Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-02-2021 23:12
Static task
static1
Behavioral task
behavioral1
Sample
Quote.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Quote.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
Quote.exe
-
Size
233KB
-
MD5
a96067cac28b1f5c3de4e1b6c7d0a402
-
SHA1
51c65c8ece4bfd5c7d1b09105440f3f02d3b14ca
-
SHA256
79e70809a85e291f9da3d391131208ce7645dd512eb6bb71811154b43da23222
-
SHA512
1627058a9a884965bce4ece1ccf03c24a849cd79fe883c923ae2eb56c8e0bbb730cf823e550c080685af1f906a38f2847a65dc8ed236181d97eee9ddcfc3f96e
Score
10/10
Malware Config
Extracted
Family
remcos
C2
103.89.88.238:4299
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1096 Quote.exe 1096 Quote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz = "C:\\Users\\Admin\\AppData\\Roaming\\abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstu" Quote.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 1040 1096 Quote.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1096 Quote.exe 1096 Quote.exe 1096 Quote.exe 1096 Quote.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1096 Quote.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1040 Quote.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1040 1096 Quote.exe 26 PID 1096 wrote to memory of 1040 1096 Quote.exe 26 PID 1096 wrote to memory of 1040 1096 Quote.exe 26 PID 1096 wrote to memory of 1040 1096 Quote.exe 26 PID 1096 wrote to memory of 1040 1096 Quote.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote.exe"C:\Users\Admin\AppData\Local\Temp\Quote.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Quote.exe"C:\Users\Admin\AppData\Local\Temp\Quote.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1040
-