Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 04:54

General

  • Target

    quotation request.exe

  • Size

    843KB

  • MD5

    cd3cfa9918a2e273a9a7b0118955c4b3

  • SHA1

    289bbc79ffbf9717e7bf44cf83f3dd60d8a8e7f0

  • SHA256

    c73fabb2bf415973d0ed742e40260e327512da087231a6528714cdd15ac2205a

  • SHA512

    9f2a05c20eaf02378e0a4bf3b8ca3ab7cb3151b25efad52c52497a66569c3b7460f71ca7f924d3216e2f042ce72ea2ff5a6ae2a875d54948626c672fee8a5e11

  • SSDEEP

    12288:aAoRYHHtJPrc8BLcoraBIx2aHqX2SsHhEzBCs1Omijoo01:aANHHtpBtcQaSxhW2buz/Cjon

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\quotation request.exe
    "C:\Users\Admin\AppData\Local\Temp\quotation request.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\quotation request.exe
      "C:\Users\Admin\AppData\Local\Temp\quotation request.exe"
      2⤵
        PID:2936
      • C:\Users\Admin\AppData\Local\Temp\quotation request.exe
        "C:\Users\Admin\AppData\Local\Temp\quotation request.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 36
          3⤵
          • Program crash
          PID:2764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2132-6-0x0000000000990000-0x000000000099C000-memory.dmp

      Filesize

      48KB

    • memory/2132-0-0x0000000074DEE000-0x0000000074DEF000-memory.dmp

      Filesize

      4KB

    • memory/2132-2-0x0000000074DE0000-0x00000000754CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-3-0x0000000000980000-0x0000000000996000-memory.dmp

      Filesize

      88KB

    • memory/2132-4-0x0000000074DEE000-0x0000000074DEF000-memory.dmp

      Filesize

      4KB

    • memory/2132-5-0x0000000074DE0000-0x00000000754CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-1-0x0000000001070000-0x000000000114A000-memory.dmp

      Filesize

      872KB

    • memory/2132-7-0x00000000050C0000-0x000000000514E000-memory.dmp

      Filesize

      568KB

    • memory/2132-15-0x0000000074DE0000-0x00000000754CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-8-0x0000000000E20000-0x0000000000E54000-memory.dmp

      Filesize

      208KB

    • memory/2164-14-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2164-11-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2164-9-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2164-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB