Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
quotation.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
quotation.exe
Resource
win10v2004-20240508-en
General
-
Target
quotation.exe
-
Size
925KB
-
MD5
45cc1bf65d887b4899f7c212b271e578
-
SHA1
95091ef8a659d6dbde4119cf45d8bc7600be35bd
-
SHA256
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a
-
SHA512
aaeecd5fc1c395de750be26a62eac4c993d54da38ee6210c03c113fb33ae91b8e6cd3088e5101d54fdbe2708ca4fc479cf0956979622aebfe2cc71fce22bc326
-
SSDEEP
12288:vLdUcmDiSGP31lk463i3tINrHtkvT3Op44ZOloWvOkR:vLdeiNS4Oi9IN3p7OloWvV
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
quotation.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation quotation.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
quotation.exeRegSvcs.exeiexpress.exedescription pid process target process PID 4780 set thread context of 4004 4780 quotation.exe RegSvcs.exe PID 4004 set thread context of 3368 4004 RegSvcs.exe Explorer.EXE PID 4004 set thread context of 3240 4004 RegSvcs.exe iexpress.exe PID 3240 set thread context of 3368 3240 iexpress.exe Explorer.EXE PID 3240 set thread context of 2536 3240 iexpress.exe Firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexpress.exedescription ioc process Key created \Registry\User\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 iexpress.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
quotation.exepowershell.exeRegSvcs.exeiexpress.exepid process 4780 quotation.exe 4780 quotation.exe 4324 powershell.exe 4324 powershell.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 4004 RegSvcs.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
RegSvcs.exeExplorer.EXEiexpress.exepid process 4004 RegSvcs.exe 3368 Explorer.EXE 3368 Explorer.EXE 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe 3240 iexpress.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
quotation.exepowershell.exedescription pid process Token: SeDebugPrivilege 4780 quotation.exe Token: SeDebugPrivilege 4324 powershell.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3368 Explorer.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
quotation.exeExplorer.EXEiexpress.exedescription pid process target process PID 4780 wrote to memory of 4324 4780 quotation.exe powershell.exe PID 4780 wrote to memory of 4324 4780 quotation.exe powershell.exe PID 4780 wrote to memory of 4324 4780 quotation.exe powershell.exe PID 4780 wrote to memory of 4004 4780 quotation.exe RegSvcs.exe PID 4780 wrote to memory of 4004 4780 quotation.exe RegSvcs.exe PID 4780 wrote to memory of 4004 4780 quotation.exe RegSvcs.exe PID 4780 wrote to memory of 4004 4780 quotation.exe RegSvcs.exe PID 4780 wrote to memory of 4004 4780 quotation.exe RegSvcs.exe PID 4780 wrote to memory of 4004 4780 quotation.exe RegSvcs.exe PID 3368 wrote to memory of 3240 3368 Explorer.EXE iexpress.exe PID 3368 wrote to memory of 3240 3368 Explorer.EXE iexpress.exe PID 3368 wrote to memory of 3240 3368 Explorer.EXE iexpress.exe PID 3240 wrote to memory of 2536 3240 iexpress.exe Firefox.exe PID 3240 wrote to memory of 2536 3240 iexpress.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\quotation.exe"C:\Users\Admin\AppData\Local\Temp\quotation.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\quotation.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4004 -
C:\Windows\SysWOW64\iexpress.exe"C:\Windows\SysWOW64\iexpress.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82