Analysis
-
max time kernel
147s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
quotation.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
quotation.exe
Resource
win10v2004-20240508-en
General
-
Target
quotation.exe
-
Size
925KB
-
MD5
45cc1bf65d887b4899f7c212b271e578
-
SHA1
95091ef8a659d6dbde4119cf45d8bc7600be35bd
-
SHA256
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a
-
SHA512
aaeecd5fc1c395de750be26a62eac4c993d54da38ee6210c03c113fb33ae91b8e6cd3088e5101d54fdbe2708ca4fc479cf0956979622aebfe2cc71fce22bc326
-
SSDEEP
12288:vLdUcmDiSGP31lk463i3tINrHtkvT3Op44ZOloWvOkR:vLdeiNS4Oi9IN3p7OloWvV
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
quotation.exeRegSvcs.exeiexpress.exedescription pid process target process PID 3016 set thread context of 2664 3016 quotation.exe RegSvcs.exe PID 2664 set thread context of 1216 2664 RegSvcs.exe Explorer.EXE PID 2664 set thread context of 2208 2664 RegSvcs.exe iexpress.exe PID 2208 set thread context of 1216 2208 iexpress.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
quotation.exepowershell.exeRegSvcs.exeiexpress.exepid process 3016 quotation.exe 3016 quotation.exe 1208 powershell.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe 2208 iexpress.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exeExplorer.EXEiexpress.exepid process 2664 RegSvcs.exe 1216 Explorer.EXE 1216 Explorer.EXE 2208 iexpress.exe 2208 iexpress.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
quotation.exepowershell.exedescription pid process Token: SeDebugPrivilege 3016 quotation.exe Token: SeDebugPrivilege 1208 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
quotation.exeExplorer.EXEdescription pid process target process PID 3016 wrote to memory of 1208 3016 quotation.exe powershell.exe PID 3016 wrote to memory of 1208 3016 quotation.exe powershell.exe PID 3016 wrote to memory of 1208 3016 quotation.exe powershell.exe PID 3016 wrote to memory of 1208 3016 quotation.exe powershell.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 3016 wrote to memory of 2664 3016 quotation.exe RegSvcs.exe PID 1216 wrote to memory of 2208 1216 Explorer.EXE iexpress.exe PID 1216 wrote to memory of 2208 1216 Explorer.EXE iexpress.exe PID 1216 wrote to memory of 2208 1216 Explorer.EXE iexpress.exe PID 1216 wrote to memory of 2208 1216 Explorer.EXE iexpress.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\quotation.exe"C:\Users\Admin\AppData\Local\Temp\quotation.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\quotation.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\iexpress.exe"C:\Windows\SysWOW64\iexpress.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1216-16-0x0000000003BE0000-0x0000000003CE0000-memory.dmpFilesize
1024KB
-
memory/2208-18-0x00000000000F0000-0x000000000012F000-memory.dmpFilesize
252KB
-
memory/2208-17-0x00000000000F0000-0x000000000012F000-memory.dmpFilesize
252KB
-
memory/2664-6-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2664-11-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2664-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2664-8-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/2664-15-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB
-
memory/3016-4-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/3016-5-0x00000000053A0000-0x000000000542A000-memory.dmpFilesize
552KB
-
memory/3016-0-0x000000007419E000-0x000000007419F000-memory.dmpFilesize
4KB
-
memory/3016-12-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/3016-3-0x0000000000330000-0x000000000034A000-memory.dmpFilesize
104KB
-
memory/3016-2-0x0000000074190000-0x000000007487E000-memory.dmpFilesize
6.9MB
-
memory/3016-1-0x0000000001370000-0x000000000145A000-memory.dmpFilesize
936KB