Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    05-12-2020 02:51

General

  • Target

    CDC GUIDES COVID-19 Second Outbreak Warning release.exe

  • Size

    630KB

  • MD5

    dc8d9c9a86fe4830053697c1dc59dc6f

  • SHA1

    a63fa3cc878efe75ecf849111c3e3d417fef4fdd

  • SHA256

    5dcd1649d97e0da882778ec70677be52b49603b6596b044518f02c278d93d0f2

  • SHA512

    8f91aca4b85d53745f395888ffb8e2d5f17f06afc7e302f2ed19c840377c70ef807ba14748fefd2a756b27b54808651087fbcba572f0d162b06c8a0e9283ef8c

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
    "C:\Users\Admin\AppData\Local\Temp\CDC GUIDES COVID-19 Second Outbreak Warning release.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      "C:\Users\Admin\AppData\Local\Temp\CDC GUIDES COVID-19 Second Outbreak Warning release.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1464

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1464-8-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/1464-9-0x00000000004581DE-mapping.dmp
  • memory/1464-11-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/1464-10-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/1464-12-0x0000000073F40000-0x000000007462E000-memory.dmp
    Filesize

    6.9MB

  • memory/1744-2-0x0000000073F40000-0x000000007462E000-memory.dmp
    Filesize

    6.9MB

  • memory/1744-3-0x0000000001300000-0x0000000001301000-memory.dmp
    Filesize

    4KB

  • memory/1744-5-0x00000000011E0000-0x00000000012AF000-memory.dmp
    Filesize

    828KB

  • memory/1744-6-0x0000000000B00000-0x0000000000B67000-memory.dmp
    Filesize

    412KB

  • memory/1744-7-0x0000000000440000-0x0000000000456000-memory.dmp
    Filesize

    88KB