Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
02-03-2022 03:11
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-en-20211208
General
-
Target
tmp.exe
-
Size
505KB
-
MD5
56fdac38d6004e0bc5fb2d5c961322e2
-
SHA1
470111decd8883231c720a05eab77032e8b77250
-
SHA256
cd2a19b6db25d50aa3413300fe5d1183a082a388e9b12d47fbb6ef765e1c819a
-
SHA512
3c9f4534c275f09935dc38853e9733145ade98ef53cb4d6f7cd4d530d938c4e00117f995778d343285e3e2829fbceab3681e43772cff91fba7d41ba81c3a60dc
Malware Config
Extracted
quasar
1.4.0
new1
bigrussianfloppa.duckdns.org:1004
a8db07ed-e16a-4405-a04c-3980d567bfdb
-
encryption_key
49FAF85C97BB43AF1E641011D48AB0EBC58C478E
-
install_name
java.exe
-
log_directory
logz
-
reconnect_delay
300
-
startup_key
Java
-
subdirectory
JavaTools
Signatures
-
Quasar Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3992-130-0x0000000000E70000-0x0000000000EF4000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\JavaTools\java.exe family_quasar C:\Users\Admin\AppData\Roaming\JavaTools\java.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
java.exepid process 3908 java.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 37 api.ipify.org 36 api.ipify.org -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1084 schtasks.exe 2944 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tmp.exejava.exedescription pid process Token: SeDebugPrivilege 3992 tmp.exe Token: SeDebugPrivilege 3908 java.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
java.exepid process 3908 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
tmp.exejava.exedescription pid process target process PID 3992 wrote to memory of 1084 3992 tmp.exe schtasks.exe PID 3992 wrote to memory of 1084 3992 tmp.exe schtasks.exe PID 3992 wrote to memory of 3908 3992 tmp.exe java.exe PID 3992 wrote to memory of 3908 3992 tmp.exe java.exe PID 3908 wrote to memory of 2944 3908 java.exe schtasks.exe PID 3908 wrote to memory of 2944 3908 java.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\tmp.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1084
-
-
C:\Users\Admin\AppData\Roaming\JavaTools\java.exe"C:\Users\Admin\AppData\Roaming\JavaTools\java.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\JavaTools\java.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
56fdac38d6004e0bc5fb2d5c961322e2
SHA1470111decd8883231c720a05eab77032e8b77250
SHA256cd2a19b6db25d50aa3413300fe5d1183a082a388e9b12d47fbb6ef765e1c819a
SHA5123c9f4534c275f09935dc38853e9733145ade98ef53cb4d6f7cd4d530d938c4e00117f995778d343285e3e2829fbceab3681e43772cff91fba7d41ba81c3a60dc
-
MD5
56fdac38d6004e0bc5fb2d5c961322e2
SHA1470111decd8883231c720a05eab77032e8b77250
SHA256cd2a19b6db25d50aa3413300fe5d1183a082a388e9b12d47fbb6ef765e1c819a
SHA5123c9f4534c275f09935dc38853e9733145ade98ef53cb4d6f7cd4d530d938c4e00117f995778d343285e3e2829fbceab3681e43772cff91fba7d41ba81c3a60dc