Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7-20230831-en
General
-
Target
Request for Quotation.exe
-
Size
563KB
-
MD5
8ea3b6a3901bd2793dfc396eb0b28f9b
-
SHA1
959ea521fccb5d08b48c3508ee042e1bd426a221
-
SHA256
902b6928c170fcb6980717091355f7f13d530701b8dac9f24041fbd11a1ddc71
-
SHA512
9d8464f11be2b658429782044ce7ede5fd50baf396e6d302b52da8a8b70c94c6906edb03f2846291fed61f9a1b3be10bcc7aa57f7bcd2046a9c3874676c609e8
-
SSDEEP
12288:FG2iNAe5+TDIxx11Nl1ZyM06feySuCB8QEnInyrTsNrr:FG1x8fID/Nl1Zy3Juy8Q6IynsNr
Malware Config
Extracted
formbook
4.1
go95
shellveil.com
digitaldame.shop
gsqjrl.top
freitasfamilylaw.com
alliancetransportllc.com
connecthospitality.work
awwaloon.com
fomohour.xyz
sjapkhuf.top
designmcraft.com
travelguidanceer.pro
vejashoessuomi.com
smallsipsteel.com
hallowedhavenstudios.com
bestonsports.com
touxiong53a.com
azgskyhvz4.top
strategicroulette.com
69farma.com
cosmosoftventures.com
ssongg872.cfd
integralfit.net
ewapalucka.com
openstakeholder.com
ssongg258.cfd
gunacilix.online
snirvacampo.pro
gasengi.live
you-rediscovered.com
nbazxop.xyz
kambingtoto.com
xiurenwang.club
ragattidesign.com
extraplusdigital.com
turbifypro.com
smm79.xyz
glitterplugbeats.com
laurylee.com
cincyqhi.com
cncqj.com
onlinesports.store
zhongtuo63.com
kombicrash.com
rockytopspiritsco.com
tap10.app
danielhen.com
fredasante.com
virginiadish.com
talktoapm.com
urdcs.cfd
89vh.xyz
theascnedancygroup.com
loadedreview.com
forgingbridgesattr.com
182jj.xyz
ycfzw.com
appoficialnovo.shop
cantrillart.com
rrproperty.net
pluribusmarketing.com
nuvanta.net
blamewho.com
hotshift.show
sharesgram.com
csshotelsystems.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2632-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 2632 2232 Request for Quotation.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2620 2632 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2984 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2984 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2984 2232 Request for Quotation.exe 30 PID 2232 wrote to memory of 2984 2232 Request for Quotation.exe 30 PID 2232 wrote to memory of 2984 2232 Request for Quotation.exe 30 PID 2232 wrote to memory of 2984 2232 Request for Quotation.exe 30 PID 2232 wrote to memory of 2632 2232 Request for Quotation.exe 32 PID 2232 wrote to memory of 2632 2232 Request for Quotation.exe 32 PID 2232 wrote to memory of 2632 2232 Request for Quotation.exe 32 PID 2232 wrote to memory of 2632 2232 Request for Quotation.exe 32 PID 2232 wrote to memory of 2632 2232 Request for Quotation.exe 32 PID 2232 wrote to memory of 2632 2232 Request for Quotation.exe 32 PID 2232 wrote to memory of 2632 2232 Request for Quotation.exe 32 PID 2632 wrote to memory of 2620 2632 Request for Quotation.exe 33 PID 2632 wrote to memory of 2620 2632 Request for Quotation.exe 33 PID 2632 wrote to memory of 2620 2632 Request for Quotation.exe 33 PID 2632 wrote to memory of 2620 2632 Request for Quotation.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 363⤵
- Program crash
PID:2620
-
-