Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 01:32
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ-1.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ-1.exe
-
Size
865KB
-
MD5
ded2efc42a4aa5529688d94318c84e14
-
SHA1
66522967e681b6dd96356997de85c47671027fe1
-
SHA256
4b9b87441ef44b226d170b760103ff694a7374805e26202822250154d3206994
-
SHA512
5e4bbf0e42d49e0c08369fe46b682e40c000e32aca85b39016c71ad1611b0d9233756e0472776a7a4c83c9e2491c343ced09f2f1c2617d5f537f78fabb982c14
-
SSDEEP
24576:ItTjLfP36gvBsU6y4spmW6Ghl2b7hN/HAT:4jLPv4spmW6G8/
Malware Config
Signatures
-
Luminosity 3 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
description ioc pid Process 1780 schtasks.exe 1716 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-1.exe -
Luminosity family
-
Executes dropped EXE 1 IoCs
pid Process 2376 java.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\java update = "cmd /c \"start \"java update\" \"C:\\Program Files (x86)\\javau\\java.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\java update = "cmd /c \"start \"java update\" \"C:\\Program Files (x86)\\javau\\java.exe\"" REG.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\javau\java.exe RFQ-1.exe File opened for modification C:\Program Files (x86)\javau\java.exe RFQ-1.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language java.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1716 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1892 RFQ-1.exe Token: SeDebugPrivilege 2376 java.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1892 RFQ-1.exe 2376 java.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1892 wrote to memory of 1780 1892 RFQ-1.exe 84 PID 1892 wrote to memory of 1780 1892 RFQ-1.exe 84 PID 1892 wrote to memory of 1780 1892 RFQ-1.exe 84 PID 2376 wrote to memory of 1716 2376 java.exe 90 PID 2376 wrote to memory of 1716 2376 java.exe 90 PID 2376 wrote to memory of 1716 2376 java.exe 90 PID 1892 wrote to memory of 5056 1892 RFQ-1.exe 106 PID 1892 wrote to memory of 5056 1892 RFQ-1.exe 106 PID 1892 wrote to memory of 5056 1892 RFQ-1.exe 106 PID 2376 wrote to memory of 4348 2376 java.exe 108 PID 2376 wrote to memory of 4348 2376 java.exe 108 PID 2376 wrote to memory of 4348 2376 java.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-1.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-1.exe"1⤵
- Luminosity
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "java update" /tr "'C:\Program Files (x86)\javau\java.exe' /startup" /sc MINUTE /f /rl highest2⤵
- Luminosity
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "java update" /d "cmd /c """start """java update""" """C:\Program Files (x86)\javau\java.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5056
-
-
C:\Program Files (x86)\javau\java.exe"C:\Program Files (x86)\javau\java.exe" /startup1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "java update" /tr "'C:\Program Files (x86)\javau\java.exe' /startup" /sc MINUTE /f /rl highest2⤵
- Luminosity
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1716
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "java update" /d "cmd /c """start """java update""" """C:\Program Files (x86)\javau\java.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4348
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
865KB
MD5ded2efc42a4aa5529688d94318c84e14
SHA166522967e681b6dd96356997de85c47671027fe1
SHA2564b9b87441ef44b226d170b760103ff694a7374805e26202822250154d3206994
SHA5125e4bbf0e42d49e0c08369fe46b682e40c000e32aca85b39016c71ad1611b0d9233756e0472776a7a4c83c9e2491c343ced09f2f1c2617d5f537f78fabb982c14