Analysis Overview
SHA256
3dd466ffa2e7031457a79668f0bc129dd21a6ddfa77e95c8438089d63c4e5a8c
Threat Level: Known bad
The file QUOTATION#30065.exe was found to be: Known bad.
Malicious Activity Summary
RedLine
RedLine payload
SectopRAT
SectopRAT payload
Suspicious use of SetThreadContext
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-09-23 16:30
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-09-23 16:30
Reported
2024-09-23 16:32
Platform
win7-20240903-en
Max time kernel
143s
Max time network
147s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2504 set thread context of 2844 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe
"C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe"
C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe
"C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe"
Network
| Country | Destination | Domain | Proto |
| GB | 57.128.132.216:55123 | tcp | |
| GB | 57.128.132.216:55123 | tcp | |
| GB | 57.128.132.216:55123 | tcp | |
| GB | 57.128.132.216:55123 | tcp |
Files
memory/2504-0-0x0000000073EDE000-0x0000000073EDF000-memory.dmp
memory/2504-1-0x0000000000AF0000-0x0000000000BEA000-memory.dmp
memory/2504-2-0x00000000048D0000-0x000000000496E000-memory.dmp
memory/2504-3-0x0000000073ED0000-0x00000000745BE000-memory.dmp
memory/2504-4-0x0000000073EDE000-0x0000000073EDF000-memory.dmp
memory/2504-5-0x0000000073ED0000-0x00000000745BE000-memory.dmp
memory/2504-6-0x00000000002A0000-0x00000000002BA000-memory.dmp
memory/2504-7-0x0000000000770000-0x0000000000776000-memory.dmp
memory/2844-9-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2844-8-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2844-11-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2844-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2504-12-0x0000000073ED0000-0x00000000745BE000-memory.dmp
memory/2844-10-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2504-15-0x0000000073ED0000-0x00000000745BE000-memory.dmp
memory/2844-16-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2844-19-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2844-21-0x0000000073ED0000-0x00000000745BE000-memory.dmp
memory/2504-20-0x0000000073ED0000-0x00000000745BE000-memory.dmp
memory/2844-17-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2844-22-0x0000000073ED0000-0x00000000745BE000-memory.dmp
memory/2844-23-0x0000000073ED0000-0x00000000745BE000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-09-23 16:30
Reported
2024-09-23 16:32
Platform
win10v2004-20240802-en
Max time kernel
144s
Max time network
151s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3896 set thread context of 3640 | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe
"C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe"
C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe
"C:\Users\Admin\AppData\Local\Temp\QUOTATION#30065.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 37.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 44.56.20.217.in-addr.arpa | udp |
| GB | 57.128.132.216:55123 | tcp | |
| GB | 57.128.132.216:55123 | tcp | |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| GB | 57.128.132.216:55123 | tcp | |
| GB | 57.128.132.216:55123 | tcp |
Files
memory/3896-0-0x00000000752AE000-0x00000000752AF000-memory.dmp
memory/3896-1-0x0000000000970000-0x0000000000A6A000-memory.dmp
memory/3896-2-0x0000000005300000-0x000000000539C000-memory.dmp
memory/3896-3-0x00000000053A0000-0x000000000543E000-memory.dmp
memory/3896-4-0x00000000752A0000-0x0000000075A50000-memory.dmp
memory/3896-5-0x0000000005B70000-0x0000000006114000-memory.dmp
memory/3896-6-0x00000000056A0000-0x0000000005732000-memory.dmp
memory/3896-7-0x0000000005640000-0x000000000564A000-memory.dmp
memory/3896-8-0x00000000752A0000-0x0000000075A50000-memory.dmp
memory/3896-9-0x00000000752AE000-0x00000000752AF000-memory.dmp
memory/3896-10-0x00000000752A0000-0x0000000075A50000-memory.dmp
memory/3896-11-0x00000000073F0000-0x000000000740A000-memory.dmp
memory/3896-12-0x00000000099F0000-0x00000000099F6000-memory.dmp
memory/3640-13-0x0000000000400000-0x000000000041E000-memory.dmp
memory/3896-15-0x00000000752A0000-0x0000000075A50000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QUOTATION#30065.exe.log
| MD5 | abce8ccd3a4a5a0d4645806e60ab870b |
| SHA1 | 950703f2ae2e9d0b1383475c23a1f2b0c3ecd612 |
| SHA256 | ef1cfbe683644d2583de43c8a38448e60ab1acaaac633296788e05e3ec494359 |
| SHA512 | effb8bd2f006b7861c338e99faa501f47a346657f1f1fd4e47d10c82288788b83c84b029693edba1b4c2b60f9bec014d50af7299d93a27ed1fa4638321d1423b |
memory/3640-17-0x00000000752A0000-0x0000000075A50000-memory.dmp
memory/3640-18-0x0000000005A00000-0x0000000006018000-memory.dmp
memory/3640-19-0x00000000052C0000-0x00000000052D2000-memory.dmp
memory/3640-20-0x0000000005320000-0x000000000535C000-memory.dmp
memory/3640-21-0x0000000005360000-0x00000000053AC000-memory.dmp
memory/3640-22-0x00000000752A0000-0x0000000075A50000-memory.dmp
memory/3640-23-0x00000000055D0000-0x00000000056DA000-memory.dmp
memory/3640-24-0x00000000752A0000-0x0000000075A50000-memory.dmp