Analysis
-
max time kernel
103s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2025, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION022450.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION022450.exe
Resource
win10v2004-20250313-en
General
-
Target
QUOTATION022450.exe
-
Size
1.3MB
-
MD5
b22d066dc7407e782268c2b465401d29
-
SHA1
3f9acf93951ac8c569dc6125031af1e353771b3c
-
SHA256
9938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b
-
SHA512
5832d068b1f503c1091af1b283c97fa101c4fa546c38416c9a191da684815824c03325371ef0d89666eac3e3310efe448ed7ac2810ba402e7a7bb6d533bffbe5
-
SSDEEP
24576:du6J33O0c+JY5UZ+XC0kGso6FaR0iNiQWBTL+WY:vu0c++OCvkGs9FaRDNibVY
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rhombical.vbs rhombical.exe -
Executes dropped EXE 1 IoCs
pid Process 5160 rhombical.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000024219-9.dat autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4972 5160 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION022450.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhombical.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2160 QUOTATION022450.exe 2160 QUOTATION022450.exe 5160 rhombical.exe 5160 rhombical.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2160 QUOTATION022450.exe 2160 QUOTATION022450.exe 5160 rhombical.exe 5160 rhombical.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2160 wrote to memory of 5160 2160 QUOTATION022450.exe 88 PID 2160 wrote to memory of 5160 2160 QUOTATION022450.exe 88 PID 2160 wrote to memory of 5160 2160 QUOTATION022450.exe 88 PID 5160 wrote to memory of 3244 5160 rhombical.exe 89 PID 5160 wrote to memory of 3244 5160 rhombical.exe 89 PID 5160 wrote to memory of 3244 5160 rhombical.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION022450.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION022450.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\stickers\rhombical.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION022450.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5160 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION022450.exe"3⤵PID:3244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 6963⤵
- Program crash
PID:4972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5160 -ip 51601⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b22d066dc7407e782268c2b465401d29
SHA13f9acf93951ac8c569dc6125031af1e353771b3c
SHA2569938c0da9c07f8ac35c6459e1dc988c64e10ddc70f4e95db63e34422d14e764b
SHA5125832d068b1f503c1091af1b283c97fa101c4fa546c38416c9a191da684815824c03325371ef0d89666eac3e3310efe448ed7ac2810ba402e7a7bb6d533bffbe5