Analysis
-
max time kernel
84s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
17-03-2022 12:35
Static task
static1
Behavioral task
behavioral1
Sample
Windows Defender.exe
Resource
win7-20220311-en
General
-
Target
Windows Defender.exe
-
Size
539KB
-
MD5
08d0e315fda80ebf3dc817fdaa9ee029
-
SHA1
f8a03cdb061ec1fbd0ea71d6b4bd688aeb2d6f5a
-
SHA256
c839c2361421e280ca3e3dba1fbff3d833c24e91f8a8774ae5a22e6c69c3b601
-
SHA512
9b8bd7f0dd44424bdb21f9adf0cab29dc8683bb2329a98fe18832b00329a1fb0827e028499fb2f7566a7bb959459972517f3ed9fc5eeb7392908a6d302ab2d20
Malware Config
Extracted
quasar
2.1.0.0
Windows Defender
flashy-rake.auto.playit.gg:52017
VNM_MUTEX_LYc2mMMFlAV9sQbWDZ
-
encryption_key
C6mUMPNwKyGKrTzmPjoI
-
install_name
Windows Defender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender
-
subdirectory
Windows Defender
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/484-130-0x0000000000390000-0x000000000041C000-memory.dmp disable_win_def behavioral2/files/0x000400000001e8c5-138.dat disable_win_def behavioral2/files/0x000400000001e8c5-139.dat disable_win_def -
Quasar Payload 3 IoCs
resource yara_rule behavioral2/memory/484-130-0x0000000000390000-0x000000000041C000-memory.dmp family_quasar behavioral2/files/0x000400000001e8c5-138.dat family_quasar behavioral2/files/0x000400000001e8c5-139.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4456 Windows Defender.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Windows Defender.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Windows Defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Defender.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3076 schtasks.exe 2612 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3620 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4476 powershell.exe 4476 powershell.exe 484 Windows Defender.exe 484 Windows Defender.exe 484 Windows Defender.exe 484 Windows Defender.exe 484 Windows Defender.exe 484 Windows Defender.exe 484 Windows Defender.exe 4616 Windows Defender.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 484 Windows Defender.exe Token: SeDebugPrivilege 4476 powershell.exe Token: SeDebugPrivilege 4456 Windows Defender.exe Token: SeDebugPrivilege 4456 Windows Defender.exe Token: SeDebugPrivilege 4616 Windows Defender.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4456 Windows Defender.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 484 wrote to memory of 3076 484 Windows Defender.exe 82 PID 484 wrote to memory of 3076 484 Windows Defender.exe 82 PID 484 wrote to memory of 3076 484 Windows Defender.exe 82 PID 484 wrote to memory of 4456 484 Windows Defender.exe 84 PID 484 wrote to memory of 4456 484 Windows Defender.exe 84 PID 484 wrote to memory of 4456 484 Windows Defender.exe 84 PID 484 wrote to memory of 4476 484 Windows Defender.exe 85 PID 484 wrote to memory of 4476 484 Windows Defender.exe 85 PID 484 wrote to memory of 4476 484 Windows Defender.exe 85 PID 4456 wrote to memory of 2612 4456 Windows Defender.exe 88 PID 4456 wrote to memory of 2612 4456 Windows Defender.exe 88 PID 4456 wrote to memory of 2612 4456 Windows Defender.exe 88 PID 484 wrote to memory of 3508 484 Windows Defender.exe 93 PID 484 wrote to memory of 3508 484 Windows Defender.exe 93 PID 484 wrote to memory of 3508 484 Windows Defender.exe 93 PID 3508 wrote to memory of 4364 3508 cmd.exe 95 PID 3508 wrote to memory of 4364 3508 cmd.exe 95 PID 3508 wrote to memory of 4364 3508 cmd.exe 95 PID 484 wrote to memory of 216 484 Windows Defender.exe 97 PID 484 wrote to memory of 216 484 Windows Defender.exe 97 PID 484 wrote to memory of 216 484 Windows Defender.exe 97 PID 216 wrote to memory of 3436 216 cmd.exe 99 PID 216 wrote to memory of 3436 216 cmd.exe 99 PID 216 wrote to memory of 3436 216 cmd.exe 99 PID 216 wrote to memory of 3620 216 cmd.exe 100 PID 216 wrote to memory of 3620 216 cmd.exe 100 PID 216 wrote to memory of 3620 216 cmd.exe 100 PID 216 wrote to memory of 4616 216 cmd.exe 103 PID 216 wrote to memory of 4616 216 cmd.exe 103 PID 216 wrote to memory of 4616 216 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows Defender.exe"C:\Users\Admin\AppData\Local\Temp\Windows Defender.exe"1⤵
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Defender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Windows Defender.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3076
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender\Windows Defender.exe"C:\Users\Admin\AppData\Roaming\Windows Defender\Windows Defender.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Defender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender\Windows Defender.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2612
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:4364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Lj0BBRQU7IiT.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3436
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\Windows Defender.exe"C:\Users\Admin\AppData\Local\Temp\Windows Defender.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-