Analysis
-
max time kernel
111s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 15:39
Static task
static1
Behavioral task
behavioral1
Sample
Revised Quotation & COA_jpg.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Revised Quotation & COA_jpg.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
Revised Quotation & COA_jpg.exe
-
Size
551KB
-
MD5
fce9b050476d555a64ce0522191d1f4a
-
SHA1
4c34b842888ba0c8f80fdba42055281c18e995f3
-
SHA256
07569721866b0b2b3d83ec0db9d400f9cd623c51ea30706aaef9e032ec64795e
-
SHA512
c6ffe706492a009e214e6b6c256bf41406e217a93c9aa9e898b71ea66428c545bb4420f314d7781e9321e9095d678c6440fe4bb12bd8c629a9819e9effc32247
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Revised Quotation & COA_jpg.exepid process 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe 2940 Revised Quotation & COA_jpg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Revised Quotation & COA_jpg.exedescription pid process Token: SeDebugPrivilege 2940 Revised Quotation & COA_jpg.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Revised Quotation & COA_jpg.exedescription pid process target process PID 2940 wrote to memory of 2736 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 2736 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 2736 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 680 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 680 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 680 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 988 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 988 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 988 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 608 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 608 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 608 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 404 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 404 2940 Revised Quotation & COA_jpg.exe vbc.exe PID 2940 wrote to memory of 404 2940 Revised Quotation & COA_jpg.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Revised Quotation & COA_jpg.exe"C:\Users\Admin\AppData\Local\Temp\Revised Quotation & COA_jpg.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2940-118-0x0000000000210000-0x00000000002A0000-memory.dmpFilesize
576KB
-
memory/2940-119-0x0000000004EE0000-0x00000000053DE000-memory.dmpFilesize
5.0MB
-
memory/2940-120-0x0000000004AD0000-0x0000000004B62000-memory.dmpFilesize
584KB
-
memory/2940-121-0x0000000004C30000-0x0000000004C3A000-memory.dmpFilesize
40KB
-
memory/2940-122-0x00000000049E0000-0x0000000004EDE000-memory.dmpFilesize
5.0MB
-
memory/2940-123-0x0000000006E80000-0x0000000006E8C000-memory.dmpFilesize
48KB
-
memory/2940-124-0x00000000071C0000-0x000000000725C000-memory.dmpFilesize
624KB
-
memory/2940-125-0x0000000007370000-0x00000000073D2000-memory.dmpFilesize
392KB