Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 04:18
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20241023-en
General
-
Target
RFQ.exe
-
Size
1.2MB
-
MD5
f16382c47d6df2809c980a0e8dc937db
-
SHA1
2bbf3d4682a253d373f01ead1cb86c8e3c269ae3
-
SHA256
88fa1f0c7c938dd906f2757b1df097ce40dbaa45740960a0457c41fd93c9285a
-
SHA512
7a5cb4b2ca4724ca3f5474baa97e58c991f9bd56b8a0c323dcc5027a43ee876fae85bfdbd3dcbf910b8a47ff50d777ef6619d52fca3758150e9561c986934736
-
SSDEEP
24576:8tb20pkaCqT5TBWgNQ7aGI6jcC7uFrUQLb6A:lVg5tQ7aGI6IlfP5
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ.exedescription pid Process procid_target PID 4356 set thread context of 840 4356 RFQ.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RegSvcs.exeRFQ.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid Process 840 RegSvcs.exe 840 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
RFQ.exepid Process 4356 RFQ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid Process Token: SeDebugPrivilege 840 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
RFQ.exepid Process 4356 RFQ.exe 4356 RFQ.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
RFQ.exepid Process 4356 RFQ.exe 4356 RFQ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
RFQ.exedescription pid Process procid_target PID 4356 wrote to memory of 840 4356 RFQ.exe 82 PID 4356 wrote to memory of 840 4356 RFQ.exe 82 PID 4356 wrote to memory of 840 4356 RFQ.exe 82 PID 4356 wrote to memory of 840 4356 RFQ.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5f6e25f3d40f027a4cd0ce6c8433f7f7c
SHA1bef34ff87d133331f4fbe3d25abb5a78a0900762
SHA256d811a556d16778322a3ff818deec831cc09c85ecd9bfa7aec33065f45830f17c
SHA5121c2454f4dacaf486b530bc516f2c840662aaf1e4034cb8317149f02abc3dc5f264a92716b856c37f38889282ea72c0bd7e898363b474b7e7049ed2d8c7948317