Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/05/2023, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
Quotaion-pdf-.exe
Resource
win7-20230220-en
General
-
Target
Quotaion-pdf-.exe
-
Size
908KB
-
MD5
784b7d12402a2b9900c3b0228312b5ac
-
SHA1
d2380976badb2ad8cdd0b0b38aaa22d989a95bc0
-
SHA256
04a56a61c1ee4f2b5710672cc9d7564086746e99d1e1ea32baf845c5be3758ce
-
SHA512
934efc840ccd863cf88eac934a03823d385f618bb596195552ddebcc84c42c990bf26130a4af6d7edec5353022bc720ab1b75d9e9f1d7f274db3df9d8fd64a0a
-
SSDEEP
12288:DrLpNaPn0YPX/N94+OCreCEl1aa8UJlUTcRssz573VP+cZegdgmCn7ravxhXaFXE:CP0tZCEln/JNlZdgN7rE0X
Malware Config
Extracted
formbook
4.1
ae30
lili116.ru
apatitum.ru
broadbandterbaik.com
flrfteb.ru
xysklhgf.xyz
thevelvetkit.africa
zwelethugh.africa
imassageandstretchdance.com
laser3dstudio.com
efefplantation.buzz
cyberwisely.com
hulihuli.net
electrosertecnologia.com
golanglearn.club
cee4agency.com
bedicustomgraphicapparel.com
aim2fitness.com
greenarrow-advisors.com
lotadan.com
kgaming.dev
alphaestetica.com
ailihuq.com
christmaslv.com
grandviewtub2shower.com
gbera9ja.africa
falconspice.com
ladderlab.site
dollarvalue-guide.site
frametasticuy.com
lowridericon.com
fshxzz.com
awath.dev
drinkcircleback.com
lostdrivinglicence.co.uk
kick-shoes.com
accidentattorneysearch-jp.life
asteramoving.com
dompacino.com
k59963.com
bayadere.co.uk
jkdairyjammu.com
ifidesignedit.com
ezengage.com
board-advising.com
reachphone.app
lajwbwcl.com
landscapingideas.site
diamondshouse-hannover.online
dustinoliver.com
fierceroar.uk
4983517.com
inhomeidea.com
firstchoicecladding.co.uk
kurrent.store
bcerviews.org.uk
guideonwheels.com
fact-times.live
bakedcivilization.com
howlsmovingcastlemerch.store
kinder-vaccine.com
landonwieweck.com
dxbsultan.com
tutastrading.africa
rseriali.net
lobosmc12.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1884-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1884-74-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1624-81-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/1624-83-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 840 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1704 set thread context of 1884 1704 Quotaion-pdf-.exe 30 PID 1884 set thread context of 1260 1884 Quotaion-pdf-.exe 14 PID 1624 set thread context of 1260 1624 svchost.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1884 Quotaion-pdf-.exe 1884 Quotaion-pdf-.exe 1664 powershell.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1260 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1884 Quotaion-pdf-.exe 1884 Quotaion-pdf-.exe 1884 Quotaion-pdf-.exe 1624 svchost.exe 1624 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1884 Quotaion-pdf-.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 1624 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1260 Explorer.EXE 1260 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1260 Explorer.EXE 1260 Explorer.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1664 1704 Quotaion-pdf-.exe 26 PID 1704 wrote to memory of 1664 1704 Quotaion-pdf-.exe 26 PID 1704 wrote to memory of 1664 1704 Quotaion-pdf-.exe 26 PID 1704 wrote to memory of 1664 1704 Quotaion-pdf-.exe 26 PID 1704 wrote to memory of 664 1704 Quotaion-pdf-.exe 28 PID 1704 wrote to memory of 664 1704 Quotaion-pdf-.exe 28 PID 1704 wrote to memory of 664 1704 Quotaion-pdf-.exe 28 PID 1704 wrote to memory of 664 1704 Quotaion-pdf-.exe 28 PID 1704 wrote to memory of 1884 1704 Quotaion-pdf-.exe 30 PID 1704 wrote to memory of 1884 1704 Quotaion-pdf-.exe 30 PID 1704 wrote to memory of 1884 1704 Quotaion-pdf-.exe 30 PID 1704 wrote to memory of 1884 1704 Quotaion-pdf-.exe 30 PID 1704 wrote to memory of 1884 1704 Quotaion-pdf-.exe 30 PID 1704 wrote to memory of 1884 1704 Quotaion-pdf-.exe 30 PID 1704 wrote to memory of 1884 1704 Quotaion-pdf-.exe 30 PID 1260 wrote to memory of 1624 1260 Explorer.EXE 31 PID 1260 wrote to memory of 1624 1260 Explorer.EXE 31 PID 1260 wrote to memory of 1624 1260 Explorer.EXE 31 PID 1260 wrote to memory of 1624 1260 Explorer.EXE 31 PID 1624 wrote to memory of 840 1624 svchost.exe 32 PID 1624 wrote to memory of 840 1624 svchost.exe 32 PID 1624 wrote to memory of 840 1624 svchost.exe 32 PID 1624 wrote to memory of 840 1624 svchost.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe"C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qQjtcTvQ.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qQjtcTvQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp451C.tmp"3⤵
- Creates scheduled task(s)
PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe"C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe"3⤵
- Deletes itself
PID:840
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD597556fc4cbf5ac98cf1a0bda6f0349aa
SHA1880b03f6c035d75d70249db4589618cf8d83cb80
SHA256c624d5392f29223eec88e7a3c6194186eded5dee47fb3d4f9a0c49d147f473b7
SHA512ae754e5cc991434264b2af742c6f87ffab3a4bcdf1919bb99fa73c5d28fce35b27e1574269e155392fb8d3eb2bd9f443793e544b1aab28be2de7101ba5d911b1