Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17/07/2023, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION_JUL7FIBA00541·PDF.scr.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
QUOTATION_JUL7FIBA00541·PDF.scr.exe
Resource
win10v2004-20230703-en
General
-
Target
QUOTATION_JUL7FIBA00541·PDF.scr.exe
-
Size
77KB
-
MD5
cbda8cb8fd16a2172972e8fa81cc11a8
-
SHA1
9fbe855f5a322c4848ed6f0d02a0b7e7be3d52dd
-
SHA256
7cadda6850c04813046afddaea278ff58b38dc49bc8e10f121560580c9eae27a
-
SHA512
3b53a255c67e8edcd1f73d84adb7c4c7c6f13e0f9387655cc4806ca493e0c87f07b32520e89692050f1aefcb79f79252e095cc532b8fd5e7e20b5c004a8fbff7
-
SSDEEP
1536:N5wInQOcC+rhr+KoYlU88VGzm2v9cbpAQlTlBcUu1Vm1fR4:PwRrA88VGl9YpAQlTlBAC1fR4
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions QUOTATION_JUL7FIBA00541·PDF.scr.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools QUOTATION_JUL7FIBA00541·PDF.scr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion QUOTATION_JUL7FIBA00541·PDF.scr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion QUOTATION_JUL7FIBA00541·PDF.scr.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2832 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" QUOTATION_JUL7FIBA00541·PDF.scr.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum QUOTATION_JUL7FIBA00541·PDF.scr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 QUOTATION_JUL7FIBA00541·PDF.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2792 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe Token: SeDebugPrivilege 2268 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2884 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe 30 PID 1860 wrote to memory of 2884 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe 30 PID 1860 wrote to memory of 2884 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe 30 PID 1860 wrote to memory of 2832 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe 32 PID 1860 wrote to memory of 2832 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe 32 PID 1860 wrote to memory of 2832 1860 QUOTATION_JUL7FIBA00541·PDF.scr.exe 32 PID 2832 wrote to memory of 2792 2832 cmd.exe 34 PID 2832 wrote to memory of 2792 2832 cmd.exe 34 PID 2832 wrote to memory of 2792 2832 cmd.exe 34 PID 2884 wrote to memory of 2972 2884 cmd.exe 35 PID 2884 wrote to memory of 2972 2884 cmd.exe 35 PID 2884 wrote to memory of 2972 2884 cmd.exe 35 PID 2832 wrote to memory of 2268 2832 cmd.exe 36 PID 2832 wrote to memory of 2268 2832 cmd.exe 36 PID 2832 wrote to memory of 2268 2832 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION_JUL7FIBA00541·PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION_JUL7FIBA00541·PDF.scr.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2972
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp7FDA.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5d56d0525e62bd5781701955f90193258
SHA1caace731210c92c179d22e44abfef3fc9bd80996
SHA2561a09eada06c088eb693463a381514ecfeb425b19ce1f2db151df5f48a9f842cf
SHA51282d36607dca6aad3799743d32bb23a8b29f3fcc5624442a400a7f9e3795114d18a2897438c1abf1c30504994dec61ba94c9d995d583e2a8935e6fe06f4e14067
-
Filesize
151B
MD5d56d0525e62bd5781701955f90193258
SHA1caace731210c92c179d22e44abfef3fc9bd80996
SHA2561a09eada06c088eb693463a381514ecfeb425b19ce1f2db151df5f48a9f842cf
SHA51282d36607dca6aad3799743d32bb23a8b29f3fcc5624442a400a7f9e3795114d18a2897438c1abf1c30504994dec61ba94c9d995d583e2a8935e6fe06f4e14067
-
Filesize
77KB
MD5cbda8cb8fd16a2172972e8fa81cc11a8
SHA19fbe855f5a322c4848ed6f0d02a0b7e7be3d52dd
SHA2567cadda6850c04813046afddaea278ff58b38dc49bc8e10f121560580c9eae27a
SHA5123b53a255c67e8edcd1f73d84adb7c4c7c6f13e0f9387655cc4806ca493e0c87f07b32520e89692050f1aefcb79f79252e095cc532b8fd5e7e20b5c004a8fbff7
-
Filesize
77KB
MD5cbda8cb8fd16a2172972e8fa81cc11a8
SHA19fbe855f5a322c4848ed6f0d02a0b7e7be3d52dd
SHA2567cadda6850c04813046afddaea278ff58b38dc49bc8e10f121560580c9eae27a
SHA5123b53a255c67e8edcd1f73d84adb7c4c7c6f13e0f9387655cc4806ca493e0c87f07b32520e89692050f1aefcb79f79252e095cc532b8fd5e7e20b5c004a8fbff7
-
Filesize
77KB
MD5cbda8cb8fd16a2172972e8fa81cc11a8
SHA19fbe855f5a322c4848ed6f0d02a0b7e7be3d52dd
SHA2567cadda6850c04813046afddaea278ff58b38dc49bc8e10f121560580c9eae27a
SHA5123b53a255c67e8edcd1f73d84adb7c4c7c6f13e0f9387655cc4806ca493e0c87f07b32520e89692050f1aefcb79f79252e095cc532b8fd5e7e20b5c004a8fbff7