Analysis

  • max time kernel
    161s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    08-09-2021 09:07

General

  • Target

    e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe

  • Size

    814KB

  • MD5

    303ea82c0a37e377879a61a6d403ab48

  • SHA1

    f3f542e801ae5a7689864d974e1b4776468acbe2

  • SHA256

    e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05

  • SHA512

    d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Client

C2

spicy-scissors.auto.playit.gg:40602

Mutex

VNM_MUTEX_ZPezzH7q77HhYvgQHf

Attributes
  • encryption_key

    qDSGWka1LfDTYuj2fN6F

  • install_name

    GNU.exe

  • log_directory

    Logs

  • reconnect_delay

    2500

  • startup_key

    Windows Security

  • subdirectory

    Ubuntu

Signatures

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 3 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe
    "C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"
    1⤵
    • Loads dropped DLL
    • Windows security modification
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:276
    • C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe
      "C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1084
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1756
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
        3⤵
          PID:1700
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\20rsZbkZzL24.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          3⤵
            PID:840
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 10 localhost
            3⤵
            • Runs ping.exe
            PID:1032
          • C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe
            "C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:556

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\20rsZbkZzL24.bat

        MD5

        03d387b2b536962bf38d403a5e2edb19

        SHA1

        f1b2952d8e5c3877d65ed5ea56a4b4d4cf2b1707

        SHA256

        ff12630e20dd0e377f32fb71b3448517707dc417810cf3a51fde0c913d69b2ec

        SHA512

        8b3698e78d91054382caf9dc4b1adba1216efdb875c74f5ffe0205828c8e9386a3d1669fac5796909f554dc2570a6049f4e21054a7bf57bfc6668e2f23990d7f

      • C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe

        MD5

        303ea82c0a37e377879a61a6d403ab48

        SHA1

        f3f542e801ae5a7689864d974e1b4776468acbe2

        SHA256

        e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05

        SHA512

        d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279

      • C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe

        MD5

        303ea82c0a37e377879a61a6d403ab48

        SHA1

        f3f542e801ae5a7689864d974e1b4776468acbe2

        SHA256

        e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05

        SHA512

        d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279

      • \Users\Admin\AppData\Roaming\Ubuntu\GNU.exe

        MD5

        303ea82c0a37e377879a61a6d403ab48

        SHA1

        f3f542e801ae5a7689864d974e1b4776468acbe2

        SHA256

        e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05

        SHA512

        d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279

      • memory/112-65-0x0000000000500000-0x0000000000501000-memory.dmp

        Filesize

        4KB

      • memory/112-58-0x0000000000000000-mapping.dmp

      • memory/112-62-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

        Filesize

        4KB

      • memory/276-56-0x0000000000000000-mapping.dmp

      • memory/436-72-0x0000000000000000-mapping.dmp

      • memory/556-79-0x0000000000C10000-0x0000000000C11000-memory.dmp

        Filesize

        4KB

      • memory/556-76-0x0000000000000000-mapping.dmp

      • memory/840-74-0x0000000000000000-mapping.dmp

      • memory/852-53-0x0000000000D20000-0x0000000000D21000-memory.dmp

        Filesize

        4KB

      • memory/852-55-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

        Filesize

        4KB

      • memory/1032-75-0x0000000000000000-mapping.dmp

      • memory/1084-67-0x0000000000000000-mapping.dmp

      • memory/1700-71-0x0000000000000000-mapping.dmp

      • memory/1756-64-0x0000000075B51000-0x0000000075B53000-memory.dmp

        Filesize

        8KB

      • memory/1756-69-0x0000000001E82000-0x0000000001E84000-memory.dmp

        Filesize

        8KB

      • memory/1756-68-0x0000000001E81000-0x0000000001E82000-memory.dmp

        Filesize

        4KB

      • memory/1756-66-0x0000000001E80000-0x0000000001E81000-memory.dmp

        Filesize

        4KB

      • memory/1756-61-0x0000000000000000-mapping.dmp

      • memory/1992-70-0x0000000000000000-mapping.dmp