Analysis

  • max time kernel
    66s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    06-02-2022 15:54

General

  • Target

    Quotation.exe

  • Size

    1.2MB

  • MD5

    ca3395b17a2f8092f2f5054a06eccbee

  • SHA1

    bbcec44150facad7ee24c6c69329456fdd4cb011

  • SHA256

    a35a739a11186937e37899ee065f6c1832f27ec88a182079f7a8f2d57884184b

  • SHA512

    738c278d8cab458fb60e93433cd4e78799898602bdb24694f2e49ee17df6c1e2c0a56697ef4e9cfda12a03a895504176e6f9c1312c0272a7937e65877acb7e48

Score
10/10

Malware Config

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Roaming\UltimateDefrag\udefrag.exe
      C:\Users\Admin\AppData\Roaming\UltimateDefrag\udefrag.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3232
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1008-147-0x000002274B3A0000-0x000002274B3A4000-memory.dmp

    Filesize

    16KB