Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
Qoute_EXW_prices_43GJI_pdf.exe
Resource
win7-20240704-en
General
-
Target
Qoute_EXW_prices_43GJI_pdf.exe
-
Size
713KB
-
MD5
857be0d54f844d0b99341fcb38fd7c00
-
SHA1
a42bb0bbde545d4a94423175a1c9ed6feca461b0
-
SHA256
b089218dc7ac4e96a6a9bf13dc51f88d082cc15596692af64724f508719e60a0
-
SHA512
049615cb7171e40a59f5549fedf819ef45663b9beef0f77c69e97f00f2b607db4a05b8f25f380af1d9e04f642bee293b74752d41dcae08994cdd3d3fda920ce2
-
SSDEEP
12288:46qnCZGZwF0g7A8eYnPM0mERiFa/2XAUoChkXRkMQvfVDldLGSq4W82:OCcaD7A8pPmEU3XHJyXRcvdDNq4Wl
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 480 powershell.exe 2384 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 480 set thread context of 2384 480 powershell.exe 32 -
pid Process 480 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qoute_EXW_prices_43GJI_pdf.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 480 powershell.exe 480 powershell.exe 480 powershell.exe 480 powershell.exe 480 powershell.exe 480 powershell.exe 480 powershell.exe 480 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 480 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 480 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 560 wrote to memory of 480 560 Qoute_EXW_prices_43GJI_pdf.exe 29 PID 560 wrote to memory of 480 560 Qoute_EXW_prices_43GJI_pdf.exe 29 PID 560 wrote to memory of 480 560 Qoute_EXW_prices_43GJI_pdf.exe 29 PID 560 wrote to memory of 480 560 Qoute_EXW_prices_43GJI_pdf.exe 29 PID 480 wrote to memory of 2384 480 powershell.exe 32 PID 480 wrote to memory of 2384 480 powershell.exe 32 PID 480 wrote to memory of 2384 480 powershell.exe 32 PID 480 wrote to memory of 2384 480 powershell.exe 32 PID 480 wrote to memory of 2384 480 powershell.exe 32 PID 480 wrote to memory of 2384 480 powershell.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Qoute_EXW_prices_43GJI_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Qoute_EXW_prices_43GJI_pdf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized " $nephelite=Get-Content 'C:\Users\Admin\AppData\Local\Temp\belizerens\Anisosepalous\dagbrkninger\Stencilling.Ass243';$Kurrajong=$nephelite.SubString(56568,3);.$Kurrajong($nephelite)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD52c2dd8cd3a8e9d59a9329f41de07faf5
SHA15b43e2c03f458531b56d50404cf4a6095632f296
SHA256c04a936ca71dd30413ba86100ed0fa5a5ba5d73609e778a351314504137a9b15
SHA5125358a19aa964dc359efebe07a871ad58bdf85e15e784d55c57da7cb74590f9e7d5da5f126a0ab6fe1e28fcc2af297fa45f98b0d019544d0a8735a60868dcae25
-
Filesize
55KB
MD56d1f78dce389501cbce9c49abdb72308
SHA120d5e675fadb508978d1ca91d79f7bd96091a8ad
SHA25631600f74bde7637dca69ae3c61c5abfbe2aebf84760afdf8ad410574e6d3f49f
SHA512b3b7d9fae878e5a2302158a899b0620efbb63dbdb26ae3f26b2f4712192b348241126995f92fb6c11a7add82f83fd7f53971a93ba604e028205f108d2d80b431