Analysis
-
max time kernel
121s -
max time network
158s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-12-2021 10:56
Static task
static1
Behavioral task
behavioral1
Sample
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe
Resource
win10-en-20211208
General
-
Target
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe
-
Size
1.1MB
-
MD5
1bad21957abf5597d295ed971faf1ffc
-
SHA1
a72a8de5dcdcf6d7b71e932c482cfa69d81ff28d
-
SHA256
97ccd53d7d9abd378152b48894064f0c226d40a40a19f9ca485bbf5c062d02ca
-
SHA512
3101c0680c088575e1bf0835b2d2ad3d545cfb20360e163f3d81af02edc73ea72d3e24e30cb91aadb3db9d05267d21245ab2c8a21686e64ed9321ee4e09682a9
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337 = "C:\\Users\\Admin\\AppData\\Roaming\\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337.exe" iexplore.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe -
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
iexplore.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts iexplore.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337 = "C:\\Users\\Admin\\AppData\\Roaming\\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337 = "C:\\Users\\Admin\\AppData\\Roaming\\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe -
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exeExpo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exeiexplore.exedescription pid process target process PID 944 set thread context of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 1124 set thread context of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 364 set thread context of 296 364 iexplore.exe iexplore.exe PID 364 set thread context of 1092 364 iexplore.exe iexplore.exe PID 364 set thread context of 1084 364 iexplore.exe iexplore.exe PID 364 set thread context of 1372 364 iexplore.exe iexplore.exe PID 364 set thread context of 1940 364 iexplore.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exepid process 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
iexplore.exeiexplore.exedescription pid process Token: SeDebugPrivilege 364 iexplore.exe Token: SeDebugPrivilege 296 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exeiexplore.exepid process 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe 364 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exeExpo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exeiexplore.exedescription pid process target process PID 944 wrote to memory of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 944 wrote to memory of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 944 wrote to memory of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 944 wrote to memory of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 944 wrote to memory of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 944 wrote to memory of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 944 wrote to memory of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 944 wrote to memory of 1124 944 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 1124 wrote to memory of 364 1124 Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 296 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1092 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1084 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1372 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe PID 364 wrote to memory of 1940 364 iexplore.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe"C:\Users\Admin\AppData\Local\Temp\Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe"C:\Users\Admin\AppData\Local\Temp\Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1124 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\Expo_REQUEST FOR QUOTATION 2021-0912.PDF(79KB).exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\uujdbmzqb0.txt"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:296 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\uujdbmzqb1.txt"4⤵
- Accesses Microsoft Outlook accounts
PID:1092 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\uujdbmzqb2.txt"4⤵PID:1084
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\uujdbmzqb3.txt"4⤵PID:1372
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\uujdbmzqb4.txt"4⤵PID:1940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\uujdbmzqb2.txtMD5
f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\A1F5W2I0-X6V4-A4D3-L3U1-J445Y8L0L337\uujdbmzqb4.txtMD5
f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
memory/296-68-0x0000000000423BC0-mapping.dmp
-
memory/364-67-0x0000000000401364-mapping.dmp
-
memory/944-56-0x0000000076911000-0x0000000076913000-memory.dmpFilesize
8KB
-
memory/944-57-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/944-58-0x0000000000540000-0x0000000000547000-memory.dmpFilesize
28KB
-
memory/944-59-0x00000000080E0000-0x00000000081F9000-memory.dmpFilesize
1.1MB
-
memory/944-54-0x0000000000E60000-0x0000000000E61000-memory.dmpFilesize
4KB
-
memory/1084-70-0x0000000000442F04-mapping.dmp
-
memory/1092-69-0x0000000000411654-mapping.dmp
-
memory/1124-60-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1124-66-0x0000000000100000-0x000000000010A000-memory.dmpFilesize
40KB
-
memory/1124-65-0x0000000000100000-0x0000000000106000-memory.dmpFilesize
24KB
-
memory/1124-63-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1124-64-0x00000000004010B8-mapping.dmp
-
memory/1124-62-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1124-61-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1372-72-0x0000000000413750-mapping.dmp
-
memory/1940-73-0x000000000040C2A8-mapping.dmp