Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
Quote 011698.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Quote 011698.exe
Resource
win10v2004-20240802-en
General
-
Target
Quote 011698.exe
-
Size
1.3MB
-
MD5
ea73217fc7f9954fcf8d640de3b08d91
-
SHA1
103ee72f87c5fa599d62336b9affa38c141db4ee
-
SHA256
b299a47a8deea5fb8d448292905812a58552816798d799bef2a2dbcfa8e9265c
-
SHA512
c180f00cdcf1f78826f70a2bf407adb9d068159d0be032b842a5185e1b3815f6d7980a9746e0979ecef5308874f9777c407c684e4e02402bfe9164ea4bcd4067
-
SSDEEP
24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8acefrO7JbXnpCJjEzBN3dHPR/F:ATvC/MTQYxsWR7acurO7JbXnpCJjEzB5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3800 set thread context of 1672 3800 Quote 011698.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote 011698.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3800 Quote 011698.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3800 Quote 011698.exe 3800 Quote 011698.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3800 Quote 011698.exe 3800 Quote 011698.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3800 wrote to memory of 1672 3800 Quote 011698.exe 87 PID 3800 wrote to memory of 1672 3800 Quote 011698.exe 87 PID 3800 wrote to memory of 1672 3800 Quote 011698.exe 87 PID 3800 wrote to memory of 1672 3800 Quote 011698.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote 011698.exe"C:\Users\Admin\AppData\Local\Temp\Quote 011698.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Quote 011698.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD50e990981e1fd05e498180e69dc231856
SHA12984c7bdfd0fe8707c95564b4b9c72998d2cb4ae
SHA256b4dcc82c9281e43e5bef63791019e55f4f423e04aa488e0223a45c558662ddb0
SHA5124fca607a6bacc101ff1bca4d9963c146f63d18ded6b9b3e486a34f3b935752f4437bf96812d70c4c81df397d98e5bf7e90962d03105795c7daeb00fb7dd14842