Analysis Overview
SHA256
44cd4f6ebd5c40c71b72c4c9ae46838d778637eb70db082592bb7ccbeca4f47f
Threat Level: Known bad
The file QUOTATION_AUGQTRA071244úPDF.scr.exe was found to be: Known bad.
Malicious Activity Summary
Suspicious use of NtCreateUserProcessOtherParentProcess
VIPKeylogger
Looks up external IP address via web service
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-08-30 07:16
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-30 07:16
Reported
2024-08-30 07:18
Platform
win7-20240704-en
Max time kernel
117s
Max time network
119s
Command Line
Signatures
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2276 wrote to memory of 5028 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | C:\Windows\system32\WerFault.exe |
| PID 2276 wrote to memory of 5028 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | C:\Windows\system32\WerFault.exe |
| PID 2276 wrote to memory of 5028 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe
"C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2276 -s 876
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | filetransfer.io | udp |
| US | 104.21.13.139:80 | filetransfer.io | tcp |
| US | 104.21.13.139:443 | filetransfer.io | tcp |
| US | 8.8.8.8:53 | s24.filetransfer.io | udp |
| US | 104.21.13.139:443 | s24.filetransfer.io | tcp |
Files
memory/2276-0-0x000007FEF56E3000-0x000007FEF56E4000-memory.dmp
memory/2276-1-0x0000000001000000-0x0000000001060000-memory.dmp
memory/2276-2-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp
memory/2276-3-0x000000001D1A0000-0x000000001D2C4000-memory.dmp
memory/2276-4-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-5-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-15-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-19-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-7-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-29-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-39-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-9-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-53-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-11-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-13-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-17-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-23-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-21-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-27-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-47-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-45-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-43-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-41-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-37-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-35-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-33-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-31-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-25-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-49-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-51-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-55-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-67-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-65-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-63-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-61-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-59-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-57-0x000000001D1A0000-0x000000001D2BD000-memory.dmp
memory/2276-1078-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp
memory/2276-1080-0x000000001ADC0000-0x000000001AE0C000-memory.dmp
memory/2276-1079-0x0000000002560000-0x00000000025FE000-memory.dmp
memory/2276-1081-0x000007FEF56E3000-0x000007FEF56E4000-memory.dmp
memory/2276-1082-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp
memory/2276-1083-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp
memory/2276-1085-0x000000001AE10000-0x000000001AE64000-memory.dmp
memory/2276-1086-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp
memory/2276-1087-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-30 07:16
Reported
2024-08-30 07:18
Platform
win10v2004-20240802-en
Max time kernel
136s
Max time network
144s
Command Line
Signatures
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 1040 created 3392 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | C:\Windows\Explorer.EXE |
VIPKeylogger
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | checkip.dyndns.org | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1040 wrote to memory of 620 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe |
| PID 1040 wrote to memory of 620 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe |
| PID 1040 wrote to memory of 620 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe |
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe
"C:\Users\Admin\AppData\Local\Temp\QUOTATION_AUGQTRA071244úPDF.scr.exe"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | filetransfer.io | udp |
| US | 172.67.200.96:80 | filetransfer.io | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 172.67.200.96:443 | filetransfer.io | tcp |
| US | 8.8.8.8:53 | s24.filetransfer.io | udp |
| US | 172.67.200.96:443 | s24.filetransfer.io | tcp |
| US | 8.8.8.8:53 | 96.200.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 136.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 24.139.73.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | checkip.dyndns.org | udp |
| JP | 132.226.8.169:80 | checkip.dyndns.org | tcp |
| US | 8.8.8.8:53 | 169.8.226.132.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
Files
memory/1040-0-0x00007FFE65093000-0x00007FFE65095000-memory.dmp
memory/1040-1-0x000002281ADF0000-0x000002281AE50000-memory.dmp
memory/1040-2-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/1040-3-0x0000022835630000-0x0000022835754000-memory.dmp
memory/1040-41-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-11-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-9-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-31-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-7-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-5-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-13-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-4-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-57-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-39-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-37-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-35-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-33-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-29-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-27-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-25-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-23-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-21-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-19-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-17-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-15-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-67-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-65-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-63-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-61-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-59-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-55-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-53-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-51-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-49-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-47-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-45-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-43-0x0000022835630000-0x000002283574D000-memory.dmp
memory/1040-1078-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/1040-1079-0x000002281CB30000-0x000002281CBCE000-memory.dmp
memory/1040-1080-0x0000022835750000-0x000002283579C000-memory.dmp
memory/1040-1085-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/1040-1086-0x00007FFE65093000-0x00007FFE65095000-memory.dmp
memory/1040-1084-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/1040-1087-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/1040-1088-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/1040-1089-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/1040-1091-0x0000022836A50000-0x0000022836AA4000-memory.dmp
memory/1040-1094-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/620-1093-0x000001B526170000-0x000001B5261BB000-memory.dmp
memory/620-1095-0x00007FFE65093000-0x00007FFE65095000-memory.dmp
memory/620-1096-0x000001B540500000-0x000001B540546000-memory.dmp
memory/620-1097-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/620-1098-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp
memory/620-1101-0x00007FFE65090000-0x00007FFE65B51000-memory.dmp