Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 3100185 MAHAD.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ 3100185 MAHAD.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ 3100185 MAHAD.exe
-
Size
1.2MB
-
MD5
73a3c01e5d5023e800f52569958185ab
-
SHA1
f2c3103491b9a8e46264d47939bbd4c53cbc149f
-
SHA256
ce1748d51da0ccc300e4287b95cd7b8e975c30bb482896de396cc47d7097f0c7
-
SHA512
81eb8758166e9949a7156f8df7d4c846e10d7aa96de667728b8e4bdce68cf8d648de9008501522687534307693cc46fe3e3200319003eb7f4b061d0aa172cd59
-
SSDEEP
24576:Ntb20pkaCqT5TBWgNQ7axw9zoC3CdolZCPFna3Q66A:+Vg5tQ7axUoCydiga35
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 2312 2204 RFQ 3100185 MAHAD.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 3100185 MAHAD.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2204 RFQ 3100185 MAHAD.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2204 RFQ 3100185 MAHAD.exe 2204 RFQ 3100185 MAHAD.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2204 RFQ 3100185 MAHAD.exe 2204 RFQ 3100185 MAHAD.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2312 2204 RFQ 3100185 MAHAD.exe 28 PID 2204 wrote to memory of 2312 2204 RFQ 3100185 MAHAD.exe 28 PID 2204 wrote to memory of 2312 2204 RFQ 3100185 MAHAD.exe 28 PID 2204 wrote to memory of 2312 2204 RFQ 3100185 MAHAD.exe 28 PID 2204 wrote to memory of 2312 2204 RFQ 3100185 MAHAD.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD53e05465e9dfae3898c82343d67914690
SHA1e0c3f3b46e3ff7f8590a64e3d40a6fe78bb33e7f
SHA25601d25701cba88b351d7f829130a52147edff7578efe0e6178c2dd8deb60e9607
SHA512c9e183b12d6b99459f2dbc86c469c9c36b957f2de7e9274f789d4c4686b61e7ffb13f0b058453796b942b2b6d7525f76da7e87116e036989f71f6372d159e0ee