Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 03:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
QUOTATIONSEPQTRA071244PDF.scr.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
QUOTATIONSEPQTRA071244PDF.scr.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
QUOTATIONSEPQTRA071244PDF.scr.exe
-
Size
368KB
-
MD5
51f72822ddf3ea7523d116ff4328c22f
-
SHA1
70e22a50a272f9cecac73153e812fa9d140edd4d
-
SHA256
5f3215ad04a8277ce78a17ea870beb4189e6fee16f36942c25d98ca24e9166e9
-
SHA512
9bc35c63f3fbf48d362d7132925d27880333a13e2cdc2b0cbd9f1040475b410701aa1791504f92559622f44d99ab5cd3ece37ec7b8682685fc86e69b0937540b
-
SSDEEP
384:OJGY/HAGNn06CjFN8P3YsU6fCWYA8S/hs/E2sofOh/Q0RbnqRGt/KzVtBBU:OJVdNdM8sScR9ApqcAg
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2900 QUOTATIONSEPQTRA071244PDF.scr.exe 2900 QUOTATIONSEPQTRA071244PDF.scr.exe 2900 QUOTATIONSEPQTRA071244PDF.scr.exe 2900 QUOTATIONSEPQTRA071244PDF.scr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2900 QUOTATIONSEPQTRA071244PDF.scr.exe Token: SeDebugPrivilege 2900 QUOTATIONSEPQTRA071244PDF.scr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1868 2900 QUOTATIONSEPQTRA071244PDF.scr.exe 32 PID 2900 wrote to memory of 1868 2900 QUOTATIONSEPQTRA071244PDF.scr.exe 32 PID 2900 wrote to memory of 1868 2900 QUOTATIONSEPQTRA071244PDF.scr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATIONSEPQTRA071244PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATIONSEPQTRA071244PDF.scr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2900 -s 16722⤵PID:1868
-