Analysis
-
max time kernel
181s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2022 07:05
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20220812-en
General
-
Target
Quotation.exe
-
Size
1.0MB
-
MD5
7fd40d18e9804f154780cbb3d2b017d8
-
SHA1
772940d64eb308d240cd205d29c4e1c5881a96b4
-
SHA256
89af280045471592c70e1c139db75bbe28354d08370ac05dff4ea8245f2088b5
-
SHA512
1cbfe6168b30db197a140ccc3fdf9b2dbe5e63db246c734d3374c0e026863bec025f7a1f104f35e77058370203b76ee3ff805c697a74d04ba2343d722d9d1154
-
SSDEEP
12288:8OHgGPilFfoqztDiGW8E2YoFhqJLNu6n0o/rUbihaIJDk:HbiAkD08rYoFALK44bisYI
Malware Config
Extracted
formbook
nhg6
FSZGb3Of7ECMIOG9mh1ql/w=
DAPP3Pm63eo+zg==
khOZTuClxYsKQsZALgy3ob9TFAk=
5uWol2f/RF3CAwFd
P70LqPOi2iE9g4vpPH1Lk8E0K6tC
KBRl7TSt3eo+zg==
rqedJWUJXKkDbORa
lpORtIg8lvMKbJ77PQW9kes=
Qinv+gsohAIooqyTcfUYgZ/IVxQ=
J0L2ggPAiE2gxm4=
r/I6qOGI5noJCghf
khJg6HKM6l9okVK+pg==
HRMTK/6p3eo+zg==
HqMiuv2JaKYJCghf
+FzGYtsGTpK46OkKkh5C
BBrOUpUY91R/r8gkPwrcuw==
klWfn2smdNcqog581h6vX7px
t8uvr7+R7IPaHSOH1hqvX7px
bHdghkj64OjzY2hOLa/WObrRkkeJjQ==
s3/smhoylh1J0mPS4aDHBDRyJw==
Eu3Z//8qkb4Pgnxjs7KvX7px
Du/M2tykfsrvKI21BL4=
PSM470DF9TZfxg==
g8+4SOr4WukPPHaaxWhV
Wp6eQXMJ4vcGbPvJGeO4K2cjEQM=
sUu3agUQbwZBjWbTrA==
cD2jpmsR7f74LQOoiG5H
3uWfnmL43kmM0eYKkh5C
D8hIaSK6nOYyvuwKkh5C
2jukR8PuW9opgKsne71aPJfpk2rYfuk6bQ==
8Kn8jxXXsvtDzvYKkh5C
PBS059Wedb7mSnjpPdLzU7s0K6tC
/RMCOf+e9YCnIxQSu2marA==
wkO7TZc1jPoLNcOp4vUglpKzLw==
0IEGMPKlhU2gxm4=
2T8RCBr43vVVaf5I
fljAttGHXHWMq8RIqzxMpxG/r+LsFTk=
/og98Tea9nueONlLQD2egqUdkAs=
DakWt1Bc6TFTzA==
h1O9avS4iE2gxm4=
uu4WRzneVStU1w==
LsZmJl8YeP5Vaf5I
nHdkkYug/oK87Hcp0JSQyxC7qOLsFTk=
2oURQhXaNMIXkEcjayLqQmcjEQM=
NfVyM2uD3eo+zg==
nT20ZP8fheL5IiV4xhqvX7px
dbeCkGH4309r5gp24CCvX7px
72jolSNVrfj/NBu/Bn/evQ==
jGtO0Rey6DhVmKwRUtGvX7px
RPd7qXExmzSGlZHVuw==
X70pwhG0S4qZv2w=
9xPzBiP3SNEaU1KuDFRMtE3fYMons6VE
gXVziEtEmsbg/SeBwQGIoKj8tK01jw==
+B9xAkQQb+wSkhl/T08gEjAs9IugoA9I
KMgonCDitr/U/aiSc/bZdfnSjepK
belockUJb/okrNEwgBdDjsA0K6tC
FGDUFuN9k03/08Ks/bw=
nRGNPr25BpzvAXbgwJJK
7awA/seC0Uhr3dLAHB1ql/w=
glK6Uc2Mzma3/E196bQ=
O4Jwj11Xqv9IjWbTrA==
s++5zMnzj8z2aWY=
eJN2bFImkiB4xOAKkh5C
xsaRhotGVStU1w==
liuhejing.org
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Quotation.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Quotation.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Quotation.exeRegSvcs.exeraserver.exedescription pid process target process PID 5100 set thread context of 3520 5100 Quotation.exe RegSvcs.exe PID 3520 set thread context of 724 3520 RegSvcs.exe Explorer.EXE PID 3520 set thread context of 724 3520 RegSvcs.exe Explorer.EXE PID 2196 set thread context of 724 2196 raserver.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
raserver.exedescription ioc process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
RegSvcs.exepowershell.exeraserver.exepid process 3520 RegSvcs.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 444 powershell.exe 444 powershell.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 724 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
RegSvcs.exeraserver.exepid process 3520 RegSvcs.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 3520 RegSvcs.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe 2196 raserver.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
RegSvcs.exepowershell.exeExplorer.EXEraserver.exedescription pid process Token: SeDebugPrivilege 3520 RegSvcs.exe Token: SeDebugPrivilege 444 powershell.exe Token: SeShutdownPrivilege 724 Explorer.EXE Token: SeCreatePagefilePrivilege 724 Explorer.EXE Token: SeDebugPrivilege 2196 raserver.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Quotation.exeExplorer.EXEraserver.exedescription pid process target process PID 5100 wrote to memory of 444 5100 Quotation.exe powershell.exe PID 5100 wrote to memory of 444 5100 Quotation.exe powershell.exe PID 5100 wrote to memory of 444 5100 Quotation.exe powershell.exe PID 5100 wrote to memory of 4888 5100 Quotation.exe schtasks.exe PID 5100 wrote to memory of 4888 5100 Quotation.exe schtasks.exe PID 5100 wrote to memory of 4888 5100 Quotation.exe schtasks.exe PID 5100 wrote to memory of 3520 5100 Quotation.exe RegSvcs.exe PID 5100 wrote to memory of 3520 5100 Quotation.exe RegSvcs.exe PID 5100 wrote to memory of 3520 5100 Quotation.exe RegSvcs.exe PID 5100 wrote to memory of 3520 5100 Quotation.exe RegSvcs.exe PID 5100 wrote to memory of 3520 5100 Quotation.exe RegSvcs.exe PID 5100 wrote to memory of 3520 5100 Quotation.exe RegSvcs.exe PID 724 wrote to memory of 2196 724 Explorer.EXE raserver.exe PID 724 wrote to memory of 2196 724 Explorer.EXE raserver.exe PID 724 wrote to memory of 2196 724 Explorer.EXE raserver.exe PID 2196 wrote to memory of 660 2196 raserver.exe Firefox.exe PID 2196 wrote to memory of 660 2196 raserver.exe Firefox.exe PID 2196 wrote to memory of 660 2196 raserver.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UDBEbqvAJGhh.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UDBEbqvAJGhh" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC265.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC265.tmpFilesize
1KB
MD547cc3c8a7ac619461585e8c773a98561
SHA1b935fbb72fc4823e27c0f864d5b455f347b0b984
SHA2565399c9b7eb5e4a9ee124d2a63e867e4f1118e3a4374f5f7d93ad1c6565f0500a
SHA512b2b1bfb5612b0875754a44bb5211d40e013a7ef2e007235d28b681c5626ca1ca429f422cdbd7d18265fb96855ba82ab5e1da23f0b7bdaa605ff3798b4171cb9e
-
memory/444-153-0x0000000006780000-0x00000000067B2000-memory.dmpFilesize
200KB
-
memory/444-147-0x0000000005D50000-0x0000000005DB6000-memory.dmpFilesize
408KB
-
memory/444-156-0x0000000007B00000-0x000000000817A000-memory.dmpFilesize
6.5MB
-
memory/444-162-0x00000000077F0000-0x000000000780A000-memory.dmpFilesize
104KB
-
memory/444-137-0x0000000002880000-0x00000000028B6000-memory.dmpFilesize
216KB
-
memory/444-159-0x0000000007730000-0x00000000077C6000-memory.dmpFilesize
600KB
-
memory/444-158-0x0000000007520000-0x000000000752A000-memory.dmpFilesize
40KB
-
memory/444-155-0x0000000006760000-0x000000000677E000-memory.dmpFilesize
120KB
-
memory/444-157-0x00000000074B0000-0x00000000074CA000-memory.dmpFilesize
104KB
-
memory/444-143-0x0000000005390000-0x00000000059B8000-memory.dmpFilesize
6.2MB
-
memory/444-163-0x00000000077D0000-0x00000000077D8000-memory.dmpFilesize
32KB
-
memory/444-134-0x0000000000000000-mapping.dmp
-
memory/444-154-0x0000000073BA0000-0x0000000073BEC000-memory.dmpFilesize
304KB
-
memory/444-161-0x00000000076E0000-0x00000000076EE000-memory.dmpFilesize
56KB
-
memory/444-148-0x0000000005DC0000-0x0000000005E26000-memory.dmpFilesize
408KB
-
memory/444-146-0x0000000005300000-0x0000000005322000-memory.dmpFilesize
136KB
-
memory/444-152-0x00000000061B0000-0x00000000061CE000-memory.dmpFilesize
120KB
-
memory/724-151-0x00000000084E0000-0x0000000008609000-memory.dmpFilesize
1.2MB
-
memory/724-165-0x0000000008760000-0x000000000889B000-memory.dmpFilesize
1.2MB
-
memory/724-174-0x0000000008080000-0x0000000008123000-memory.dmpFilesize
652KB
-
memory/724-175-0x0000000008080000-0x0000000008123000-memory.dmpFilesize
652KB
-
memory/2196-169-0x0000000000780000-0x000000000079F000-memory.dmpFilesize
124KB
-
memory/2196-168-0x0000000000000000-mapping.dmp
-
memory/2196-170-0x0000000000410000-0x000000000043D000-memory.dmpFilesize
180KB
-
memory/2196-171-0x00000000022B0000-0x00000000025FA000-memory.dmpFilesize
3.3MB
-
memory/2196-172-0x0000000000410000-0x000000000043D000-memory.dmpFilesize
180KB
-
memory/2196-173-0x0000000002130000-0x00000000021BF000-memory.dmpFilesize
572KB
-
memory/3520-145-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3520-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3520-164-0x0000000002F10000-0x0000000002F20000-memory.dmpFilesize
64KB
-
memory/3520-141-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3520-166-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3520-167-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/3520-160-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3520-149-0x0000000001150000-0x000000000149A000-memory.dmpFilesize
3.3MB
-
memory/3520-150-0x0000000000B90000-0x0000000000BA0000-memory.dmpFilesize
64KB
-
memory/3520-138-0x0000000000000000-mapping.dmp
-
memory/3520-142-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/4888-135-0x0000000000000000-mapping.dmp
-
memory/5100-132-0x0000000074ED0000-0x0000000075481000-memory.dmpFilesize
5.7MB
-
memory/5100-144-0x0000000074ED0000-0x0000000075481000-memory.dmpFilesize
5.7MB
-
memory/5100-133-0x0000000074ED0000-0x0000000075481000-memory.dmpFilesize
5.7MB