Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 01:38
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ-1.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ-1.exe
-
Size
865KB
-
MD5
ded2efc42a4aa5529688d94318c84e14
-
SHA1
66522967e681b6dd96356997de85c47671027fe1
-
SHA256
4b9b87441ef44b226d170b760103ff694a7374805e26202822250154d3206994
-
SHA512
5e4bbf0e42d49e0c08369fe46b682e40c000e32aca85b39016c71ad1611b0d9233756e0472776a7a4c83c9e2491c343ced09f2f1c2617d5f537f78fabb982c14
-
SSDEEP
24576:ItTjLfP36gvBsU6y4spmW6Ghl2b7hN/HAT:4jLPv4spmW6G8/
Malware Config
Signatures
-
Luminosity 3 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-1.exe 1956 schtasks.exe 1268 schtasks.exe -
Luminosity family
-
Executes dropped EXE 1 IoCs
pid Process 1680 java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\java update = "cmd /c \"start \"java update\" \"C:\\Program Files (x86)\\javau\\java.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\java update = "cmd /c \"start \"java update\" \"C:\\Program Files (x86)\\javau\\java.exe\"" REG.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\javau\java.exe RFQ-1.exe File opened for modification C:\Program Files (x86)\javau\java.exe RFQ-1.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language java.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1268 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3024 RFQ-1.exe Token: SeDebugPrivilege 1680 java.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3024 RFQ-1.exe 1680 java.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1956 3024 RFQ-1.exe 94 PID 3024 wrote to memory of 1956 3024 RFQ-1.exe 94 PID 3024 wrote to memory of 1956 3024 RFQ-1.exe 94 PID 1680 wrote to memory of 1268 1680 java.exe 102 PID 1680 wrote to memory of 1268 1680 java.exe 102 PID 1680 wrote to memory of 1268 1680 java.exe 102 PID 3024 wrote to memory of 4272 3024 RFQ-1.exe 107 PID 3024 wrote to memory of 4272 3024 RFQ-1.exe 107 PID 3024 wrote to memory of 4272 3024 RFQ-1.exe 107 PID 1680 wrote to memory of 2968 1680 java.exe 110 PID 1680 wrote to memory of 2968 1680 java.exe 110 PID 1680 wrote to memory of 2968 1680 java.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-1.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-1.exe"1⤵
- Luminosity
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "java update" /tr "'C:\Program Files (x86)\javau\java.exe' /startup" /sc MINUTE /f /rl highest2⤵
- Luminosity
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "java update" /d "cmd /c """start """java update""" """C:\Program Files (x86)\javau\java.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Program Files (x86)\javau\java.exe"C:\Program Files (x86)\javau\java.exe" /startup1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "java update" /tr "'C:\Program Files (x86)\javau\java.exe' /startup" /sc MINUTE /f /rl highest2⤵
- Luminosity
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1268
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "java update" /d "cmd /c """start """java update""" """C:\Program Files (x86)\javau\java.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
865KB
MD5ded2efc42a4aa5529688d94318c84e14
SHA166522967e681b6dd96356997de85c47671027fe1
SHA2564b9b87441ef44b226d170b760103ff694a7374805e26202822250154d3206994
SHA5125e4bbf0e42d49e0c08369fe46b682e40c000e32aca85b39016c71ad1611b0d9233756e0472776a7a4c83c9e2491c343ced09f2f1c2617d5f537f78fabb982c14