Analysis
-
max time kernel
130s -
max time network
93s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07-07-2020 12:54
Static task
static1
Behavioral task
behavioral1
Sample
Quotation 98878.Scan.exe
Resource
win7
Behavioral task
behavioral2
Sample
Quotation 98878.Scan.exe
Resource
win10v200430
General
-
Target
Quotation 98878.Scan.exe
-
Size
634KB
-
MD5
883f310e3695dd1c848ff1fd53d3cd3d
-
SHA1
a870f3ae9d2bc9c5863604f5b714d3421b1b4fce
-
SHA256
6b35aa643ec1006130a3ad1cdebb98e94e7f2f51ba75603e6e5887d4d487fd5a
-
SHA512
38c7d4a7bb0adea89cbbb08d01a986bcb517e2925146fe515ee46f9479d2c2cc73b00ae88ca8a83cd6a1829f2d2d495b752121fe239a3d70a8100c94ddf9d3b8
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2860 Quotation 98878.Scan.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2860 Quotation 98878.Scan.exe 2860 Quotation 98878.Scan.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2860 Quotation 98878.Scan.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 908 wrote to memory of 2508 908 Quotation 98878.Scan.exe 72 PID 908 wrote to memory of 2508 908 Quotation 98878.Scan.exe 72 PID 908 wrote to memory of 2508 908 Quotation 98878.Scan.exe 72 PID 908 wrote to memory of 2860 908 Quotation 98878.Scan.exe 74 PID 908 wrote to memory of 2860 908 Quotation 98878.Scan.exe 74 PID 908 wrote to memory of 2860 908 Quotation 98878.Scan.exe 74 PID 908 wrote to memory of 2860 908 Quotation 98878.Scan.exe 74 PID 908 wrote to memory of 2860 908 Quotation 98878.Scan.exe 74 PID 908 wrote to memory of 2860 908 Quotation 98878.Scan.exe 74 PID 908 wrote to memory of 2860 908 Quotation 98878.Scan.exe 74 PID 908 wrote to memory of 2860 908 Quotation 98878.Scan.exe 74 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 908 set thread context of 2860 908 Quotation 98878.Scan.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation 98878.Scan.exe"C:\Users\Admin\AppData\Local\Temp\Quotation 98878.Scan.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:908 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BbcxaIWtqd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9541.tmp"2⤵
- Creates scheduled task(s)
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation 98878.Scan.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2860
-