Resubmissions
11/10/2022, 21:50
221011-1qah4agacq 1011/10/2022, 19:59
221011-yqhtcscbgk 1011/10/2022, 19:33
221011-x9v3csbeb8 1011/10/2022, 19:30
221011-x71j3abdc9 1011/10/2022, 17:12
221011-vq4t2sfccr 1011/10/2022, 17:06
221011-vmnzesfahq 10Analysis
-
max time kernel
250s -
max time network
513s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
quote.exe
Resource
win10v2004-20220812-en
General
-
Target
quote.exe
-
Size
310KB
-
MD5
bd8e7774e8a6ecb128344f67a186de29
-
SHA1
bb8f6320dbbe179952aefed8ad37678a97385c8c
-
SHA256
4d98cc89b7f976334ec2df4964679ae40ce2efa5e0ea93e44a88cd832e122daf
-
SHA512
28663d4fc87dc2c4c529b3ea8a27fc8f2c38bf34600ae1ff594da428fbb140cb2dab31ec219a75ed3814b74f0a7c64d03d48fc5aee451a2faf1dfcb27dba1069
-
SSDEEP
6144:xB+pqUQLU87hsR0qW6IqiQ928gJzoQRT0uAg67asMexycpMFX59F7MfZUSi2XxKL:xgKL2i0uAxasM2W55D4f+xOVn4uoF
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 4860 quote.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Metage\Jansi\Koensfordeling.Kat quote.exe File created C:\Windows\resources\0409\telefoncomputerens\Freespace\Tnkest.lnk quote.exe File opened for modification C:\Windows\resources\0409\Metage\Jansi\Koensfordeling.Kat quote.exe File created C:\Windows\resources\0409\telefoncomputerens\Freespace\Tnkest.lnk quote.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 1452 NOTEPAD.EXE 3336 NOTEPAD.EXE 2472 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2452 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe 2452 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2472 2452 OpenWith.exe 99 PID 2452 wrote to memory of 2472 2452 OpenWith.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\quote.exe"C:\Users\Admin\AppData\Local\Temp\quote.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4860
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Roseen.ini1⤵
- Opens file in notepad (likely ransom note)
PID:1452
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2068
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI50E6.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3336
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\3639446144\payload.dat2⤵
- Opens file in notepad (likely ransom note)
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\quote.exe"C:\Users\Admin\AppData\Local\Temp\quote.exe"1⤵
- Drops file in Windows directory
PID:1104
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\quote\" -spe -an -ai#7zMap25380:90:7zEvent47591⤵PID:3576
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\quote.exe"C:\Users\Admin\AppData\Local\Temp\quote.exe"1⤵PID:3528
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:4064
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:1960
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:2132
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:2728
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:3664
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:1920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD5ac4c36f2c499a9fcc9474b57984ce8cb
SHA135568b81bcb7d36e1a78d64159181e7583d2a60b
SHA256589f39d7746b71a2d3e4943359306eb09339ebd732c0f9e6b26ce479babe6626
SHA512ef44aca87bb5f40644322baadb2ef76067a9a20b195f15cbee0874175859d676c4b435594d517841036119ff05c660ae0d1d291d45cb8495611b2c113e25ac96
-
Filesize
37B
MD5ac4c36f2c499a9fcc9474b57984ce8cb
SHA135568b81bcb7d36e1a78d64159181e7583d2a60b
SHA256589f39d7746b71a2d3e4943359306eb09339ebd732c0f9e6b26ce479babe6626
SHA512ef44aca87bb5f40644322baadb2ef76067a9a20b195f15cbee0874175859d676c4b435594d517841036119ff05c660ae0d1d291d45cb8495611b2c113e25ac96
-
Filesize
11KB
MD50ff2d70cfdc8095ea99ca2dabbec3cd7
SHA110c51496d37cecd0e8a503a5a9bb2329d9b38116
SHA256982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b
SHA512cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e
-
Filesize
7KB
MD5215488615bf9caaaf1ed7bf3f4b27040
SHA1900c920b8acb5863b0232beeccc8a7410d6d2594
SHA2569a58b1de4758b9a50e234b4ad43f83084d50a2c88cf72d1137d48f6c08f817ca
SHA5125045b22ff540c4f484cf47b1c5e400b3e09c163c47f7ad3e3ea4cf1c99681f5ba609abe0a0e444785d2a9cd2c3c094394cffdeb6a83417b0b61f3aa30caaf36f
-
Filesize
245KB
MD5a5f553fe2354b86a139c486a8af21420
SHA19295c43f4e663f1b71216d005f60d9f6ed569fe9
SHA2564823dc537f339605a6187329030e9b3c41f9b68d3082a95147110664005e5b89
SHA512d5feb8f90c785d45e70ffb78b04fa3952de6ec599bc9da3d7201e2bf317a8d85af11450e2a21bf0b1272c66f45f35cbf72f57f0d9a829abb26f537709b8de5e1
-
C:\Users\Admin\Videos\Afflictively\Unemotive\Rigeligere\System.Runtime.InteropServices.RuntimeInformation.dll
Filesize30KB
MD5a2f188229b138cdce957aae022dc7c14
SHA13bc3d43edd42ff6ad09dbf769abc3557a233867a
SHA256923cb219e7b1ac5ff17630cf36d21f6ea2de116625c2801a9ac2788d0e59e7cc
SHA512401a691c3e6cc8205bb78fe7a2958b9657c3efe0dbeb97f0a8402e7f2927e21da094ef91c96e464b06381cf741ca09aca8902f418df6cf79374f6f4c4104d594