Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
Quotation - TB046J12LCO2 Project Mechanical.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Quotation - TB046J12LCO2 Project Mechanical.exe
Resource
win10v2004-20240508-en
General
-
Target
Quotation - TB046J12LCO2 Project Mechanical.exe
-
Size
1.1MB
-
MD5
16a009a8c64f7d483d331d27cc342f54
-
SHA1
e140137a852280f79e101e93276216643d1631aa
-
SHA256
2f4acbd783db771739523c21f32489679e97ad254b51b170981ad58bcf00575c
-
SHA512
0afa038e4cacec78cf5551c5f341c1342b077fef9608a51ba0b0cf39152687830d95665c9324ba3eaa5b3cb3964adc8e92964b710ac2de0da9891e3923540f4e
-
SSDEEP
24576:LAHnh+eWsN3skA4RV1Hom2KXMmHajd/h2cNa0yIvdFW5:mh+ZkldoPK8Yajd7lyI1O
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1580 set thread context of 2244 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 81 PID 2244 set thread context of 3432 2244 svchost.exe 56 PID 2244 set thread context of 4196 2244 svchost.exe 84 PID 4196 set thread context of 3432 4196 RMActivate_ssp.exe 56 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 2244 svchost.exe 3432 Explorer.EXE 3432 Explorer.EXE 4196 RMActivate_ssp.exe 4196 RMActivate_ssp.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 3432 Explorer.EXE 3432 Explorer.EXE 3432 Explorer.EXE -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 3432 Explorer.EXE 3432 Explorer.EXE 3432 Explorer.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2244 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 81 PID 1580 wrote to memory of 2244 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 81 PID 1580 wrote to memory of 2244 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 81 PID 1580 wrote to memory of 2244 1580 Quotation - TB046J12LCO2 Project Mechanical.exe 81 PID 3432 wrote to memory of 4196 3432 Explorer.EXE 84 PID 3432 wrote to memory of 4196 3432 Explorer.EXE 84 PID 3432 wrote to memory of 4196 3432 Explorer.EXE 84
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\Quotation - TB046J12LCO2 Project Mechanical.exe"C:\Users\Admin\AppData\Local\Temp\Quotation - TB046J12LCO2 Project Mechanical.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Quotation - TB046J12LCO2 Project Mechanical.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2244
-
-
-
C:\Windows\SysWOW64\RMActivate_ssp.exe"C:\Windows\SysWOW64\RMActivate_ssp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD51cb65f815398054b6991c24f3a24e726
SHA15b5649d946e2d2b10bff465b3a291eee0e0c0052
SHA25689cf65de807d861370b51d84eac316eb68ff0b3f208c078163210ad653b5cfd8
SHA5122ce6ed9c82185dc60dd1633d5cadb5ffcc3517bb7d40f80519467f7dc7815b4e7cafcc0fe2c0c515cf6311398d2121039e4c3b991c177b03c8278bb9572bae94