Analysis
-
max time kernel
151s -
max time network
143s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-04-2021 02:24
Static task
static1
Behavioral task
behavioral1
Sample
REQUEST FOR QUOTATION - PR30016810.exe
Resource
win7v20210408
General
-
Target
REQUEST FOR QUOTATION - PR30016810.exe
-
Size
1.2MB
-
MD5
ff100e2d9f8b2f265f22f164d67d83d6
-
SHA1
ddeec70d99fcaa98db7f417ad5fc2fa724b0c252
-
SHA256
c85d33153d768a2f98066c8ba07e58890cbac4c185e4ef45739fb03750e1088b
-
SHA512
0030f38b15e4f455ff970a433e1428eff4511665a417ebc264ae19ea2be5ceda369cbc1d60bb914280d3a8e4b2dffd2c37e93a4362ce39b1bbe5d83418d593fc
Malware Config
Extracted
remcos
103.89.88.238:4292
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
REQUEST FOR QUOTATION - PR30016810.exedescription pid process target process PID 1640 set thread context of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
REQUEST FOR QUOTATION - PR30016810.exepid process 1640 REQUEST FOR QUOTATION - PR30016810.exe 1640 REQUEST FOR QUOTATION - PR30016810.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
REQUEST FOR QUOTATION - PR30016810.exedescription pid process Token: SeDebugPrivilege 1640 REQUEST FOR QUOTATION - PR30016810.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
REQUEST FOR QUOTATION - PR30016810.exepid process 1592 REQUEST FOR QUOTATION - PR30016810.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
REQUEST FOR QUOTATION - PR30016810.exedescription pid process target process PID 1640 wrote to memory of 396 1640 REQUEST FOR QUOTATION - PR30016810.exe schtasks.exe PID 1640 wrote to memory of 396 1640 REQUEST FOR QUOTATION - PR30016810.exe schtasks.exe PID 1640 wrote to memory of 396 1640 REQUEST FOR QUOTATION - PR30016810.exe schtasks.exe PID 1640 wrote to memory of 396 1640 REQUEST FOR QUOTATION - PR30016810.exe schtasks.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe PID 1640 wrote to memory of 1592 1640 REQUEST FOR QUOTATION - PR30016810.exe REQUEST FOR QUOTATION - PR30016810.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION - PR30016810.exe"C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION - PR30016810.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mSizPqyiUZWldD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFDEE.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION - PR30016810.exe"C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION - PR30016810.exe"2⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpFDEE.tmpMD5
7e82f867493c8209e13c4b9ce64f48ad
SHA1ad52fe373935fd2dc2c945c037d812a0e9ffeb39
SHA256d7c64b8321e848f86b5c687314113eb6f3a03f1af784507ae90cc8b6dfba836e
SHA512044165ae5c8a648ff2fdf37d99ff995176f984b0f822771685f75a7798a1ab2f50ccc5e32ff6074a11915aab903956d2debbf11038979d9de14303d4b9d6bfa9
-
memory/396-65-0x0000000000000000-mapping.dmp
-
memory/1592-68-0x000000000042EEEF-mapping.dmp
-
memory/1592-67-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/1592-69-0x00000000769B1000-0x00000000769B3000-memory.dmpFilesize
8KB
-
memory/1592-70-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/1640-59-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/1640-61-0x0000000004ED0000-0x0000000004ED1000-memory.dmpFilesize
4KB
-
memory/1640-62-0x0000000000360000-0x0000000000366000-memory.dmpFilesize
24KB
-
memory/1640-63-0x0000000005190000-0x000000000523E000-memory.dmpFilesize
696KB
-
memory/1640-64-0x0000000002220000-0x0000000002297000-memory.dmpFilesize
476KB