Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
Quotation No Q240419617.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Quotation No Q240419617.exe
Resource
win10v2004-20240426-en
General
-
Target
Quotation No Q240419617.exe
-
Size
692KB
-
MD5
9869cf5ff4bf02dcc23e4b20b26dc6f6
-
SHA1
05755dabf2e7290ea00429852de5b572de762da0
-
SHA256
ba531af97daeb195d2b21cfc4db12c782d2b99d2cc1bc5c2000eb04a24b402e5
-
SHA512
7d880fa37baf002b73d73f78355e172669da287454786c4a54867dc8970bc5ad28e7523cdbbf3d40da387517075b868d6fd8a7148439ee351da182fe646529a9
-
SSDEEP
12288:mLUHDGW4SBSwsmSsxzLY+VzkDfq+TK0WjXJGuWYaNWx533ryQ5sT:HV4SUQSH+Vz6fq+TVKkumWxJ3r/6
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3048 powershell.exe 2672 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 308 set thread context of 2456 308 Quotation No Q240419617.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 308 Quotation No Q240419617.exe 3048 powershell.exe 2672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 308 Quotation No Q240419617.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 308 wrote to memory of 3048 308 Quotation No Q240419617.exe 28 PID 308 wrote to memory of 3048 308 Quotation No Q240419617.exe 28 PID 308 wrote to memory of 3048 308 Quotation No Q240419617.exe 28 PID 308 wrote to memory of 2672 308 Quotation No Q240419617.exe 30 PID 308 wrote to memory of 2672 308 Quotation No Q240419617.exe 30 PID 308 wrote to memory of 2672 308 Quotation No Q240419617.exe 30 PID 308 wrote to memory of 2732 308 Quotation No Q240419617.exe 32 PID 308 wrote to memory of 2732 308 Quotation No Q240419617.exe 32 PID 308 wrote to memory of 2732 308 Quotation No Q240419617.exe 32 PID 308 wrote to memory of 2456 308 Quotation No Q240419617.exe 34 PID 308 wrote to memory of 2456 308 Quotation No Q240419617.exe 34 PID 308 wrote to memory of 2456 308 Quotation No Q240419617.exe 34 PID 308 wrote to memory of 2456 308 Quotation No Q240419617.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation No Q240419617.exe"C:\Users\Admin\AppData\Local\Temp\Quotation No Q240419617.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Quotation No Q240419617.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ncClrGU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ncClrGU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4FC5.tmp"2⤵
- Creates scheduled task(s)
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation No Q240419617.exe"C:\Users\Admin\AppData\Local\Temp\Quotation No Q240419617.exe"2⤵PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55894098f3129fb79c6c7e64b6fd7c052
SHA11ab1e7f3515b5e1f279230d1d5fdb0575688ec95
SHA2564853592c10e58d510d3cd3ea9988ab0733cb280a14b88b0599d161f5a3ec3f98
SHA5121f4faa2071fee17c0756f59c4a54b93aaafc15f44f33ff83e03abdb757a0235b3fe68a1ed5ac7f55534a25ce7d6bf2bcd774055682b9517582475fc433146b9d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56be0b47e8c61b4cfde11ef81193c3979
SHA1922a7930c6bb867b8c384980cea64bc5a4c61f6b
SHA256b4a08638460ca76cb93b9dbc57819010f4dfde6cf90cd249ca865efc8491f43d
SHA512b0b821c064660c81ddbc522b22fad58ea1ce98808765be811ab3f6b9c0fcd1aa13b1a00123e4f7a01e9c262ec366b833e4cfcdc457bcc2ce073ed22d20866cd0