Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 09:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Request for Quotation.exe
Resource
win10v2004-20230703-en
5 signatures
150 seconds
General
-
Target
Request for Quotation.exe
-
Size
676KB
-
MD5
77c650881201dfa0953408f57811e3d9
-
SHA1
a4aa6b39205e6668c66b6233c9ee3377553edd19
-
SHA256
3d4ea786fed7c7557db3d0be1333b26ddba5b33ec6f2db706e8db831b1e89167
-
SHA512
4add81d05f1d4d46450879cd174d70fe8974756c7db4e102ca6417c0749bac44a89f8265c003b8f429a48e8473970e2df5d45e7e98d9c47eadd1520c84e16fc1
-
SSDEEP
12288:APYPfY7yA9CTmd/eAOfxzmqYbavx7U7UqyxKS1k:APYPgxd/fQx1YGvx7U7UGS1
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation Request for Quotation.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3712 set thread context of 4840 3712 Request for Quotation.exe 98 -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3712 Request for Quotation.exe 3712 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe 4840 Request for Quotation.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3712 Request for Quotation.exe Token: SeDebugPrivilege 4840 Request for Quotation.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3712 wrote to memory of 1904 3712 Request for Quotation.exe 97 PID 3712 wrote to memory of 1904 3712 Request for Quotation.exe 97 PID 3712 wrote to memory of 1904 3712 Request for Quotation.exe 97 PID 3712 wrote to memory of 4840 3712 Request for Quotation.exe 98 PID 3712 wrote to memory of 4840 3712 Request for Quotation.exe 98 PID 3712 wrote to memory of 4840 3712 Request for Quotation.exe 98 PID 3712 wrote to memory of 4840 3712 Request for Quotation.exe 98 PID 3712 wrote to memory of 4840 3712 Request for Quotation.exe 98 PID 3712 wrote to memory of 4840 3712 Request for Quotation.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-