Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-09-2021 18:19
Static task
static1
Behavioral task
behavioral1
Sample
1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe
Resource
win7v20210408
General
-
Target
1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe
-
Size
546KB
-
MD5
099bce8eba599fd7262af4fe930ab098
-
SHA1
ccdfce07b8ca10a2b33e670dc09550e0b43d5dcb
-
SHA256
1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8
-
SHA512
3b9aa646ba2862bbd1644ed62034dcf4ff3a6d4b9f63ecc95281832dfbc03cd96c4a1894150ea45b4288abd9eae9a7ee2fa01634a3d7232c169d4c7e3681e345
Malware Config
Extracted
quasar
2.1.0.0
Office04
10.0.0.74:1177
VNM_MUTEX_DweppWsG4TQ0OOm4Hi
-
encryption_key
G5PWQxh2RxlVLvkDxu7P
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/files/0x000700000001aba7-116.dat disable_win_def behavioral2/files/0x000700000001aba7-117.dat disable_win_def -
Quasar Payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000700000001aba7-116.dat family_quasar behavioral2/files/0x000700000001aba7-117.dat family_quasar -
Executes dropped EXE 1 IoCs
Processes:
$77-Venom.exepid Process 2156 $77-Venom.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
$77-Venom.exedescription pid Process Token: SeDebugPrivilege 2156 $77-Venom.exe Token: SeDebugPrivilege 2156 $77-Venom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exedescription pid Process procid_target PID 1952 wrote to memory of 2156 1952 1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe 69 PID 1952 wrote to memory of 2156 1952 1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe 69 PID 1952 wrote to memory of 2156 1952 1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe"C:\Users\Admin\AppData\Local\Temp\1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\$77-Venom.exe"C:\Users\Admin\AppData\Roaming\$77-Venom.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
eab7a704a7bea20eaa5494acecaada27
SHA1f6ca815c1e4f567b55609d7785b26f510cf86402
SHA2562cfa1686bbe1abeca02cc0009a8cdc523343814758fa621854fd6ef8fc2235a5
SHA5128989eee40ee97463b3dcd2823cdc687d0918791490f1f39f81ac4e8ce9484681bb18bef906b5e833261f304ddfdb6da711acbeedb8007bf1de1eda87bc99cfbf
-
MD5
eab7a704a7bea20eaa5494acecaada27
SHA1f6ca815c1e4f567b55609d7785b26f510cf86402
SHA2562cfa1686bbe1abeca02cc0009a8cdc523343814758fa621854fd6ef8fc2235a5
SHA5128989eee40ee97463b3dcd2823cdc687d0918791490f1f39f81ac4e8ce9484681bb18bef906b5e833261f304ddfdb6da711acbeedb8007bf1de1eda87bc99cfbf