Analysis
-
max time kernel
153s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
13-10-2021 15:05
Static task
static1
Behavioral task
behavioral1
Sample
5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe
Resource
win7-en-20210920
General
-
Target
5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe
-
Size
3.3MB
-
MD5
3dbcc2578008081544f897c8da00eb7a
-
SHA1
f4482885c164ec964cad395717306f09a0f68a63
-
SHA256
5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f
-
SHA512
93c4800e51a44770e1f16ecee997f05d213ee3276fcd5b04afe0a8ad274a77ec99539228a4d75d96c9bd9fb7dfb01df69b5ab17456725476207a25ba7e4f6952
Malware Config
Extracted
quasar
2.1.0.0
gen
zaidtheboii-50153.portmap.host:50153
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
Z0J9rVN8qwPnSK9m7RW5
-
install_name
OneDrive.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft OneDrive
-
subdirectory
Microsoft OneDrive
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x000500000001abb0-117.dat disable_win_def behavioral2/files/0x000500000001abb0-118.dat disable_win_def behavioral2/files/0x000400000001abcb-148.dat disable_win_def behavioral2/files/0x000400000001abcb-146.dat disable_win_def behavioral2/files/0x000500000001abb0-460.dat disable_win_def -
Quasar Payload 5 IoCs
resource yara_rule behavioral2/files/0x000500000001abb0-117.dat family_quasar behavioral2/files/0x000500000001abb0-118.dat family_quasar behavioral2/files/0x000400000001abcb-148.dat family_quasar behavioral2/files/0x000400000001abcb-146.dat family_quasar behavioral2/files/0x000500000001abb0-460.dat family_quasar -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/1792-139-0x00000178762C0000-0x00000178765FB000-memory.dmp WebBrowserPassView behavioral2/files/0x000200000001abdc-280.dat WebBrowserPassView behavioral2/files/0x000200000001abdc-281.dat WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral2/memory/1792-139-0x00000178762C0000-0x00000178765FB000-memory.dmp Nirsoft behavioral2/files/0x000200000001abdc-280.dat Nirsoft behavioral2/files/0x000200000001abdc-281.dat Nirsoft behavioral2/files/0x000600000001abd1-419.dat Nirsoft behavioral2/files/0x000600000001abd1-420.dat Nirsoft behavioral2/files/0x000700000001abd4-439.dat Nirsoft behavioral2/files/0x000700000001abd4-440.dat Nirsoft -
Executes dropped EXE 10 IoCs
pid Process 3312 Microsoft OneDrive.exe 1148 Node.js.exe 1792 RtkBtManServ.exe 3144 OneDrive.exe 3964 snuvcdsm.exe 1360 winhlp32.exe 2712 splwow64.exe 3176 hh.exe 3192 xwizard.exe 1400 Microsoft OneDrive.exe -
resource yara_rule behavioral2/files/0x000600000001abd0-392.dat upx behavioral2/files/0x000600000001abd0-393.dat upx behavioral2/files/0x000600000001abd3-397.dat upx behavioral2/files/0x000600000001abd3-398.dat upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Microsoft OneDrive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Microsoft OneDrive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft OneDrive.exe\"" Microsoft OneDrive.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe Microsoft OneDrive.exe File opened for modification C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe Microsoft OneDrive.exe File created C:\Windows\SysWOW64\Microsoft OneDrive\r77-x64.dll Microsoft OneDrive.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 616 schtasks.exe 2972 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings RtkBtManServ.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 824 PING.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3128 powershell.exe 3128 powershell.exe 3128 powershell.exe 3964 snuvcdsm.exe 3964 snuvcdsm.exe 3964 snuvcdsm.exe 3964 snuvcdsm.exe 3176 hh.exe 3176 hh.exe 3192 xwizard.exe 3192 xwizard.exe 3192 xwizard.exe 3192 xwizard.exe 3192 xwizard.exe 3192 xwizard.exe 3192 xwizard.exe 3192 xwizard.exe 3312 Microsoft OneDrive.exe 3312 Microsoft OneDrive.exe 3312 Microsoft OneDrive.exe 3312 Microsoft OneDrive.exe 3312 Microsoft OneDrive.exe 3312 Microsoft OneDrive.exe 3312 Microsoft OneDrive.exe 1400 Microsoft OneDrive.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3312 Microsoft OneDrive.exe Token: SeDebugPrivilege 1792 RtkBtManServ.exe Token: SeDebugPrivilege 3128 powershell.exe Token: SeDebugPrivilege 3144 OneDrive.exe Token: SeDebugPrivilege 3144 OneDrive.exe Token: SeDebugPrivilege 1400 Microsoft OneDrive.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3144 OneDrive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3312 1720 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 70 PID 1720 wrote to memory of 3312 1720 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 70 PID 1720 wrote to memory of 3312 1720 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 70 PID 1720 wrote to memory of 1148 1720 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 71 PID 1720 wrote to memory of 1148 1720 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 71 PID 1720 wrote to memory of 1148 1720 5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe 71 PID 1148 wrote to memory of 1792 1148 Node.js.exe 73 PID 1148 wrote to memory of 1792 1148 Node.js.exe 73 PID 3312 wrote to memory of 616 3312 Microsoft OneDrive.exe 74 PID 3312 wrote to memory of 616 3312 Microsoft OneDrive.exe 74 PID 3312 wrote to memory of 616 3312 Microsoft OneDrive.exe 74 PID 3312 wrote to memory of 3144 3312 Microsoft OneDrive.exe 76 PID 3312 wrote to memory of 3144 3312 Microsoft OneDrive.exe 76 PID 3312 wrote to memory of 3144 3312 Microsoft OneDrive.exe 76 PID 3312 wrote to memory of 3128 3312 Microsoft OneDrive.exe 77 PID 3312 wrote to memory of 3128 3312 Microsoft OneDrive.exe 77 PID 3312 wrote to memory of 3128 3312 Microsoft OneDrive.exe 77 PID 3144 wrote to memory of 2972 3144 OneDrive.exe 79 PID 3144 wrote to memory of 2972 3144 OneDrive.exe 79 PID 3144 wrote to memory of 2972 3144 OneDrive.exe 79 PID 1792 wrote to memory of 888 1792 RtkBtManServ.exe 82 PID 1792 wrote to memory of 888 1792 RtkBtManServ.exe 82 PID 888 wrote to memory of 2020 888 WScript.exe 83 PID 888 wrote to memory of 2020 888 WScript.exe 83 PID 2020 wrote to memory of 3964 2020 cmd.exe 85 PID 2020 wrote to memory of 3964 2020 cmd.exe 85 PID 2020 wrote to memory of 3964 2020 cmd.exe 85 PID 1792 wrote to memory of 1512 1792 RtkBtManServ.exe 86 PID 1792 wrote to memory of 1512 1792 RtkBtManServ.exe 86 PID 1512 wrote to memory of 1120 1512 WScript.exe 87 PID 1512 wrote to memory of 1120 1512 WScript.exe 87 PID 1120 wrote to memory of 1360 1120 cmd.exe 89 PID 1120 wrote to memory of 1360 1120 cmd.exe 89 PID 1120 wrote to memory of 1360 1120 cmd.exe 89 PID 1120 wrote to memory of 2712 1120 cmd.exe 90 PID 1120 wrote to memory of 2712 1120 cmd.exe 90 PID 1120 wrote to memory of 2712 1120 cmd.exe 90 PID 1120 wrote to memory of 3176 1120 cmd.exe 91 PID 1120 wrote to memory of 3176 1120 cmd.exe 91 PID 1120 wrote to memory of 3176 1120 cmd.exe 91 PID 1792 wrote to memory of 2108 1792 RtkBtManServ.exe 92 PID 1792 wrote to memory of 2108 1792 RtkBtManServ.exe 92 PID 2108 wrote to memory of 3616 2108 WScript.exe 93 PID 2108 wrote to memory of 3616 2108 WScript.exe 93 PID 3616 wrote to memory of 3192 3616 cmd.exe 95 PID 3616 wrote to memory of 3192 3616 cmd.exe 95 PID 3616 wrote to memory of 3192 3616 cmd.exe 95 PID 1792 wrote to memory of 2660 1792 RtkBtManServ.exe 96 PID 1792 wrote to memory of 2660 1792 RtkBtManServ.exe 96 PID 2660 wrote to memory of 2848 2660 cmd.exe 98 PID 2660 wrote to memory of 2848 2660 cmd.exe 98 PID 3312 wrote to memory of 1712 3312 Microsoft OneDrive.exe 99 PID 3312 wrote to memory of 1712 3312 Microsoft OneDrive.exe 99 PID 3312 wrote to memory of 1712 3312 Microsoft OneDrive.exe 99 PID 1712 wrote to memory of 3172 1712 cmd.exe 101 PID 1712 wrote to memory of 3172 1712 cmd.exe 101 PID 1712 wrote to memory of 3172 1712 cmd.exe 101 PID 3312 wrote to memory of 2292 3312 Microsoft OneDrive.exe 104 PID 3312 wrote to memory of 2292 3312 Microsoft OneDrive.exe 104 PID 3312 wrote to memory of 2292 3312 Microsoft OneDrive.exe 104 PID 2292 wrote to memory of 3984 2292 cmd.exe 106 PID 2292 wrote to memory of 3984 2292 cmd.exe 106 PID 2292 wrote to memory of 3984 2292 cmd.exe 106 PID 2292 wrote to memory of 824 2292 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe"C:\Users\Admin\AppData\Local\Temp\5263b2b6ca33bcccd88c65c8d88191e1d564f421e27a6a63ce9935bc78dc524f.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"2⤵
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:616
-
-
C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe"C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Windows\SysWOW64\Microsoft OneDrive\OneDrive.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:2972
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵PID:3172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y9LRaPCR9oPk.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3984
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:824
-
-
C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Node.js.exe"C:\Users\Admin\AppData\Local\Temp\Node.js.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs6GlX4gI9pIzKuuw/DkrRWe6jXjwUh/h1n7EugqZqwNbSysR/yatrDqrNROKvQnbu5PjtNSMFXveJslpZPBkRK+GM+f311fJfdbzrHOKSr+bKzYP597NIEt8iS0xAesEdI=3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exeC:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\winhlp32.exeC:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"6⤵
- Executes dropped EXE
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\splwow64.exeC:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"6⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat5⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\xwizard.exeC:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 35⤵PID:2848
-
-
-
-