Analysis
-
max time kernel
189s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2022 15:18
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20220812-en
General
-
Target
Quotation.exe
-
Size
603KB
-
MD5
bd50419823213f1f7b3a8e74b051b379
-
SHA1
be3166a203ccbf1ce56ee05420a1972f115d8620
-
SHA256
a6251f77e4c34d7007b6ac5b9e76fb2905d90eb74cb3b5da23fc11ac437f44ad
-
SHA512
7e7490dbe4d02f3046494daf45fe9fddbb292855f2546b95d88100d89d61f41c328969f2d59dbd5fffcf61aafc79dd56b5f56e1a9bc74f634b19ff2eff5d5b07
-
SSDEEP
12288:g4LZz32DiC3u6zioxdrRNd4vHbQeKQMgH7+Wp1bILwwyx:g4lot3u6zxbGRT118Gx
Malware Config
Extracted
formbook
scse
SKpYFyVNT2zunKf0uuM=
FlEHUseI7I5XbrO8fR/XBcS9ZA==
FPuxoUOxkLiATugw
VKdxsDSk0jdT5Kw=
FpqHf9iI/1tl97E=
YGI6sIl3UIxfZvlD+JiUuuLR
oBAEO0suBEAD5aK00A==
RKJqTzg4gQ/Q6DYSuTjDGkwuyl0ik5Kb8w==
VFg9s3W0/Ype8A3cZb+D7g==
hwD+VNd6014nrsaTWm4FBcS9ZA==
zkAdUq1soKYUfZaTqLmL
XVQ9WbRivUIQ477a/hKv+g==
QireF2geizAwmp674AGc5g==
PSTUQxs6j8OATugw
LHJhyy2VbX8NEqf0uuM=
MiY1vg6T3HqATugw
wqkUjaVXnGgBqA==
jUr/eUtSIT01Wegt
PjQidcqKzAbSZICUZb+D7g==
OkAmcv12sUEAIHwFHakzdIo2FPHw
zyDLsw+3I3H6gnaGZb+D7g==
ll0HRs5IJGxCZMJPahHgOt2RqjU=
YqaIEokHuw6V
jGJG11YCObJ+IQIXCW8KU+ZcbA==
jv4ITr8zITdT5Kw=
nXYro3yHe5YV5aK00A==
rJt1IPkxeQDUayhVCJyUuuLR
oFwz1DUU/RdD5aK00A==
FHlVTKEVIRFE5aK00A==
8GhjL2lJOWD+5aK00A==
k3BLouunGsagwhAi6oeUuuLR
p45GiQN5bZMjR9karDwDa442FPHw
Zdd7rVCKu/b3TIVU6t/lP92RqjU=
wyjxGjYHuw6V
nW5RrwV6yTdT5Kw=
itzGDGclWW4SqnLBSWH5Pt2RqjU=
8zwgceJYRWn+DKf0uuM=
EmojFmj027tsHrs=
ExQEPY5UyyS00HPvNNCH8w==
laiGCZRTkbg/XAl/Zb+D7g==
wYQysWBl+DdT5Kw=
MWo3rYV3XoAJ5aK00A==
hnht0SrcDR+XpjV6H6WUuuLR
rxqw6S7qG8A=
aEcfph/RAUAcfZYnXOw=
EXdVkuuzJ8eEjkTROs2D
MDYsc8l6w0wM7ZOiyQ==
Rw3XPwT+8UID5aK00A==
zDPp+Pskft/5iqS+0Q==
Z8h8hYCm/ULHXQ+YY2kJBcS9ZA==
vTDkm31vabx5EfoFMjLsVpBlz+fQfg==
+EcrRpZyp7tFba65dhvXBcS9ZA==
rHVJpwl6dLSATugw
gUoTghFSoTMpiXyQe9N3uOjQ
47Zwn/CkFQCty07ROs2D
NYkP+jcHuw6V
nfvdFnkHuw6V
L4piRRhAmfwGKITjemhRkmQ=
s6Jdx36Q+t5U7LE=
58iYH6dVmzYCnHZ/Zb+D7g==
IQ/WHZJWuVUD5aK00A==
Cf6t72PUxhnicjvBiFxqP0o2FPHw
DQr7l4R4rlEJ5aK00A==
62gezKeQv8mIIBbcZb+D7g==
kmuregister.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
rmuvrasf.exermuvrasf.exepid process 3916 rmuvrasf.exe 228 rmuvrasf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rmuvrasf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rmuvrasf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rmuvrasf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\igrjg = "C:\\Users\\Admin\\AppData\\Roaming\\yvlnndguqvnql\\turnsurauymmns.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\rmuvrasf.exe\" \"C:\\Users\\Admin\\A" rmuvrasf.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
rmuvrasf.exermuvrasf.exemsdt.exedescription pid process target process PID 3916 set thread context of 228 3916 rmuvrasf.exe rmuvrasf.exe PID 228 set thread context of 3020 228 rmuvrasf.exe Explorer.EXE PID 228 set thread context of 3020 228 rmuvrasf.exe Explorer.EXE PID 3712 set thread context of 3020 3712 msdt.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
msdt.exedescription ioc process Key created \Registry\User\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
rmuvrasf.exemsdt.exepid process 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3020 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
rmuvrasf.exermuvrasf.exemsdt.exepid process 3916 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 228 rmuvrasf.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe 3712 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rmuvrasf.exemsdt.exedescription pid process Token: SeDebugPrivilege 228 rmuvrasf.exe Token: SeDebugPrivilege 3712 msdt.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
rmuvrasf.exepid process 3916 rmuvrasf.exe 3916 rmuvrasf.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
rmuvrasf.exepid process 3916 rmuvrasf.exe 3916 rmuvrasf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Quotation.exermuvrasf.exeExplorer.EXEmsdt.exedescription pid process target process PID 1716 wrote to memory of 3916 1716 Quotation.exe rmuvrasf.exe PID 1716 wrote to memory of 3916 1716 Quotation.exe rmuvrasf.exe PID 1716 wrote to memory of 3916 1716 Quotation.exe rmuvrasf.exe PID 3916 wrote to memory of 228 3916 rmuvrasf.exe rmuvrasf.exe PID 3916 wrote to memory of 228 3916 rmuvrasf.exe rmuvrasf.exe PID 3916 wrote to memory of 228 3916 rmuvrasf.exe rmuvrasf.exe PID 3916 wrote to memory of 228 3916 rmuvrasf.exe rmuvrasf.exe PID 3020 wrote to memory of 3712 3020 Explorer.EXE msdt.exe PID 3020 wrote to memory of 3712 3020 Explorer.EXE msdt.exe PID 3020 wrote to memory of 3712 3020 Explorer.EXE msdt.exe PID 3712 wrote to memory of 4780 3712 msdt.exe Firefox.exe PID 3712 wrote to memory of 4780 3712 msdt.exe Firefox.exe PID 3712 wrote to memory of 4780 3712 msdt.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rmuvrasf.exe"C:\Users\Admin\AppData\Local\Temp\rmuvrasf.exe" "C:\Users\Admin\AppData\Local\Temp\imfyryryp.au3"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rmuvrasf.exe"C:\Users\Admin\AppData\Local\Temp\rmuvrasf.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\imfyryryp.au3Filesize
6KB
MD5d363383e83d1438ade3b5b5fe73f06a5
SHA1a64ef07047b145e51c08911232ab820fae562132
SHA256c50d962c58664b8ef94ae39480079457121bbd0c49c9d4116b9db266b0fd519a
SHA512a0ba15f57bcd35e14f2766f3b33a4ff063ddd1012f2d0b1f0dc5f21f5e40041433673a24e5fa86b55277332035725a658ec5166efdab122bc60c2964db97f266
-
C:\Users\Admin\AppData\Local\Temp\mvomywpsevp.ausFilesize
184KB
MD5dd6ced2fa7218b25a0c6f6dfcc8d740a
SHA1ff8c776722efe714bdce91788adf161e9b2894ae
SHA256b166d9899ea2a0f25582aaee1648334b8dc774f256c09ccc03d9a002933a91e8
SHA5122f6089cfb9dd0281bfa25cd630680e5124447efcc1e6ee9d2e7d078425b3bf42e3ca318742721b50ed87ac343610a8d9a5bd955b8017a4cefc736322af0ef04f
-
C:\Users\Admin\AppData\Local\Temp\nmkww.aFilesize
84KB
MD557df1892c032c7676fab58f8cbbc621a
SHA1535a9dba3460bce75518e3e70447be027110c20c
SHA256683a57a44efe10ddd23b550cd01a388a7079279935eede5c78b326237b479e06
SHA512088a278daba67721ec8423c6e29e64ae2d9c6ca51640f332092dc7ce8f225d0d4aa2b9cd2bd079b6962aec8b4ed6789761b18ebde452f3da4b3bc9f4ed8ff00e
-
C:\Users\Admin\AppData\Local\Temp\rmuvrasf.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\rmuvrasf.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\rmuvrasf.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
memory/228-146-0x0000000000422000-0x0000000000424000-memory.dmpFilesize
8KB
-
memory/228-149-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/228-140-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/228-141-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/228-142-0x0000000001790000-0x0000000001ADA000-memory.dmpFilesize
3.3MB
-
memory/228-144-0x0000000001230000-0x0000000001240000-memory.dmpFilesize
64KB
-
memory/228-143-0x0000000000422000-0x0000000000424000-memory.dmpFilesize
8KB
-
memory/228-150-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/228-138-0x0000000000000000-mapping.dmp
-
memory/228-147-0x00000000034F0000-0x0000000003500000-memory.dmpFilesize
64KB
-
memory/3020-148-0x0000000008400000-0x000000000852C000-memory.dmpFilesize
1.2MB
-
memory/3020-145-0x0000000002E70000-0x0000000002FA7000-memory.dmpFilesize
1.2MB
-
memory/3020-155-0x0000000008400000-0x000000000852C000-memory.dmpFilesize
1.2MB
-
memory/3020-157-0x0000000008870000-0x00000000089BE000-memory.dmpFilesize
1.3MB
-
memory/3020-159-0x0000000008870000-0x00000000089BE000-memory.dmpFilesize
1.3MB
-
memory/3712-151-0x0000000000000000-mapping.dmp
-
memory/3712-152-0x0000000000CA0000-0x0000000000CF7000-memory.dmpFilesize
348KB
-
memory/3712-153-0x0000000000310000-0x000000000033D000-memory.dmpFilesize
180KB
-
memory/3712-154-0x00000000026B0000-0x00000000029FA000-memory.dmpFilesize
3.3MB
-
memory/3712-156-0x00000000025F0000-0x000000000267F000-memory.dmpFilesize
572KB
-
memory/3712-158-0x0000000000310000-0x000000000033D000-memory.dmpFilesize
180KB
-
memory/3916-132-0x0000000000000000-mapping.dmp