Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
13-10-2021 15:05
Static task
static1
Behavioral task
behavioral1
Sample
5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe
Resource
win7-en-20210920
General
-
Target
5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe
-
Size
3.3MB
-
MD5
3dbcc2578008081544f897c8da00eb7a
-
SHA1
f4482885c164ec964cad395717306f09a0f68a63
-
SHA256
5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f
-
SHA512
93c4800e51a44770e1f16ecee997f05d213ee3276fcd5b04afe0a8ad274a77ec99539228a4d75d96c9bd9fb7dfb01df69b5ab17456725476207a25ba7e4f6952
Malware Config
Extracted
quasar
2.1.0.0
gen
zaidtheboii-50153.portmap.host:50153
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
Z0J9rVN8qwPnSK9m7RW5
-
install_name
OneDrive.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft OneDrive
-
subdirectory
Microsoft OneDrive
Signatures
-
Contains code to disable Windows Defender 7 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x000600000001321f-56.dat disable_win_def behavioral1/files/0x000600000001321f-59.dat disable_win_def behavioral1/files/0x000600000001321f-58.dat disable_win_def behavioral1/files/0x00050000000132e7-72.dat disable_win_def behavioral1/files/0x00050000000132e7-75.dat disable_win_def behavioral1/files/0x00050000000132e7-74.dat disable_win_def behavioral1/files/0x000600000001321f-138.dat disable_win_def -
Quasar Payload 7 IoCs
resource yara_rule behavioral1/files/0x000600000001321f-56.dat family_quasar behavioral1/files/0x000600000001321f-59.dat family_quasar behavioral1/files/0x000600000001321f-58.dat family_quasar behavioral1/files/0x00050000000132e7-72.dat family_quasar behavioral1/files/0x00050000000132e7-75.dat family_quasar behavioral1/files/0x00050000000132e7-74.dat family_quasar behavioral1/files/0x000600000001321f-138.dat family_quasar -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1980-92-0x000000001B460000-0x000000001B79B000-memory.dmp WebBrowserPassView behavioral1/files/0x00050000000138ce-124.dat WebBrowserPassView -
Nirsoft 5 IoCs
resource yara_rule behavioral1/memory/1980-92-0x000000001B460000-0x000000001B79B000-memory.dmp Nirsoft behavioral1/files/0x00050000000136db-99.dat Nirsoft behavioral1/files/0x0005000000013896-123.dat Nirsoft behavioral1/files/0x00050000000138a0-129.dat Nirsoft behavioral1/files/0x00050000000138ce-124.dat Nirsoft -
Executes dropped EXE 5 IoCs
pid Process 860 Microsoft OneDrive.exe 632 Node.js.exe 1576 OneDrive.exe 1980 RtkBtManServ.exe 696 Microsoft OneDrive.exe -
resource yara_rule behavioral1/files/0x0005000000013858-127.dat upx behavioral1/files/0x000500000001389a-125.dat upx -
Deletes itself 1 IoCs
pid Process 1404 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 860 Microsoft OneDrive.exe 632 Node.js.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features Microsoft OneDrive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Microsoft OneDrive.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft OneDrive.exe\"" Microsoft OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "\"C:\\Windows\\SysWOW64\\Microsoft OneDrive\\OneDrive.exe\"" OneDrive.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe Microsoft OneDrive.exe File opened for modification C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe Microsoft OneDrive.exe File created C:\Windows\SysWOW64\Microsoft OneDrive\r77-x64.dll Microsoft OneDrive.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1888 1980 WerFault.exe 37 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1968 schtasks.exe 1300 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Microsoft OneDrive.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde Microsoft OneDrive.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1724 PING.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1960 powershell.exe 860 Microsoft OneDrive.exe 860 Microsoft OneDrive.exe 860 Microsoft OneDrive.exe 860 Microsoft OneDrive.exe 860 Microsoft OneDrive.exe 860 Microsoft OneDrive.exe 860 Microsoft OneDrive.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 696 Microsoft OneDrive.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 860 Microsoft OneDrive.exe Token: SeDebugPrivilege 1576 OneDrive.exe Token: SeDebugPrivilege 1576 OneDrive.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 1980 RtkBtManServ.exe Token: SeDebugPrivilege 1888 WerFault.exe Token: SeDebugPrivilege 696 Microsoft OneDrive.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1576 OneDrive.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 1380 wrote to memory of 860 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 27 PID 1380 wrote to memory of 860 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 27 PID 1380 wrote to memory of 860 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 27 PID 1380 wrote to memory of 860 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 27 PID 1380 wrote to memory of 632 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 28 PID 1380 wrote to memory of 632 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 28 PID 1380 wrote to memory of 632 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 28 PID 1380 wrote to memory of 632 1380 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 28 PID 860 wrote to memory of 1300 860 Microsoft OneDrive.exe 30 PID 860 wrote to memory of 1300 860 Microsoft OneDrive.exe 30 PID 860 wrote to memory of 1300 860 Microsoft OneDrive.exe 30 PID 860 wrote to memory of 1300 860 Microsoft OneDrive.exe 30 PID 860 wrote to memory of 1576 860 Microsoft OneDrive.exe 32 PID 860 wrote to memory of 1576 860 Microsoft OneDrive.exe 32 PID 860 wrote to memory of 1576 860 Microsoft OneDrive.exe 32 PID 860 wrote to memory of 1576 860 Microsoft OneDrive.exe 32 PID 860 wrote to memory of 1960 860 Microsoft OneDrive.exe 33 PID 860 wrote to memory of 1960 860 Microsoft OneDrive.exe 33 PID 860 wrote to memory of 1960 860 Microsoft OneDrive.exe 33 PID 860 wrote to memory of 1960 860 Microsoft OneDrive.exe 33 PID 1576 wrote to memory of 1968 1576 OneDrive.exe 35 PID 1576 wrote to memory of 1968 1576 OneDrive.exe 35 PID 1576 wrote to memory of 1968 1576 OneDrive.exe 35 PID 1576 wrote to memory of 1968 1576 OneDrive.exe 35 PID 632 wrote to memory of 1980 632 Node.js.exe 37 PID 632 wrote to memory of 1980 632 Node.js.exe 37 PID 632 wrote to memory of 1980 632 Node.js.exe 37 PID 632 wrote to memory of 1980 632 Node.js.exe 37 PID 860 wrote to memory of 1876 860 Microsoft OneDrive.exe 38 PID 860 wrote to memory of 1876 860 Microsoft OneDrive.exe 38 PID 860 wrote to memory of 1876 860 Microsoft OneDrive.exe 38 PID 860 wrote to memory of 1876 860 Microsoft OneDrive.exe 38 PID 1876 wrote to memory of 1404 1876 cmd.exe 40 PID 1876 wrote to memory of 1404 1876 cmd.exe 40 PID 1876 wrote to memory of 1404 1876 cmd.exe 40 PID 1876 wrote to memory of 1404 1876 cmd.exe 40 PID 1980 wrote to memory of 1888 1980 RtkBtManServ.exe 41 PID 1980 wrote to memory of 1888 1980 RtkBtManServ.exe 41 PID 1980 wrote to memory of 1888 1980 RtkBtManServ.exe 41 PID 860 wrote to memory of 1464 860 Microsoft OneDrive.exe 44 PID 860 wrote to memory of 1464 860 Microsoft OneDrive.exe 44 PID 860 wrote to memory of 1464 860 Microsoft OneDrive.exe 44 PID 860 wrote to memory of 1464 860 Microsoft OneDrive.exe 44 PID 1464 wrote to memory of 1420 1464 cmd.exe 46 PID 1464 wrote to memory of 1420 1464 cmd.exe 46 PID 1464 wrote to memory of 1420 1464 cmd.exe 46 PID 1464 wrote to memory of 1420 1464 cmd.exe 46 PID 1464 wrote to memory of 1724 1464 cmd.exe 47 PID 1464 wrote to memory of 1724 1464 cmd.exe 47 PID 1464 wrote to memory of 1724 1464 cmd.exe 47 PID 1464 wrote to memory of 1724 1464 cmd.exe 47 PID 1464 wrote to memory of 696 1464 cmd.exe 48 PID 1464 wrote to memory of 696 1464 cmd.exe 48 PID 1464 wrote to memory of 696 1464 cmd.exe 48 PID 1464 wrote to memory of 696 1464 cmd.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe"C:\Users\Admin\AppData\Local\Temp\5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1300
-
-
C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe"C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1968
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- Deletes itself
PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7461CeYoxAzk.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1420
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:1724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Node.js.exe"C:\Users\Admin\AppData\Local\Temp\Node.js.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs6GlX4gI9pIzKuuw/DkrRWe6jXjwUh/h1n7EugqZqwNbSysR/yatrDqrNROKvQnbu5PjtNSMFXveJslpZPBkRK+GM+f311fJfdbzrHOKSr+bKzYP597NIEt8iS0xAesEdI=3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1980 -s 14044⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
-