Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 3100185 MAHAD.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ 3100185 MAHAD.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ 3100185 MAHAD.exe
-
Size
1.2MB
-
MD5
73a3c01e5d5023e800f52569958185ab
-
SHA1
f2c3103491b9a8e46264d47939bbd4c53cbc149f
-
SHA256
ce1748d51da0ccc300e4287b95cd7b8e975c30bb482896de396cc47d7097f0c7
-
SHA512
81eb8758166e9949a7156f8df7d4c846e10d7aa96de667728b8e4bdce68cf8d648de9008501522687534307693cc46fe3e3200319003eb7f4b061d0aa172cd59
-
SSDEEP
24576:Ntb20pkaCqT5TBWgNQ7axw9zoC3CdolZCPFna3Q66A:+Vg5tQ7axUoCydiga35
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2324 set thread context of 4264 2324 RFQ 3100185 MAHAD.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 3100185 MAHAD.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe 4264 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2324 RFQ 3100185 MAHAD.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2324 RFQ 3100185 MAHAD.exe 2324 RFQ 3100185 MAHAD.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2324 RFQ 3100185 MAHAD.exe 2324 RFQ 3100185 MAHAD.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4264 2324 RFQ 3100185 MAHAD.exe 83 PID 2324 wrote to memory of 4264 2324 RFQ 3100185 MAHAD.exe 83 PID 2324 wrote to memory of 4264 2324 RFQ 3100185 MAHAD.exe 83 PID 2324 wrote to memory of 4264 2324 RFQ 3100185 MAHAD.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 3100185 MAHAD.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD53e05465e9dfae3898c82343d67914690
SHA1e0c3f3b46e3ff7f8590a64e3d40a6fe78bb33e7f
SHA25601d25701cba88b351d7f829130a52147edff7578efe0e6178c2dd8deb60e9607
SHA512c9e183b12d6b99459f2dbc86c469c9c36b957f2de7e9274f789d4c4686b61e7ffb13f0b058453796b942b2b6d7525f76da7e87116e036989f71f6372d159e0ee