Analysis
-
max time kernel
66s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-02-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
Quotation.exe
-
Size
1.2MB
-
MD5
ca3395b17a2f8092f2f5054a06eccbee
-
SHA1
bbcec44150facad7ee24c6c69329456fdd4cb011
-
SHA256
a35a739a11186937e37899ee065f6c1832f27ec88a182079f7a8f2d57884184b
-
SHA512
738c278d8cab458fb60e93433cd4e78799898602bdb24694f2e49ee17df6c1e2c0a56697ef4e9cfda12a03a895504176e6f9c1312c0272a7937e65877acb7e48
Malware Config
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule family_babadeda behavioral2/files/0x000700000001e7d1-134.dat family_babadeda -
Executes dropped EXE 1 IoCs
pid Process 3232 udefrag.exe -
Loads dropped DLL 1 IoCs
pid Process 3232 udefrag.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1008 svchost.exe Token: SeCreatePagefilePrivilege 1008 svchost.exe Token: SeShutdownPrivilege 1008 svchost.exe Token: SeCreatePagefilePrivilege 1008 svchost.exe Token: SeShutdownPrivilege 1008 svchost.exe Token: SeCreatePagefilePrivilege 1008 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3232 3588 Quotation.exe 82 PID 3588 wrote to memory of 3232 3588 Quotation.exe 82 PID 3588 wrote to memory of 3232 3588 Quotation.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Roaming\UltimateDefrag\udefrag.exeC:\Users\Admin\AppData\Roaming\UltimateDefrag\udefrag.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3232
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1008