Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
Quotation_pdf.exe
Resource
win7-20230831-en
General
-
Target
Quotation_pdf.exe
-
Size
656KB
-
MD5
5fcd84bdc1f2e75edf263018a541d488
-
SHA1
dc37b685934e460e78e31be50158f111b3e3c7fa
-
SHA256
ea2adbcb61a20497bc442d31600336a93659f5b38ee367fa83c0a996b0912e83
-
SHA512
f1a9b4bc6c79fe0a54047915a09574604dc1c2fa677aebf19198baf7c7aab15f37dd785ac869e5fa1ab131394adcf51e181314330f7eeea9d82159ae24060922
-
SSDEEP
12288:XiM//j6aRYYGcf+7a4l6+qazEK0Gga4SmxtkgeMcSv+rLyil0e8:xLLYAlRYEYJst1TMhQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Control Panel\International\Geo\Nation Quotation_pdf.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 msdt.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3044 set thread context of 2740 3044 Quotation_pdf.exe 32 PID 2740 set thread context of 1200 2740 Quotation_pdf.exe 20 PID 2740 set thread context of 2552 2740 Quotation_pdf.exe 35 PID 2552 set thread context of 1200 2552 msdt.exe 20 -
description ioc Process Key created \Registry\User\S-1-5-21-3849525425-30183055-657688904-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3044 Quotation_pdf.exe 3044 Quotation_pdf.exe 3044 Quotation_pdf.exe 3044 Quotation_pdf.exe 2740 Quotation_pdf.exe 2740 Quotation_pdf.exe 2740 Quotation_pdf.exe 2740 Quotation_pdf.exe 2740 Quotation_pdf.exe 2740 Quotation_pdf.exe 2740 Quotation_pdf.exe 2740 Quotation_pdf.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2740 Quotation_pdf.exe 1200 Explorer.EXE 1200 Explorer.EXE 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe 2552 msdt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3044 Quotation_pdf.exe Token: SeDebugPrivilege 2740 Quotation_pdf.exe Token: SeDebugPrivilege 2552 msdt.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2648 3044 Quotation_pdf.exe 28 PID 3044 wrote to memory of 2648 3044 Quotation_pdf.exe 28 PID 3044 wrote to memory of 2648 3044 Quotation_pdf.exe 28 PID 3044 wrote to memory of 2648 3044 Quotation_pdf.exe 28 PID 3044 wrote to memory of 2704 3044 Quotation_pdf.exe 29 PID 3044 wrote to memory of 2704 3044 Quotation_pdf.exe 29 PID 3044 wrote to memory of 2704 3044 Quotation_pdf.exe 29 PID 3044 wrote to memory of 2704 3044 Quotation_pdf.exe 29 PID 3044 wrote to memory of 2720 3044 Quotation_pdf.exe 30 PID 3044 wrote to memory of 2720 3044 Quotation_pdf.exe 30 PID 3044 wrote to memory of 2720 3044 Quotation_pdf.exe 30 PID 3044 wrote to memory of 2720 3044 Quotation_pdf.exe 30 PID 3044 wrote to memory of 2724 3044 Quotation_pdf.exe 31 PID 3044 wrote to memory of 2724 3044 Quotation_pdf.exe 31 PID 3044 wrote to memory of 2724 3044 Quotation_pdf.exe 31 PID 3044 wrote to memory of 2724 3044 Quotation_pdf.exe 31 PID 3044 wrote to memory of 2740 3044 Quotation_pdf.exe 32 PID 3044 wrote to memory of 2740 3044 Quotation_pdf.exe 32 PID 3044 wrote to memory of 2740 3044 Quotation_pdf.exe 32 PID 3044 wrote to memory of 2740 3044 Quotation_pdf.exe 32 PID 3044 wrote to memory of 2740 3044 Quotation_pdf.exe 32 PID 3044 wrote to memory of 2740 3044 Quotation_pdf.exe 32 PID 3044 wrote to memory of 2740 3044 Quotation_pdf.exe 32 PID 1200 wrote to memory of 2552 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2552 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2552 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2552 1200 Explorer.EXE 35 PID 2552 wrote to memory of 2752 2552 msdt.exe 38 PID 2552 wrote to memory of 2752 2552 msdt.exe 38 PID 2552 wrote to memory of 2752 2552 msdt.exe 38 PID 2552 wrote to memory of 2752 2552 msdt.exe 38 PID 2552 wrote to memory of 2752 2552 msdt.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"3⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"3⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"3⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"3⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation_pdf.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD55e2d04cb2fae4e811ca35675c472f5fc
SHA16e2359f8e81f1a1122d1fb50b064878f2aaefc68
SHA256dd46a298ab90ca9ba8a1f633f20abe2dcb805596b5aa68dcb84cce99e3a56be1
SHA51253c8701768ee4a43a6b2095af00aa5f2c53445021a91d3567d02cf8157c7b7c4e629c5c70bb24697d365a7c41c791af0c68b511ab3cf5f356d9d929618421d05
-
Filesize
1.0MB
MD5f1e5f58f9eb43ecec773acbdb410b888
SHA1f1b8076b0bbde696694bbc0ab259a77893839464
SHA256a15fd84ee61b54c92bb099dfb78226548f43d550c67fb6adf4cce3d064ab1c14
SHA5120aff96430dd99bb227285fefc258014c301f85216c84e40f45702d26cdd7e77261a41fd3811d686f5fb2ee363cc651a014e8ffa339384004cece645a36486456