Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
need quotations.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
need quotations.exe
Resource
win10v2004-20241007-en
General
-
Target
need quotations.exe
-
Size
1.2MB
-
MD5
2b4391106cb993ad3fa94fff2d39c70c
-
SHA1
cc46179bcd3b71e6ee6a08d64cb2c1110cb08535
-
SHA256
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46
-
SHA512
93e196b7214d8a605d95d884f6200affcdd8ae909e81aeec6bf0505799c448949624ddf25a9b0286e433febd81487f4b2b9c92d61c809a41c8ba15b74f77a944
-
SSDEEP
24576:Ytb20pkaCqT5TBWgNQ7auxfOdknzcWCd/Xd106A:hVg5tQ7aux2dknzcWCdPdi5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1064 set thread context of 5076 1064 need quotations.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language need quotations.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe 5076 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1064 need quotations.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1064 need quotations.exe 1064 need quotations.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1064 need quotations.exe 1064 need quotations.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 5076 1064 need quotations.exe 83 PID 1064 wrote to memory of 5076 1064 need quotations.exe 83 PID 1064 wrote to memory of 5076 1064 need quotations.exe 83 PID 1064 wrote to memory of 5076 1064 need quotations.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\need quotations.exe"C:\Users\Admin\AppData\Local\Temp\need quotations.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\need quotations.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD55ce8b0929dc268b24a0fa11d68ea5749
SHA15a2317186d0d2bd103a31969ee69f3ded0ff0057
SHA256406b381696d6e56a0dd7f0be3239f775aecb9be0e6c58e9f93b382e9193123df
SHA512a75b3393290675d7bb03b3b595e0467a9f169f31803e16028f9f8d5e8ee51386f01737015e918d00c1a292d3bd12fe128b79e47b14e7e0293efea493ac7518c4