Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 15:28

General

  • Target

    0702/RFQ QUG24-200370054200.exe

  • Size

    757KB

  • MD5

    ed70a075210d9da38a37aa545249aa1c

  • SHA1

    fa086fb0272c1f7dade911fdcde53f9b6f0793cd

  • SHA256

    7ba53ac52055ef736c19a4044688aef3cfe81c545ac34aa2b5bba2214a931363

  • SHA512

    7f811411f853af4dde1efd12744d9fc87268eca5450de6d414c4ea3b48ccf83de1c0bfbfac675aaaeee7315d654ce99e6bcc224a73ba3863a1d51b821af65dc7

  • SSDEEP

    12288:RuEg1tQwjJTseCai5d7PC/dyPoHFk2VsVVKftyuGbz//DIsKCAQ4Gzv/VOUM/U:UPtQwj5seCXPPC/QAlWbK5i//Ms9AQ4L

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0702\RFQ QUG24-200370054200.exe
    "C:\Users\Admin\AppData\Local\Temp\0702\RFQ QUG24-200370054200.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Users\Admin\AppData\Local\Temp\0702\RFQ QUG24-200370054200.exe
      "C:\Users\Admin\AppData\Local\Temp\0702\RFQ QUG24-200370054200.exe"
      2⤵
        PID:2464

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/876-0-0x000007FEF5F93000-0x000007FEF5F94000-memory.dmp

      Filesize

      4KB

    • memory/876-1-0x0000000000DA0000-0x0000000000E64000-memory.dmp

      Filesize

      784KB

    • memory/876-2-0x000007FEF5F90000-0x000007FEF697C000-memory.dmp

      Filesize

      9.9MB

    • memory/876-3-0x00000000008D0000-0x00000000008F4000-memory.dmp

      Filesize

      144KB

    • memory/876-4-0x000007FEF5F93000-0x000007FEF5F94000-memory.dmp

      Filesize

      4KB

    • memory/876-5-0x000007FEF5F90000-0x000007FEF697C000-memory.dmp

      Filesize

      9.9MB

    • memory/876-6-0x0000000000980000-0x0000000000996000-memory.dmp

      Filesize

      88KB

    • memory/876-7-0x0000000000560000-0x0000000000574000-memory.dmp

      Filesize

      80KB

    • memory/876-8-0x000000001BE70000-0x000000001BEF8000-memory.dmp

      Filesize

      544KB

    • memory/876-11-0x000007FEF5F90000-0x000007FEF697C000-memory.dmp

      Filesize

      9.9MB

    • memory/2464-9-0x000007FFFFFD8000-0x000007FFFFFD9000-memory.dmp

      Filesize

      4KB