Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Request for Quotation.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Request for Quotation.exe
-
Size
813KB
-
MD5
aa574ed0656465c43af1746edb63d444
-
SHA1
ced45184631fd4a5dd35c4460eff67c7e494381a
-
SHA256
34cb680a202b85f7c3e56c56951d100280404b0ad1df153db134a93849c031b4
-
SHA512
e6e14ad30436ecbe6d44925ea3b842d809b5544bf474ad7067bd20d8373c6f95e7eacfdeae1a0bea0ad116dc4d96b33645593f20c08109b00cdfad5a98aa4f14
-
SSDEEP
24576:E1Maxj0GNV2K612jmPqDcKWaeK3a7IPDcLJM:EmaOGNC12UqDcKWaVPAG
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3096 set thread context of 2160 3096 Request for Quotation.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request for Quotation.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe 2160 Request for Quotation.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3096 wrote to memory of 2160 3096 Request for Quotation.exe 91 PID 3096 wrote to memory of 2160 3096 Request for Quotation.exe 91 PID 3096 wrote to memory of 2160 3096 Request for Quotation.exe 91 PID 3096 wrote to memory of 2160 3096 Request for Quotation.exe 91 PID 3096 wrote to memory of 2160 3096 Request for Quotation.exe 91 PID 3096 wrote to memory of 2160 3096 Request for Quotation.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-