Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION_JUL7FIBA00541·PDF.scr
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
QUOTATION_JUL7FIBA00541·PDF.scr
Resource
win10v2004-20230703-en
General
-
Target
QUOTATION_JUL7FIBA00541·PDF.scr
-
Size
77KB
-
MD5
cbda8cb8fd16a2172972e8fa81cc11a8
-
SHA1
9fbe855f5a322c4848ed6f0d02a0b7e7be3d52dd
-
SHA256
7cadda6850c04813046afddaea278ff58b38dc49bc8e10f121560580c9eae27a
-
SHA512
3b53a255c67e8edcd1f73d84adb7c4c7c6f13e0f9387655cc4806ca493e0c87f07b32520e89692050f1aefcb79f79252e095cc532b8fd5e7e20b5c004a8fbff7
-
SSDEEP
1536:N5wInQOcC+rhr+KoYlU88VGzm2v9cbpAQlTlBcUu1Vm1fR4:PwRrA88VGl9YpAQlTlBAC1fR4
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions QUOTATION_JUL7FIBA00541·PDF.scr -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools QUOTATION_JUL7FIBA00541·PDF.scr Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion QUOTATION_JUL7FIBA00541·PDF.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion QUOTATION_JUL7FIBA00541·PDF.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation QUOTATION_JUL7FIBA00541·PDF.scr -
Executes dropped EXE 1 IoCs
pid Process 5028 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" QUOTATION_JUL7FIBA00541·PDF.scr -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum QUOTATION_JUL7FIBA00541·PDF.scr Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 QUOTATION_JUL7FIBA00541·PDF.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4988 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4304 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr 824 QUOTATION_JUL7FIBA00541·PDF.scr -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 824 QUOTATION_JUL7FIBA00541·PDF.scr Token: SeDebugPrivilege 5028 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 824 wrote to memory of 3276 824 QUOTATION_JUL7FIBA00541·PDF.scr 87 PID 824 wrote to memory of 3276 824 QUOTATION_JUL7FIBA00541·PDF.scr 87 PID 824 wrote to memory of 1576 824 QUOTATION_JUL7FIBA00541·PDF.scr 89 PID 824 wrote to memory of 1576 824 QUOTATION_JUL7FIBA00541·PDF.scr 89 PID 3276 wrote to memory of 4988 3276 cmd.exe 91 PID 3276 wrote to memory of 4988 3276 cmd.exe 91 PID 1576 wrote to memory of 4304 1576 cmd.exe 92 PID 1576 wrote to memory of 4304 1576 cmd.exe 92 PID 1576 wrote to memory of 5028 1576 cmd.exe 93 PID 1576 wrote to memory of 5028 1576 cmd.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION_JUL7FIBA00541·PDF.scr"C:\Users\Admin\AppData\Local\Temp\QUOTATION_JUL7FIBA00541·PDF.scr" /S1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:4988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8925.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4304
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD586a0b5e42041979cd49486499c53f6ca
SHA104d5078f8d1656b7b50fa5fb44de6d18b9c66521
SHA256008639a77a4a397f197f4b3ed79a44f9126ac283f68776d98eab04b731958df1
SHA5128b642efa21fbccae03ff5061efd672e2c458fac8f5c8db8ab864508e6d3c4662a502fa5f0103e0330f18d3722a62fa292cbc00c0c10486c99ba234d3b9e34940
-
Filesize
77KB
MD5cbda8cb8fd16a2172972e8fa81cc11a8
SHA19fbe855f5a322c4848ed6f0d02a0b7e7be3d52dd
SHA2567cadda6850c04813046afddaea278ff58b38dc49bc8e10f121560580c9eae27a
SHA5123b53a255c67e8edcd1f73d84adb7c4c7c6f13e0f9387655cc4806ca493e0c87f07b32520e89692050f1aefcb79f79252e095cc532b8fd5e7e20b5c004a8fbff7
-
Filesize
77KB
MD5cbda8cb8fd16a2172972e8fa81cc11a8
SHA19fbe855f5a322c4848ed6f0d02a0b7e7be3d52dd
SHA2567cadda6850c04813046afddaea278ff58b38dc49bc8e10f121560580c9eae27a
SHA5123b53a255c67e8edcd1f73d84adb7c4c7c6f13e0f9387655cc4806ca493e0c87f07b32520e89692050f1aefcb79f79252e095cc532b8fd5e7e20b5c004a8fbff7