Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 01:10

General

  • Target

    Quote 011698.exe

  • Size

    1.3MB

  • MD5

    ea73217fc7f9954fcf8d640de3b08d91

  • SHA1

    103ee72f87c5fa599d62336b9affa38c141db4ee

  • SHA256

    b299a47a8deea5fb8d448292905812a58552816798d799bef2a2dbcfa8e9265c

  • SHA512

    c180f00cdcf1f78826f70a2bf407adb9d068159d0be032b842a5185e1b3815f6d7980a9746e0979ecef5308874f9777c407c684e4e02402bfe9164ea4bcd4067

  • SSDEEP

    24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8acefrO7JbXnpCJjEzBN3dHPR/F:ATvC/MTQYxsWR7acurO7JbXnpCJjEzB5

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quote 011698.exe
    "C:\Users\Admin\AppData\Local\Temp\Quote 011698.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\Quote 011698.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aut97DB.tmp

    Filesize

    280KB

    MD5

    0e990981e1fd05e498180e69dc231856

    SHA1

    2984c7bdfd0fe8707c95564b4b9c72998d2cb4ae

    SHA256

    b4dcc82c9281e43e5bef63791019e55f4f423e04aa488e0223a45c558662ddb0

    SHA512

    4fca607a6bacc101ff1bca4d9963c146f63d18ded6b9b3e486a34f3b935752f4437bf96812d70c4c81df397d98e5bf7e90962d03105795c7daeb00fb7dd14842

  • memory/1672-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1672-15-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1672-16-0x0000000000E00000-0x000000000114A000-memory.dmp

    Filesize

    3.3MB

  • memory/1672-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/3800-13-0x00000000011D0000-0x00000000011D4000-memory.dmp

    Filesize

    16KB