Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
03-11-2021 19:15
Static task
static1
General
-
Target
70da41b661dc8de4e8cd1bde0f17f434433115bffad2fb762205b734acd4ed35.exe
-
Size
14KB
-
MD5
9860743c4ff83784de05aa8444594aed
-
SHA1
517ab424f9f6ee8de223e396691f1cb3b2d01a09
-
SHA256
70da41b661dc8de4e8cd1bde0f17f434433115bffad2fb762205b734acd4ed35
-
SHA512
cae8c9f056f7556d30e170caca7b4146baf00eaa32b6d2fac8659d2547d97e1461ee8cce0b123db02d5497faf9e12057d5daa530b4b8e722d73c66e769064b88
Malware Config
Extracted
quasar
1.4.0
helper
41.79.11.214:61032
307d89ac-968f-48de-a3b3-0c81d2cf4d4a
-
encryption_key
0D0F7891BD61AE0C503175723ADA783C9973F3B8
-
install_name
DllHelper.exe
-
log_directory
Logs
-
reconnect_delay
5000
-
startup_key
DllHelper
-
subdirectory
DllHelper
Signatures
-
Quasar Payload 4 IoCs
resource yara_rule behavioral1/files/0x000600000001abcc-116.dat family_quasar behavioral1/files/0x000600000001abcc-117.dat family_quasar behavioral1/files/0x000200000001abd5-123.dat family_quasar behavioral1/files/0x000200000001abd5-124.dat family_quasar -
suricata: ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1232 cbrqjjtd.exe 4052 DllHelper.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wmic.exe 70da41b661dc8de4e8cd1bde0f17f434433115bffad2fb762205b734acd4ed35.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wmic.exe 70da41b661dc8de4e8cd1bde0f17f434433115bffad2fb762205b734acd4ed35.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 api.ipify.org 26 api.ipify.org -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1780 schtasks.exe 624 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1232 cbrqjjtd.exe Token: SeDebugPrivilege 4052 DllHelper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4052 DllHelper.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3388 wrote to memory of 1232 3388 70da41b661dc8de4e8cd1bde0f17f434433115bffad2fb762205b734acd4ed35.exe 69 PID 3388 wrote to memory of 1232 3388 70da41b661dc8de4e8cd1bde0f17f434433115bffad2fb762205b734acd4ed35.exe 69 PID 1232 wrote to memory of 624 1232 cbrqjjtd.exe 70 PID 1232 wrote to memory of 624 1232 cbrqjjtd.exe 70 PID 1232 wrote to memory of 4052 1232 cbrqjjtd.exe 72 PID 1232 wrote to memory of 4052 1232 cbrqjjtd.exe 72 PID 4052 wrote to memory of 1780 4052 DllHelper.exe 74 PID 4052 wrote to memory of 1780 4052 DllHelper.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\70da41b661dc8de4e8cd1bde0f17f434433115bffad2fb762205b734acd4ed35.exe"C:\Users\Admin\AppData\Local\Temp\70da41b661dc8de4e8cd1bde0f17f434433115bffad2fb762205b734acd4ed35.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\cbrqjjtd.exeC:\Users\Admin\AppData\Local\Temp\cbrqjjtd.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DllHelper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\cbrqjjtd.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:624
-
-
C:\Users\Admin\AppData\Roaming\DllHelper\DllHelper.exe"C:\Users\Admin\AppData\Roaming\DllHelper\DllHelper.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DllHelper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\DllHelper\DllHelper.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1780
-
-
-