Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
07/01/2022, 10:21
Behavioral task
behavioral1
Sample
defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe
Resource
win7-en-20211208
General
-
Target
defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe
-
Size
637KB
-
MD5
3ae1b43ae183a646db68834676be741c
-
SHA1
e50bb029949247457a6c9faa31e38f1fb9dfd6ae
-
SHA256
defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19
-
SHA512
eb4f887d7e73f8130ae6d2f7cf27e6921a304b4a94ca50e2e747b7f057dd7d3e882556edf27dd1fdb625d0b74afc7d000702a034f258609ded97cd7940abfe70
Malware Config
Extracted
quasar
2.1.0.0
KRNL
127.0.0.1:4782
quadrad.duckdns.org:1604
VNM_MUTEX_w5oFkfEj8KXNrXmElF
-
encryption_key
HNAC3wR1K0TyDxzlsLfi
-
install_name
KRNL By IceBerg.exe
-
log_directory
Logs
-
reconnect_delay
100
-
startup_key
KRNL By IceBerg
-
subdirectory
Boostrapper
Signatures
-
Contains code to disable Windows Defender 9 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1772-54-0x0000000001360000-0x0000000001406000-memory.dmp disable_win_def behavioral1/memory/1772-55-0x0000000001360000-0x0000000001406000-memory.dmp disable_win_def behavioral1/files/0x00080000000121f5-59.dat disable_win_def behavioral1/files/0x00080000000121f5-61.dat disable_win_def behavioral1/files/0x00080000000121f5-62.dat disable_win_def behavioral1/memory/828-63-0x0000000000870000-0x0000000000916000-memory.dmp disable_win_def behavioral1/memory/828-64-0x0000000000870000-0x0000000000916000-memory.dmp disable_win_def behavioral1/memory/1512-81-0x0000000001360000-0x0000000001406000-memory.dmp disable_win_def behavioral1/memory/1512-80-0x0000000001360000-0x0000000001406000-memory.dmp disable_win_def -
Quasar Payload 9 IoCs
resource yara_rule behavioral1/memory/1772-54-0x0000000001360000-0x0000000001406000-memory.dmp family_quasar behavioral1/memory/1772-55-0x0000000001360000-0x0000000001406000-memory.dmp family_quasar behavioral1/files/0x00080000000121f5-59.dat family_quasar behavioral1/files/0x00080000000121f5-61.dat family_quasar behavioral1/files/0x00080000000121f5-62.dat family_quasar behavioral1/memory/828-63-0x0000000000870000-0x0000000000916000-memory.dmp family_quasar behavioral1/memory/828-64-0x0000000000870000-0x0000000000916000-memory.dmp family_quasar behavioral1/memory/1512-81-0x0000000001360000-0x0000000001406000-memory.dmp family_quasar behavioral1/memory/1512-80-0x0000000001360000-0x0000000001406000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 828 KRNL By IceBerg.exe -
Loads dropped DLL 1 IoCs
pid Process 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1428 schtasks.exe 992 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 912 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1980 powershell.exe 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 1512 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe Token: SeDebugPrivilege 828 KRNL By IceBerg.exe Token: SeDebugPrivilege 828 KRNL By IceBerg.exe Token: SeDebugPrivilege 1980 powershell.exe Token: SeDebugPrivilege 1512 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1428 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 28 PID 1772 wrote to memory of 1428 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 28 PID 1772 wrote to memory of 1428 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 28 PID 1772 wrote to memory of 1428 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 28 PID 1772 wrote to memory of 828 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 30 PID 1772 wrote to memory of 828 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 30 PID 1772 wrote to memory of 828 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 30 PID 1772 wrote to memory of 828 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 30 PID 1772 wrote to memory of 1980 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 31 PID 1772 wrote to memory of 1980 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 31 PID 1772 wrote to memory of 1980 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 31 PID 1772 wrote to memory of 1980 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 31 PID 828 wrote to memory of 992 828 KRNL By IceBerg.exe 33 PID 828 wrote to memory of 992 828 KRNL By IceBerg.exe 33 PID 828 wrote to memory of 992 828 KRNL By IceBerg.exe 33 PID 828 wrote to memory of 992 828 KRNL By IceBerg.exe 33 PID 1772 wrote to memory of 1948 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 35 PID 1772 wrote to memory of 1948 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 35 PID 1772 wrote to memory of 1948 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 35 PID 1772 wrote to memory of 1948 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 35 PID 1948 wrote to memory of 2012 1948 cmd.exe 37 PID 1948 wrote to memory of 2012 1948 cmd.exe 37 PID 1948 wrote to memory of 2012 1948 cmd.exe 37 PID 1948 wrote to memory of 2012 1948 cmd.exe 37 PID 1772 wrote to memory of 1760 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 38 PID 1772 wrote to memory of 1760 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 38 PID 1772 wrote to memory of 1760 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 38 PID 1772 wrote to memory of 1760 1772 defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe 38 PID 1760 wrote to memory of 1256 1760 cmd.exe 40 PID 1760 wrote to memory of 1256 1760 cmd.exe 40 PID 1760 wrote to memory of 1256 1760 cmd.exe 40 PID 1760 wrote to memory of 1256 1760 cmd.exe 40 PID 1760 wrote to memory of 912 1760 cmd.exe 41 PID 1760 wrote to memory of 912 1760 cmd.exe 41 PID 1760 wrote to memory of 912 1760 cmd.exe 41 PID 1760 wrote to memory of 912 1760 cmd.exe 41 PID 1760 wrote to memory of 1512 1760 cmd.exe 42 PID 1760 wrote to memory of 1512 1760 cmd.exe 42 PID 1760 wrote to memory of 1512 1760 cmd.exe 42 PID 1760 wrote to memory of 1512 1760 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe"C:\Users\Admin\AppData\Local\Temp\defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe"1⤵
- Loads dropped DLL
- Windows security modification
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "KRNL By IceBerg" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1428
-
-
C:\Users\Admin\AppData\Roaming\Boostrapper\KRNL By IceBerg.exe"C:\Users\Admin\AppData\Roaming\Boostrapper\KRNL By IceBerg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "KRNL By IceBerg" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Boostrapper\KRNL By IceBerg.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:992
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SM0n3rZOHDNj.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1256
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe"C:\Users\Admin\AppData\Local\Temp\defbae45ea8e71f8a50123f382f4538afc9db836de09bab316464d4793394f19.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-