Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 14:59

General

  • Target

    RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe

  • Size

    740KB

  • MD5

    c91883af9eea097a86818150d2ea403c

  • SHA1

    648a093b32fc9130dbd687d1019fef5956b78b5d

  • SHA256

    19541ea2e21c852ac3dd10b038380ac650cc048d42c1877f74067be6bdc1e9ab

  • SHA512

    7102950c4865c8cb0eb86f591e65c993ed0b8743b2c062f9643495f9288f4eaa1ae51f9fb90d5d0f2190ce0282aca93aaecf5f20aaa9cb19345d98720e2babe6

  • SSDEEP

    12288:HYRxA4Y5lyA/BxSPC/doJWVqO6V3Gb6CDrTL4eAG+vG+ufOwmHjZEAVNTqABdE78:4RUUwDry3OfmHLqR+Zf2RhL

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe"
      2⤵
        PID:2604
      • C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe
        "C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe"
        2⤵
          PID:2644
        • C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe
          "C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe"
          2⤵
            PID:2648
          • C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe
            "C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe"
            2⤵
              PID:2732
            • C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe
              "C:\Users\Admin\AppData\Local\Temp\RFQ PETROIL BID INVITATION EOI - 16674.01 4KPET0.exe"
              2⤵
                PID:2760

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2284-0-0x00000000740EE000-0x00000000740EF000-memory.dmp

              Filesize

              4KB

            • memory/2284-1-0x00000000003C0000-0x0000000000480000-memory.dmp

              Filesize

              768KB

            • memory/2284-2-0x00000000740E0000-0x00000000747CE000-memory.dmp

              Filesize

              6.9MB

            • memory/2284-3-0x0000000000740000-0x000000000075A000-memory.dmp

              Filesize

              104KB

            • memory/2284-4-0x00000000740EE000-0x00000000740EF000-memory.dmp

              Filesize

              4KB

            • memory/2284-5-0x00000000740E0000-0x00000000747CE000-memory.dmp

              Filesize

              6.9MB

            • memory/2284-6-0x0000000005C70000-0x0000000005CFE000-memory.dmp

              Filesize

              568KB

            • memory/2284-7-0x00000000740E0000-0x00000000747CE000-memory.dmp

              Filesize

              6.9MB