Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/09/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240704-en
General
-
Target
Quotation.exe
-
Size
606KB
-
MD5
da64fc657273cfe5a846582a5ac84e75
-
SHA1
fbf3ecf3bcb52ac1bfcf402b6e3b015b0e77b146
-
SHA256
ad8d9b06ee2c2fd75ee720451c948ce7adc6bd09b0d500e757be74426a2c7d83
-
SHA512
35a697741e6dc5d66bdc6a191dfc3493e301f718c27efe0c16098f1007d7c32b57445fdeb4a1e0bca2a1d6dc469ccfde82bf5376469b02e0bbdded89116a98b3
-
SSDEEP
12288:HdsNkClKVjBKCT2E5u/RjkrftHjftIj0PMRFFNw:cXMjB/ccfg+MRK
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2792 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2416 Quotation.exe 2792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2416 Quotation.exe Token: SeDebugPrivilege 2792 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2792 2416 Quotation.exe 31 PID 2416 wrote to memory of 2792 2416 Quotation.exe 31 PID 2416 wrote to memory of 2792 2416 Quotation.exe 31 PID 2416 wrote to memory of 2792 2416 Quotation.exe 31 PID 2416 wrote to memory of 2700 2416 Quotation.exe 33 PID 2416 wrote to memory of 2700 2416 Quotation.exe 33 PID 2416 wrote to memory of 2700 2416 Quotation.exe 33 PID 2416 wrote to memory of 2700 2416 Quotation.exe 33 PID 2416 wrote to memory of 2756 2416 Quotation.exe 34 PID 2416 wrote to memory of 2756 2416 Quotation.exe 34 PID 2416 wrote to memory of 2756 2416 Quotation.exe 34 PID 2416 wrote to memory of 2756 2416 Quotation.exe 34 PID 2416 wrote to memory of 2812 2416 Quotation.exe 35 PID 2416 wrote to memory of 2812 2416 Quotation.exe 35 PID 2416 wrote to memory of 2812 2416 Quotation.exe 35 PID 2416 wrote to memory of 2812 2416 Quotation.exe 35 PID 2416 wrote to memory of 2816 2416 Quotation.exe 36 PID 2416 wrote to memory of 2816 2416 Quotation.exe 36 PID 2416 wrote to memory of 2816 2416 Quotation.exe 36 PID 2416 wrote to memory of 2816 2416 Quotation.exe 36 PID 2416 wrote to memory of 2832 2416 Quotation.exe 37 PID 2416 wrote to memory of 2832 2416 Quotation.exe 37 PID 2416 wrote to memory of 2832 2416 Quotation.exe 37 PID 2416 wrote to memory of 2832 2416 Quotation.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵PID:2832
-