d1425564a1d3333487968d5c46b9581d2474ba6521fb9f96afffcbcb836b673bd321748ecd16e8276846cdbc28a607e6e9a3c52e6254248c
-
SSDEEP
24576:ctb20pkaCqT5TBWgNQ7altQqhh3RtVR43Y8nFlhh6A:FVg5tQ7almCRtVJ8nFlb5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2412 set thread context of 3648 2412 RFQ 3100185 MAHAD.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 4780 3648 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 3100185 MAHAD.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2412 RFQ 3100185 MAHAD.exe 2412 RFQ 3100185 MAHAD.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2412 RFQ 3100185 MAHAD.exe 2412 RFQ 3100185 MAHAD.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2412 RFQ 3100185 MAHAD.exe 2412 RFQ 3100185 MAHAD.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3648 2412 RFQ 3100185 MAHAD.exe 86 PID 2412 wrote to memory of 3648 2412 RFQ 3100185 MAHAD.exe 86 PID 2412 wrote to memory of 3648 2412 RFQ 3100185 MAHAD.exe 86 PID 2412 wrote to memory of 3648 2412 RFQ 3100185 MAHAD.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"2⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 843⤵
- Program crash
PID:4780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3648 -ip 36481⤵PID:3424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5dc65009c09e32006f25dc89c6ea841b5
SHA1a7ca4e12e4a5cd538035325d7337169f374fe13f
SHA256c69def15b4a8572e0c478e5400a446c4de1e5131524cac0f877b447d06b78be9
SHA512b8038baf337840720c964f0079ce1aee8491dc6d58d899181192a16331a75906a3dd8b75df7795f5695ce22245c8f865efa7f87fe99a824eb2a0db281c973573