Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-09-2021 18:19
Static task
static1
Behavioral task
behavioral1
Sample
1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe
Resource
win7v20210408
General
-
Target
1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe
-
Size
546KB
-
MD5
099bce8eba599fd7262af4fe930ab098
-
SHA1
ccdfce07b8ca10a2b33e670dc09550e0b43d5dcb
-
SHA256
1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8
-
SHA512
3b9aa646ba2862bbd1644ed62034dcf4ff3a6d4b9f63ecc95281832dfbc03cd96c4a1894150ea45b4288abd9eae9a7ee2fa01634a3d7232c169d4c7e3681e345
Malware Config
Extracted
quasar
2.1.0.0
Office04
10.0.0.74:1177
VNM_MUTEX_DweppWsG4TQ0OOm4Hi
-
encryption_key
G5PWQxh2RxlVLvkDxu7P
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x000700000001aba7-116.dat disable_win_def behavioral2/files/0x000700000001aba7-117.dat disable_win_def -
Quasar Payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000001aba7-116.dat family_quasar behavioral2/files/0x000700000001aba7-117.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2156 $77-Venom.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2156 $77-Venom.exe Token: SeDebugPrivilege 2156 $77-Venom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2156 1952 1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe 69 PID 1952 wrote to memory of 2156 1952 1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe 69 PID 1952 wrote to memory of 2156 1952 1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe"C:\Users\Admin\AppData\Local\Temp\1c7f91a5e04f5c80a1c9ec36a0b6a78e762359236ac67a5ea57c4083f44339c8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\$77-Venom.exe"C:\Users\Admin\AppData\Roaming\$77-Venom.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156
-