Analysis
-
max time kernel
91s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:47
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Quotation.exe
Resource
win10v2004-20220414-en
General
-
Target
Quotation.exe
-
Size
761KB
-
MD5
82a8dd7c9cb60f7f27a3187735fe0e70
-
SHA1
64db00701378728d6bfa898795922017b3c39bcb
-
SHA256
f9eb2b428ced4131d2846e50d56e87302b6b7ff986c6c524c55d5cef53111d2e
-
SHA512
cd8939f5a729bd430644a074a4bc0792277843feb72e7cb47f8f7a46b0497381cb5354486b7dc4d9cceb0dbd0e6a78a08e7a768a8ebeb3c564fe11c74e05ed90
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1352-134-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Quotation.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation Quotation.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Quotation.exedescription pid process target process PID 3764 set thread context of 1352 3764 Quotation.exe Quotation.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dw20.exedescription pid process Token: SeBackupPrivilege 2412 dw20.exe Token: SeBackupPrivilege 2412 dw20.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Quotation.exeQuotation.exedescription pid process target process PID 3764 wrote to memory of 1768 3764 Quotation.exe schtasks.exe PID 3764 wrote to memory of 1768 3764 Quotation.exe schtasks.exe PID 3764 wrote to memory of 1768 3764 Quotation.exe schtasks.exe PID 3764 wrote to memory of 1352 3764 Quotation.exe Quotation.exe PID 3764 wrote to memory of 1352 3764 Quotation.exe Quotation.exe PID 3764 wrote to memory of 1352 3764 Quotation.exe Quotation.exe PID 3764 wrote to memory of 1352 3764 Quotation.exe Quotation.exe PID 3764 wrote to memory of 1352 3764 Quotation.exe Quotation.exe PID 3764 wrote to memory of 1352 3764 Quotation.exe Quotation.exe PID 3764 wrote to memory of 1352 3764 Quotation.exe Quotation.exe PID 3764 wrote to memory of 1352 3764 Quotation.exe Quotation.exe PID 1352 wrote to memory of 2412 1352 Quotation.exe dw20.exe PID 1352 wrote to memory of 2412 1352 Quotation.exe dw20.exe PID 1352 wrote to memory of 2412 1352 Quotation.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jKyhYdgyjTlQP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9D6D.tmp"2⤵
- Creates scheduled task(s)
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7563⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581B
MD5fb7ca783de5c0f0d7e7c7cdee64542b5
SHA125aab766c326e43d03ae94a7409b3512dd17d516
SHA25647fc53ff728224a600a0e80d49e56a224479589d7ed914c6312fec93dad0c3ef
SHA5122694aea7a5b4998b03ced645003be53152aaa3b31069f0525263fb8b170753a2677acb5a16e84249a070a4a249c52c5520a0c3dad22eca6862fce32adddd155b
-
Filesize
1KB
MD53200d3c06c138323304d7b87fbd48d5a
SHA1d1ae3535de00cd3e678cd90dd7cc885d10c6d577
SHA256146f44fd496af3da682442d0d8e9ae4ace46b4bc7f39c0dafc93a6792e0a26ee
SHA512a0c5f78e90dc384da6c2a07ebacae8410c06f0a941814cc6d47785261035d8aa813b8899a256753ad849657257daa94fbffa6b6cdf97616c169c03700bc2a7ee