Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/09/2023, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
Quotationv.exe
Resource
win7-20230831-en
General
-
Target
Quotationv.exe
-
Size
669KB
-
MD5
52cfc15a97799e70a8b4a39b04bc8e2b
-
SHA1
2cfa4daab21dd8115167a3ccba0080f5fdad63ff
-
SHA256
f910b739d3d727fc1f5acde88b0740a575c603dc6c61246156c5debd6bd126bc
-
SHA512
95b7d0c4942703ebfec9d405bfe08efd1f11c2af3b9f65e05bef5afb3440fabcff5e5733de9bec824331d6b22c26e72419e25ca66a6948c07c0c4d4cc98fcdc3
-
SSDEEP
12288:lZq251MgHoOqx2sw/6h1/6tj/jrgLLZTh45s+hKeOknD1rfF32grpiAFKWDckjQc:3PjQLlahnrNbQAZgkj5
Malware Config
Extracted
formbook
4.1
pdup
mycharlesschwab.com
casinocode.online
lesliemostellerart.com
cdtevergreen.com
jualpenirumasli.com
lvyouonline.com
moteaiai.com
coachmo13.com
lampungtimur.com
sellmycapecodhouse.com
wearschool.com
onlinekazancyollari.com
ubmotherhood.com
sqyxedu.com
sibate518.com
energygv.com
sathsathhain.com
paperghostsbook.com
investinbritain.net
tansuokeji.ink
quintelcapital.com
inkox.com
horsedrawnpress.com
hoertjesbijjouindebuurt.online
van-to-choice.com
undohate.com
innovativeconnections.info
xn--2qu076aq4bo3gg7hvoqohm.net
bancodecreditosyprestamos.com
xingyesq.com
8894x.com
loreet.com
studiopavia.cloud
dairong.net
timo9.com
taikang365.ink
chatterentertainment.com
apluspower.net
nelamaps.com
cryptoustaad.com
baevmaylllerch.win
saintjulia.church
caneloalvarezvsgolovkin.com
barronetttire.com
government-jobs.click
teamexitus.com
alponafashion.com
myriamavanza.com
qianxunedu.com
jglzs.com
tv-production.com
vfjgiftshop.com
timekeeper248.com
4thirteenfitnessclothing.com
motorcityam.com
hfhy888.com
kirso.info
grupoquo.com
trentgoins.net
storey360.com
xyxy4567.com
farmersinsurancematt.com
gwor5v.com
mjstfy.men
fex-tracks.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2636-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2636-16-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2644-21-0x0000000000080000-0x00000000000AE000-memory.dmp formbook behavioral1/memory/2644-23-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1840 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1672 set thread context of 2636 1672 Quotationv.exe 30 PID 2636 set thread context of 1256 2636 Quotationv.exe 13 PID 2644 set thread context of 1256 2644 explorer.exe 13 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1672 Quotationv.exe 1672 Quotationv.exe 2636 Quotationv.exe 2636 Quotationv.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1256 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2636 Quotationv.exe 2636 Quotationv.exe 2636 Quotationv.exe 2644 explorer.exe 2644 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1672 Quotationv.exe Token: SeDebugPrivilege 2636 Quotationv.exe Token: SeDebugPrivilege 2644 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2636 1672 Quotationv.exe 30 PID 1672 wrote to memory of 2636 1672 Quotationv.exe 30 PID 1672 wrote to memory of 2636 1672 Quotationv.exe 30 PID 1672 wrote to memory of 2636 1672 Quotationv.exe 30 PID 1672 wrote to memory of 2636 1672 Quotationv.exe 30 PID 1672 wrote to memory of 2636 1672 Quotationv.exe 30 PID 1672 wrote to memory of 2636 1672 Quotationv.exe 30 PID 1256 wrote to memory of 2644 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2644 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2644 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2644 1256 Explorer.EXE 31 PID 2644 wrote to memory of 1840 2644 explorer.exe 32 PID 2644 wrote to memory of 1840 2644 explorer.exe 32 PID 2644 wrote to memory of 1840 2644 explorer.exe 32 PID 2644 wrote to memory of 1840 2644 explorer.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\Quotationv.exe"C:\Users\Admin\AppData\Local\Temp\Quotationv.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Quotationv.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotationv.exe"3⤵
- Deletes itself
PID:1840
-
-