Analysis
-
max time kernel
79s -
max time network
23s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-02-2022 15:31
Static task
static1
Behavioral task
behavioral1
Sample
RequestORDERQuote.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
RequestORDERQuote.exe
-
Size
2.3MB
-
MD5
3f02190df38e5dadd7e1b694f547c539
-
SHA1
32769a00df7264940c155f9a2222812e0fbf86be
-
SHA256
91b24eab863880a23663f812e043b6b83dab1e658b234b1b98521e28071527b9
-
SHA512
5068205c43a7fc49fb1b0e1b48526181355e0af091b2086ab35e37a60dbb8d3136f5325b7b614402a9f52515a08e67d5255b195b71a5c5e5332a24098a9b24da
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
RequestORDERQuote.exepid process 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe 1316 RequestORDERQuote.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RequestORDERQuote.exedescription pid process Token: SeDebugPrivilege 1316 RequestORDERQuote.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
RequestORDERQuote.exedescription pid process target process PID 1316 wrote to memory of 964 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 964 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 964 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 964 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1592 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1592 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1592 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1592 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1516 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1516 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1516 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1516 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1604 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1604 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1604 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1604 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 876 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 876 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 876 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 876 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1792 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1792 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1792 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1792 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1744 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1744 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1744 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1744 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1384 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1384 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1384 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 1384 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 660 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 660 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 660 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 660 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 556 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 556 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 556 1316 RequestORDERQuote.exe RequestORDERQuote.exe PID 1316 wrote to memory of 556 1316 RequestORDERQuote.exe RequestORDERQuote.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe"C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exeC:\Users\Admin\AppData\Local\Temp\RequestORDERQuote.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1316-54-0x0000000000380000-0x00000000005D2000-memory.dmpFilesize
2.3MB
-
memory/1316-55-0x0000000075471000-0x0000000075473000-memory.dmpFilesize
8KB
-
memory/1316-56-0x0000000002700000-0x0000000004810000-memory.dmpFilesize
33.1MB
-
memory/1316-57-0x0000000000280000-0x000000000028A000-memory.dmpFilesize
40KB
-
memory/1316-58-0x0000000000980000-0x00000000009FC000-memory.dmpFilesize
496KB
-
memory/1316-59-0x0000000000340000-0x0000000000384000-memory.dmpFilesize
272KB