Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10_x64 -
resource
win10-en -
submitted
08-09-2021 09:07
Behavioral task
behavioral1
Sample
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe
Resource
win7-en
General
-
Target
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe
-
Size
814KB
-
MD5
303ea82c0a37e377879a61a6d403ab48
-
SHA1
f3f542e801ae5a7689864d974e1b4776468acbe2
-
SHA256
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05
-
SHA512
d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279
Malware Config
Extracted
quasar
2.1.0.0
Client
spicy-scissors.auto.playit.gg:40602
VNM_MUTEX_ZPezzH7q77HhYvgQHf
-
encryption_key
qDSGWka1LfDTYuj2fN6F
-
install_name
GNU.exe
-
log_directory
Logs
-
reconnect_delay
2500
-
startup_key
Windows Security
-
subdirectory
Ubuntu
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/files/0x000400000001aaf0-125.dat disable_win_def behavioral2/files/0x000400000001aaf0-126.dat disable_win_def -
Quasar Payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000400000001aaf0-125.dat family_quasar behavioral2/files/0x000400000001aaf0-126.dat family_quasar -
Executes dropped EXE 1 IoCs
Processes:
GNU.exepid Process 3184 GNU.exe -
Processes:
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3584 schtasks.exe 4084 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exee9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exee9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exepid Process 2108 powershell.exe 2108 powershell.exe 2108 powershell.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 1476 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exepowershell.exeGNU.exee9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exedescription pid Process Token: SeDebugPrivilege 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 3184 GNU.exe Token: SeDebugPrivilege 3184 GNU.exe Token: SeDebugPrivilege 1476 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
GNU.exepid Process 3184 GNU.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exeGNU.execmd.execmd.exedescription pid Process procid_target PID 3692 wrote to memory of 3584 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 76 PID 3692 wrote to memory of 3584 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 76 PID 3692 wrote to memory of 3584 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 76 PID 3692 wrote to memory of 3184 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 78 PID 3692 wrote to memory of 3184 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 78 PID 3692 wrote to memory of 3184 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 78 PID 3692 wrote to memory of 2108 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 79 PID 3692 wrote to memory of 2108 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 79 PID 3692 wrote to memory of 2108 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 79 PID 3184 wrote to memory of 4084 3184 GNU.exe 81 PID 3184 wrote to memory of 4084 3184 GNU.exe 81 PID 3184 wrote to memory of 4084 3184 GNU.exe 81 PID 3692 wrote to memory of 2508 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 86 PID 3692 wrote to memory of 2508 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 86 PID 3692 wrote to memory of 2508 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 86 PID 2508 wrote to memory of 3884 2508 cmd.exe 88 PID 2508 wrote to memory of 3884 2508 cmd.exe 88 PID 2508 wrote to memory of 3884 2508 cmd.exe 88 PID 3692 wrote to memory of 2052 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 89 PID 3692 wrote to memory of 2052 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 89 PID 3692 wrote to memory of 2052 3692 e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe 89 PID 2052 wrote to memory of 2520 2052 cmd.exe 91 PID 2052 wrote to memory of 2520 2052 cmd.exe 91 PID 2052 wrote to memory of 2520 2052 cmd.exe 91 PID 2052 wrote to memory of 1284 2052 cmd.exe 92 PID 2052 wrote to memory of 1284 2052 cmd.exe 92 PID 2052 wrote to memory of 1284 2052 cmd.exe 92 PID 2052 wrote to memory of 1476 2052 cmd.exe 93 PID 2052 wrote to memory of 1476 2052 cmd.exe 93 PID 2052 wrote to memory of 1476 2052 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"1⤵
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3584
-
-
C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe"C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Ubuntu\GNU.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4084
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\egLDFswknq7E.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2520
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"C:\Users\Admin\AppData\Local\Temp\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe.log
MD51efce85e583a7a2f123317a20f889d04
SHA160f71aa73ea2e2a48ed1c17e3c6d440abf39c914
SHA2562b5532a94879134a876b11c188ade1a61deaba6a80fe1f3a3a77cc442f1cca0d
SHA51245a5cd283e6a6ac34c3d8b1a6d73dc1cf52d8c974cf84624e8e9924eddaf354ccda929bce728b47db2b62175e47bdc3eaca6bc6b84d3565881fa87c50319d24c
-
MD5
c86aa0893489e0ed7a3a86bf33c31311
SHA1359128cdf0fa420a8c8fc1e9616aac4ac39416a2
SHA2562bce06f76216cf7099ed6b604df2f948e8c049f91335519436558943a3814611
SHA512628f7655d67559a713c586742fdb1080eecba095cd2d6d9673f12aa135f6d09db3288b9f352dc373125433b330bd7a568bd0b09b4050e4dea3f39d632b59f817
-
MD5
303ea82c0a37e377879a61a6d403ab48
SHA1f3f542e801ae5a7689864d974e1b4776468acbe2
SHA256e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05
SHA512d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279
-
MD5
303ea82c0a37e377879a61a6d403ab48
SHA1f3f542e801ae5a7689864d974e1b4776468acbe2
SHA256e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05
SHA512d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279