Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10_x64 -
resource
win10-en -
submitted
08-09-2021 09:07
Behavioral task
behavioral1
Sample
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe
Resource
win7-en
General
-
Target
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe
-
Size
814KB
-
MD5
303ea82c0a37e377879a61a6d403ab48
-
SHA1
f3f542e801ae5a7689864d974e1b4776468acbe2
-
SHA256
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05
-
SHA512
d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279
Malware Config
Extracted
quasar
2.1.0.0
Client
spicy-scissors.auto.playit.gg:40602
VNM_MUTEX_ZPezzH7q77HhYvgQHf
-
encryption_key
qDSGWka1LfDTYuj2fN6F
-
install_name
GNU.exe
-
log_directory
Logs
-
reconnect_delay
2500
-
startup_key
Windows Security
-
subdirectory
Ubuntu
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x000400000001aaf0-125.dat disable_win_def behavioral2/files/0x000400000001aaf0-126.dat disable_win_def -
Quasar Payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001aaf0-125.dat family_quasar behavioral2/files/0x000400000001aaf0-126.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3184 GNU.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3584 schtasks.exe 4084 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1284 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2108 powershell.exe 2108 powershell.exe 2108 powershell.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 1476 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 3184 GNU.exe Token: SeDebugPrivilege 3184 GNU.exe Token: SeDebugPrivilege 1476 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3184 GNU.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3692 wrote to memory of 3584 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 76 PID 3692 wrote to memory of 3584 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 76 PID 3692 wrote to memory of 3584 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 76 PID 3692 wrote to memory of 3184 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 78 PID 3692 wrote to memory of 3184 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 78 PID 3692 wrote to memory of 3184 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 78 PID 3692 wrote to memory of 2108 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 79 PID 3692 wrote to memory of 2108 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 79 PID 3692 wrote to memory of 2108 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 79 PID 3184 wrote to memory of 4084 3184 GNU.exe 81 PID 3184 wrote to memory of 4084 3184 GNU.exe 81 PID 3184 wrote to memory of 4084 3184 GNU.exe 81 PID 3692 wrote to memory of 2508 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 86 PID 3692 wrote to memory of 2508 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 86 PID 3692 wrote to memory of 2508 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 86 PID 2508 wrote to memory of 3884 2508 cmd.exe 88 PID 2508 wrote to memory of 3884 2508 cmd.exe 88 PID 2508 wrote to memory of 3884 2508 cmd.exe 88 PID 3692 wrote to memory of 2052 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 89 PID 3692 wrote to memory of 2052 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 89 PID 3692 wrote to memory of 2052 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 89 PID 2052 wrote to memory of 2520 2052 cmd.exe 91 PID 2052 wrote to memory of 2520 2052 cmd.exe 91 PID 2052 wrote to memory of 2520 2052 cmd.exe 91 PID 2052 wrote to memory of 1284 2052 cmd.exe 92 PID 2052 wrote to memory of 1284 2052 cmd.exe 92 PID 2052 wrote to memory of 1284 2052 cmd.exe 92 PID 2052 wrote to memory of 1476 2052 cmd.exe 93 PID 2052 wrote to memory of 1476 2052 cmd.exe 93 PID 2052 wrote to memory of 1476 2052 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"1⤵
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3584
-
-
C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe"C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4084
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\egLDFswknq7E.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2520
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-