Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
Quotation Drawing Specification.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Quotation Drawing Specification.exe
Resource
win10v2004-20240226-en
General
-
Target
Quotation Drawing Specification.exe
-
Size
62KB
-
MD5
423c9605819245613a03f421d29bc24d
-
SHA1
a913786f724a2d69a676a8b821b9f8cdb5bc9cbc
-
SHA256
c64d2c1dcf51a5c9b9a52eed01e210f0e7c18a4afa42c26e59d852932d603834
-
SHA512
c98cbd222069562f8c79cddb11424c413a97cce8b8d7d80666ee4e2a8ae2cfa48b4ddb7fb81e59e056b2e11f65a7d20674afd37fb365eaf0ed947cfa4028e534
-
SSDEEP
768:7kgKgaBMfz0PuHcBkgQap6QdzpEm/xrbWUp5P8MF17TxfHIIIWyEFiRc:KuHcBkgnpdd6mp/pak7TxfHIIIWyei2
Malware Config
Signatures
-
Contacts a large (4693) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables packed with or use KoiVM 1 IoCs
resource yara_rule behavioral2/memory/3312-5-0x00000277CA860000-0x00000277CA93C000-memory.dmp INDICATOR_EXE_Packed_KoiVM -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Quotation Drawing Specification.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Quotation Drawing Specification.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Quotation Drawing Specification.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Quotation Drawing Specification.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Quotation Drawing Specification.exe -
Executes dropped EXE 1 IoCs
pid Process 5644 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" Quotation Drawing Specification.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Quotation Drawing Specification.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Quotation Drawing Specification.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5432 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6084 timeout.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe 3312 Quotation Drawing Specification.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3312 Quotation Drawing Specification.exe Token: SeDebugPrivilege 5644 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3312 wrote to memory of 5984 3312 Quotation Drawing Specification.exe 96 PID 3312 wrote to memory of 5984 3312 Quotation Drawing Specification.exe 96 PID 3312 wrote to memory of 928 3312 Quotation Drawing Specification.exe 98 PID 3312 wrote to memory of 928 3312 Quotation Drawing Specification.exe 98 PID 5984 wrote to memory of 5432 5984 cmd.exe 100 PID 5984 wrote to memory of 5432 5984 cmd.exe 100 PID 928 wrote to memory of 6084 928 cmd.exe 101 PID 928 wrote to memory of 6084 928 cmd.exe 101 PID 928 wrote to memory of 5644 928 cmd.exe 102 PID 928 wrote to memory of 5644 928 cmd.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation Drawing Specification.exe"C:\Users\Admin\AppData\Local\Temp\Quotation Drawing Specification.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5984 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:5432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9DB2.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:6084
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5644
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5853a6a03f8420f5d5d67a5e9a4fa4010
SHA131734cba46a9c7778a85268faad1cfecfb423d1e
SHA256ca284f18a92e5e93ed57cdb26010404f2a6cdc6a503c440e452eb86b67f3f0c6
SHA512e6821a2772a05bb844abde93da2b2218c244cc19e8d4abda102188305561867d73a88ed34f4ff4bdf89c94ee09281af21fd6e4dee3a60b706285d4dcdaaca944
-
Filesize
62KB
MD5423c9605819245613a03f421d29bc24d
SHA1a913786f724a2d69a676a8b821b9f8cdb5bc9cbc
SHA256c64d2c1dcf51a5c9b9a52eed01e210f0e7c18a4afa42c26e59d852932d603834
SHA512c98cbd222069562f8c79cddb11424c413a97cce8b8d7d80666ee4e2a8ae2cfa48b4ddb7fb81e59e056b2e11f65a7d20674afd37fb365eaf0ed947cfa4028e534