Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Request for Quotation.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Request for Quotation.exe
-
Size
813KB
-
MD5
aa574ed0656465c43af1746edb63d444
-
SHA1
ced45184631fd4a5dd35c4460eff67c7e494381a
-
SHA256
34cb680a202b85f7c3e56c56951d100280404b0ad1df153db134a93849c031b4
-
SHA512
e6e14ad30436ecbe6d44925ea3b842d809b5544bf474ad7067bd20d8373c6f95e7eacfdeae1a0bea0ad116dc4d96b33645593f20c08109b00cdfad5a98aa4f14
-
SSDEEP
24576:E1Maxj0GNV2K612jmPqDcKWaeK3a7IPDcLJM:EmaOGNC12UqDcKWaVPAG
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2344 set thread context of 1656 2344 Request for Quotation.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request for Quotation.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1656 Request for Quotation.exe 1656 Request for Quotation.exe 1656 Request for Quotation.exe 1656 Request for Quotation.exe 1656 Request for Quotation.exe 1656 Request for Quotation.exe 1656 Request for Quotation.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1656 2344 Request for Quotation.exe 31 PID 2344 wrote to memory of 1656 2344 Request for Quotation.exe 31 PID 2344 wrote to memory of 1656 2344 Request for Quotation.exe 31 PID 2344 wrote to memory of 1656 2344 Request for Quotation.exe 31 PID 2344 wrote to memory of 1656 2344 Request for Quotation.exe 31 PID 2344 wrote to memory of 1656 2344 Request for Quotation.exe 31 PID 2344 wrote to memory of 1656 2344 Request for Quotation.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-