Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
Quotation PO 11109.pdf.exe
Resource
win7-20240705-en
General
-
Target
Quotation PO 11109.pdf.exe
-
Size
589KB
-
MD5
d53fc47751fa8ad0b613c489aa779bda
-
SHA1
ec14fabb10b9aa9f05344c03802294e114bb2af1
-
SHA256
2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea
-
SHA512
b6441aeff786d23401267f23960410614a2686e3d10b6f58c5e9042d7c2f48a4975383f2ec05cfc801faa39a3bbb6bb58161b5ec248252c89ab9bf6ef382e326
-
SSDEEP
12288:ToQyRAMIgF72A0ybuxRN750J4iWoM7+EgLHpP3V5Ua:uHIgF7Wybexo4iWoM7oHpP3TR
Malware Config
Extracted
asyncrat
0.5.8
REED
bmh-global.myfirewall.org:15153
2bL4M7bieVyn
-
delay
10
-
install
true
-
install_file
windows manger.exe
-
install_folder
%Temp%
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Quotation PO 11109.pdf.exe -
Executes dropped EXE 2 IoCs
pid Process 2528 windows manger.exe 1120 windows manger.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4808 set thread context of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 2528 set thread context of 1120 2528 windows manger.exe 113 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation PO 11109.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows manger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows manger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation PO 11109.pdf.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4524 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe 4816 Quotation PO 11109.pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4816 Quotation PO 11109.pdf.exe Token: SeDebugPrivilege 1120 windows manger.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 4808 wrote to memory of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 4808 wrote to memory of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 4808 wrote to memory of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 4808 wrote to memory of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 4808 wrote to memory of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 4808 wrote to memory of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 4808 wrote to memory of 4816 4808 Quotation PO 11109.pdf.exe 102 PID 4816 wrote to memory of 1060 4816 Quotation PO 11109.pdf.exe 103 PID 4816 wrote to memory of 1060 4816 Quotation PO 11109.pdf.exe 103 PID 4816 wrote to memory of 1060 4816 Quotation PO 11109.pdf.exe 103 PID 4816 wrote to memory of 2892 4816 Quotation PO 11109.pdf.exe 105 PID 4816 wrote to memory of 2892 4816 Quotation PO 11109.pdf.exe 105 PID 4816 wrote to memory of 2892 4816 Quotation PO 11109.pdf.exe 105 PID 2892 wrote to memory of 4524 2892 cmd.exe 107 PID 2892 wrote to memory of 4524 2892 cmd.exe 107 PID 2892 wrote to memory of 4524 2892 cmd.exe 107 PID 1060 wrote to memory of 3640 1060 cmd.exe 108 PID 1060 wrote to memory of 3640 1060 cmd.exe 108 PID 1060 wrote to memory of 3640 1060 cmd.exe 108 PID 2892 wrote to memory of 2528 2892 cmd.exe 109 PID 2892 wrote to memory of 2528 2892 cmd.exe 109 PID 2892 wrote to memory of 2528 2892 cmd.exe 109 PID 2528 wrote to memory of 1120 2528 windows manger.exe 113 PID 2528 wrote to memory of 1120 2528 windows manger.exe 113 PID 2528 wrote to memory of 1120 2528 windows manger.exe 113 PID 2528 wrote to memory of 1120 2528 windows manger.exe 113 PID 2528 wrote to memory of 1120 2528 windows manger.exe 113 PID 2528 wrote to memory of 1120 2528 windows manger.exe 113 PID 2528 wrote to memory of 1120 2528 windows manger.exe 113 PID 2528 wrote to memory of 1120 2528 windows manger.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation PO 11109.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation PO 11109.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Quotation PO 11109.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation PO 11109.pdf.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows manger" /tr '"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows manger" /tr '"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9CC8.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\windows manger.exe"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\windows manger.exe"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1036,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57cad59aef5a93f093b6ba494f13f796f
SHA13cef97b77939bfc06dfd3946fc1a8cd159f67100
SHA2561e1b444fe2d8772f6709b22b94bb5b0aa7fa590f6a693705d9bf1f2f71267a55
SHA5128cedd03efec34c6226a01fd6b4831a689be16545ea6b849cd96f775e0722bfefd4b47f3dd8401d2080d341d4319f75995ece60de44352a1f86a2e5dc01e6210b
-
Filesize
161B
MD575a0f2f7b22359e011947a0ed8649418
SHA136ae5e08ce0c799665c5fabd62535c182bfa17d3
SHA2567415e73a6e7b337465998e03ed7136e58257e884172b280f6bcec2e0d6af34f6
SHA5127dd9b32d9cfc4ce78aa6623372c008d743b20dd1ca930e228acb61cbc6e42a0851e9c480d8f261b933661619bed93ae35598f45dd6677be886a1e0144ae0be3e
-
Filesize
589KB
MD5d53fc47751fa8ad0b613c489aa779bda
SHA1ec14fabb10b9aa9f05344c03802294e114bb2af1
SHA2562328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea
SHA512b6441aeff786d23401267f23960410614a2686e3d10b6f58c5e9042d7c2f48a4975383f2ec05cfc801faa39a3bbb6bb58161b5ec248252c89ab9bf6ef382e326