Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
26-02-2021 08:17
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
Request for Quotation.exe
-
Size
500KB
-
MD5
1d9fd84bc6eaa80b160bd313750f6ff5
-
SHA1
011e1975d6cb6a567ad3fed83d59310728bd9227
-
SHA256
1df6109d033a42d97b34133e69afc0da679586b85b6614b034ebfd9343062d20
-
SHA512
d66d0a83284f6f21e711c3d62bcd280042d6a50125dc410b4c79d6f6dba7be5b6bd628fb21e6491b2bb291770f6d1c3951257e948dcbbb587e397fc75296a8da
Score
9/10
Malware Config
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral1/memory/2004-6-0x0000000004AE0000-0x0000000004B3E000-memory.dmp beds_protector -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Request for Quotation.exepid process 2004 Request for Quotation.exe 2004 Request for Quotation.exe 2004 Request for Quotation.exe 2004 Request for Quotation.exe 2004 Request for Quotation.exe 2004 Request for Quotation.exe 2004 Request for Quotation.exe 2004 Request for Quotation.exe 2004 Request for Quotation.exe 2004 Request for Quotation.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Request for Quotation.exedescription pid process Token: SeDebugPrivilege 2004 Request for Quotation.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Request for Quotation.exedescription pid process target process PID 2004 wrote to memory of 1604 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 1604 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 1604 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 1604 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 484 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 484 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 484 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 484 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 1096 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 1096 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 1096 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 1096 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 752 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 752 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 752 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 752 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 340 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 340 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 340 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 340 2004 Request for Quotation.exe Request for Quotation.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2004-2-0x0000000073AF0000-0x00000000741DE000-memory.dmpFilesize
6.9MB
-
memory/2004-3-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2004-5-0x0000000075EA1000-0x0000000075EA3000-memory.dmpFilesize
8KB
-
memory/2004-6-0x0000000004AE0000-0x0000000004B3E000-memory.dmpFilesize
376KB
-
memory/2004-7-0x00000000002A0000-0x00000000002AF000-memory.dmpFilesize
60KB
-
memory/2004-8-0x0000000001F70000-0x0000000001F71000-memory.dmpFilesize
4KB