Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION_SEPQTRA071244.PDF.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION_SEPQTRA071244.PDF.scr
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
QUOTATION_SEPQTRA071244.PDF.scr
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
QUOTATION_SEPQTRA071244.PDF.scr
Resource
win11-20240802-en
General
-
Target
QUOTATION_SEPQTRA071244.PDF.scr
-
Size
368KB
-
MD5
51f72822ddf3ea7523d116ff4328c22f
-
SHA1
70e22a50a272f9cecac73153e812fa9d140edd4d
-
SHA256
5f3215ad04a8277ce78a17ea870beb4189e6fee16f36942c25d98ca24e9166e9
-
SHA512
9bc35c63f3fbf48d362d7132925d27880333a13e2cdc2b0cbd9f1040475b410701aa1791504f92559622f44d99ab5cd3ece37ec7b8682685fc86e69b0937540b
-
SSDEEP
384:OJGY/HAGNn06CjFN8P3YsU6fCWYA8S/hs/E2sofOh/Q0RbnqRGt/KzVtBBU:OJVdNdM8sScR9ApqcAg
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3008 QUOTATION_SEPQTRA071244.PDF.scr 3008 QUOTATION_SEPQTRA071244.PDF.scr 3008 QUOTATION_SEPQTRA071244.PDF.scr 3008 QUOTATION_SEPQTRA071244.PDF.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 QUOTATION_SEPQTRA071244.PDF.scr Token: SeDebugPrivilege 3008 QUOTATION_SEPQTRA071244.PDF.scr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1720 3008 QUOTATION_SEPQTRA071244.PDF.scr 32 PID 3008 wrote to memory of 1720 3008 QUOTATION_SEPQTRA071244.PDF.scr 32 PID 3008 wrote to memory of 1720 3008 QUOTATION_SEPQTRA071244.PDF.scr 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION_SEPQTRA071244.PDF.scr"C:\Users\Admin\AppData\Local\Temp\QUOTATION_SEPQTRA071244.PDF.scr" /S1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3008 -s 16682⤵PID:1720
-