Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
25-01-2021 19:03
Static task
static1
Behavioral task
behavioral1
Sample
Quote#SO2021010197.pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Quote#SO2021010197.pdf.exe
Resource
win10v20201028
General
-
Target
Quote#SO2021010197.pdf.exe
-
Size
1.5MB
-
MD5
104064d4c0b681c9a7ae1f0c00fbff49
-
SHA1
af273bc182f0c492520811da54165534dcf89967
-
SHA256
5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a
-
SHA512
2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225
Malware Config
Extracted
remcos
91.193.75.185:1989
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
Quote#SO2021010197.pdf.exesystem32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Quote#SO2021010197.pdf.exe\"" Quote#SO2021010197.pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Programs\\system32.exe\"" system32.exe -
Executes dropped EXE 3 IoCs
Processes:
system32.exesystem32.exesystem32.exepid process 1840 system32.exe 1804 system32.exe 1616 system32.exe -
Drops startup file 4 IoCs
Processes:
Quote#SO2021010197.pdf.exesystem32.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe system32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe system32.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1460 cmd.exe 1460 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Quote#SO2021010197.pdf.exesystem32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Quote#SO2021010197.pdf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Quote#SO2021010197.pdf.exe" Quote#SO2021010197.pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\system32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Programs\\system32.exe" system32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetThreadContext 5 IoCs
Processes:
Quote#SO2021010197.pdf.exeQuote#SO2021010197.pdf.exesystem32.exesystem32.exesystem32.exedescription pid process target process PID 1152 set thread context of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 set thread context of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1840 set thread context of 1804 1840 system32.exe system32.exe PID 1804 set thread context of 1616 1804 system32.exe system32.exe PID 1616 set thread context of 1708 1616 system32.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Quote#SO2021010197.pdf.exepid process 1828 Quote#SO2021010197.pdf.exe 1828 Quote#SO2021010197.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Quote#SO2021010197.pdf.exedescription pid process Token: SeDebugPrivilege 1828 Quote#SO2021010197.pdf.exe -
Suspicious use of WriteProcessMemory 65 IoCs
Processes:
Quote#SO2021010197.pdf.exeQuote#SO2021010197.pdf.exeQuote#SO2021010197.pdf.exeWScript.execmd.exesystem32.exesystem32.exesystem32.exedescription pid process target process PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1152 wrote to memory of 1828 1152 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1008 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1008 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1008 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1008 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1828 wrote to memory of 1120 1828 Quote#SO2021010197.pdf.exe Quote#SO2021010197.pdf.exe PID 1120 wrote to memory of 664 1120 Quote#SO2021010197.pdf.exe WScript.exe PID 1120 wrote to memory of 664 1120 Quote#SO2021010197.pdf.exe WScript.exe PID 1120 wrote to memory of 664 1120 Quote#SO2021010197.pdf.exe WScript.exe PID 1120 wrote to memory of 664 1120 Quote#SO2021010197.pdf.exe WScript.exe PID 664 wrote to memory of 1460 664 WScript.exe cmd.exe PID 664 wrote to memory of 1460 664 WScript.exe cmd.exe PID 664 wrote to memory of 1460 664 WScript.exe cmd.exe PID 664 wrote to memory of 1460 664 WScript.exe cmd.exe PID 1460 wrote to memory of 1840 1460 cmd.exe system32.exe PID 1460 wrote to memory of 1840 1460 cmd.exe system32.exe PID 1460 wrote to memory of 1840 1460 cmd.exe system32.exe PID 1460 wrote to memory of 1840 1460 cmd.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1840 wrote to memory of 1804 1840 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1804 wrote to memory of 1616 1804 system32.exe system32.exe PID 1616 wrote to memory of 1708 1616 system32.exe svchost.exe PID 1616 wrote to memory of 1708 1616 system32.exe svchost.exe PID 1616 wrote to memory of 1708 1616 system32.exe svchost.exe PID 1616 wrote to memory of 1708 1616 system32.exe svchost.exe PID 1616 wrote to memory of 1708 1616 system32.exe svchost.exe PID 1616 wrote to memory of 1708 1616 system32.exe svchost.exe PID 1616 wrote to memory of 1708 1616 system32.exe svchost.exe PID 1616 wrote to memory of 1708 1616 system32.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"3⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Roaming\Programs\system32.exeC:\Users\Admin\AppData\Roaming\Programs\system32.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\Programs\system32.exe"C:\Users\Admin\AppData\Roaming\Programs\system32.exe"7⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Roaming\Programs\system32.exe"C:\Users\Admin\AppData\Roaming\Programs\system32.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe9⤵PID:1708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
139d1ffe3f418f4794b6359f239089a2
SHA1579f8d9c97105a2a77566de7e802a26e4a27f4c8
SHA2567c71958fda4cff7e2ae1d9309cd4c0143057ca52732926f640252fd5a7a9a2ca
SHA5125b806812558c28ea195326cfe800a2a41377d5e1da1fb352c2aa3d5060237a5ba544dec6f52459a9ecf55b526280c7d9c6aa8a1b8544124b288a4235eb25c2d9
-
MD5
104064d4c0b681c9a7ae1f0c00fbff49
SHA1af273bc182f0c492520811da54165534dcf89967
SHA2565705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a
SHA5122e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225
-
MD5
104064d4c0b681c9a7ae1f0c00fbff49
SHA1af273bc182f0c492520811da54165534dcf89967
SHA2565705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a
SHA5122e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225
-
MD5
104064d4c0b681c9a7ae1f0c00fbff49
SHA1af273bc182f0c492520811da54165534dcf89967
SHA2565705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a
SHA5122e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225
-
MD5
104064d4c0b681c9a7ae1f0c00fbff49
SHA1af273bc182f0c492520811da54165534dcf89967
SHA2565705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a
SHA5122e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225
-
MD5
104064d4c0b681c9a7ae1f0c00fbff49
SHA1af273bc182f0c492520811da54165534dcf89967
SHA2565705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a
SHA5122e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225
-
MD5
104064d4c0b681c9a7ae1f0c00fbff49
SHA1af273bc182f0c492520811da54165534dcf89967
SHA2565705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a
SHA5122e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225