Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
14-06-2021 16:02
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENT.EXE
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
DOCUMENT.EXE
-
Size
1.1MB
-
MD5
53964b6a40bfe2b10d36ba5e3d52966a
-
SHA1
b459111cfb08fb42238e8421583cea226226e769
-
SHA256
4dcc4adaa8c709d9db205c7267ec6da26930c0420aa54a77fed6217a9e6fdb98
-
SHA512
03847f73a33a43bf84666db4a70167506d17b567f404098fd5237b704d30d1b35d7d50d2812a1f5c1b735bf13b915a448e3be9f8af9c3cc253f8ae6eacc3fea8
Malware Config
Signatures
-
Quasar Payload 2 IoCs
resource yara_rule behavioral2/memory/4116-126-0x000000000045819E-mapping.dmp family_quasar behavioral2/memory/4116-125-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4444 set thread context of 4116 4444 DOCUMENT.EXE 79 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4116 DOCUMENT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4116 DOCUMENT.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4116 4444 DOCUMENT.EXE 79 PID 4444 wrote to memory of 4116 4444 DOCUMENT.EXE 79 PID 4444 wrote to memory of 4116 4444 DOCUMENT.EXE 79 PID 4444 wrote to memory of 4116 4444 DOCUMENT.EXE 79 PID 4444 wrote to memory of 4116 4444 DOCUMENT.EXE 79 PID 4444 wrote to memory of 4116 4444 DOCUMENT.EXE 79 PID 4444 wrote to memory of 4116 4444 DOCUMENT.EXE 79 PID 4444 wrote to memory of 4116 4444 DOCUMENT.EXE 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE"C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE"C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4116
-