Analysis

  • max time kernel
    4294191s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    19-03-2022 11:55

General

  • Target

    5b092b9eae4e57fab721a1e5b5a7cb92afe81fd1cc24d371cfa44c9cb0bb88fa.exe

  • Size

    593KB

  • MD5

    c43fe8c5ca00ddf821a56b2b6ccc8584

  • SHA1

    dc0424cf138ae4cd0d6c52d684fb1df3bd5af6f1

  • SHA256

    5b092b9eae4e57fab721a1e5b5a7cb92afe81fd1cc24d371cfa44c9cb0bb88fa

  • SHA512

    e29ebd1b452c1dae15ebb7b30f8955be74dec4d07c5a0f48dcf190f638a9bba79ca8fc02c9ad413c10af6081621576d3ebd1b4ffda2c9afb1b61a00cc064af86

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/926732875158675478/6csAuzJ3Xvb9h9BDk-AfAIf-_0q1Afnq5Q7F4l1ACtT7yl9nQbX784HIUvIz3kDgK3Fk

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Ooof test

C2

108.46.243.186:666

127.0.0.1:666

Mutex

VNM_MUTEX_65QdrIjc0h275Ml7aF

Attributes
  • encryption_key

    uIglS4TyzvrzJnsc0TSp

  • install_name

    $77-Unreal.exe

  • log_directory

    na

  • reconnect_delay

    3000

  • startup_key

    SR-Client

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 10 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 10 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Executes dropped EXE 4 IoCs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b092b9eae4e57fab721a1e5b5a7cb92afe81fd1cc24d371cfa44c9cb0bb88fa.exe
    "C:\Users\Admin\AppData\Local\Temp\5b092b9eae4e57fab721a1e5b5a7cb92afe81fd1cc24d371cfa44c9cb0bb88fa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Roaming\Myra\Quantum.exe
      "C:\Users\Admin\AppData\Roaming\Myra\Quantum.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Maps connected drives based on registry
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 520 -s 1832
        3⤵
        • Program crash
        PID:1104
    • C:\Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe
      "C:\Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "SR-Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:364
      • C:\Users\Admin\AppData\Roaming\SubDir\$77-Unreal.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\$77-Unreal.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1060
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "SR-Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\$77-Unreal.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:1804
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:960
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1092
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
          4⤵
          • Deletes itself
          PID:928
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\yR1xeoYK5EHO.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:1256
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 10 localhost
            4⤵
            • Runs ping.exe
            PID:1572
          • C:\Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe
            "C:\Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1672

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\yR1xeoYK5EHO.bat

      MD5

      c38330c771a98c47edff1faa9d4dd295

      SHA1

      de5621d7186ad6354c7ed64aef412f711fec6e16

      SHA256

      fe184c51910d970afabbdedae3a88237f63ddba8fa6a303d60d189876826f246

      SHA512

      b97d9c1252639dc6aedfedc780aab3e541938284979dfec4524af0f06fb755d69bdc1ce95da5cf8acb7cd6fd53b55d364981aa362f5ed43f9a287e4737397767

    • C:\Users\Admin\AppData\Roaming\Myra\Quantum.exe

      MD5

      e11e8a710061ff92533dcb7835b2e6cf

      SHA1

      8dc4eed8fa745d5bd0af86fa2336a56b6324f0e2

      SHA256

      95df6acbfb25563f084dbcfee14df91d2d80a3382cfd8468f0e50f0460e5b07a

      SHA512

      6ea8c66025b361940fcd0eb2efd5dcf55f77eca9f8e883795578906c6c02982fbbc79bca7113fccd3a0090113d570f2e74d1470761191ae620a7bb3df155067b

    • C:\Users\Admin\AppData\Roaming\Myra\Quantum.exe

      MD5

      e11e8a710061ff92533dcb7835b2e6cf

      SHA1

      8dc4eed8fa745d5bd0af86fa2336a56b6324f0e2

      SHA256

      95df6acbfb25563f084dbcfee14df91d2d80a3382cfd8468f0e50f0460e5b07a

      SHA512

      6ea8c66025b361940fcd0eb2efd5dcf55f77eca9f8e883795578906c6c02982fbbc79bca7113fccd3a0090113d570f2e74d1470761191ae620a7bb3df155067b

    • C:\Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe

      MD5

      415c63941a8cbc83b41e70c4c36f0665

      SHA1

      e4f85d14ed997c3c31d91f7db1b22b6db36cd872

      SHA256

      0d50793b4fcce549e675c7e2816ccdbb5cb50750f84d0c8dfea3ee7c4ae94c7c

      SHA512

      9491148799085ed739f08cc17c765383594f197e413bd12ceaa6a26357ce97d0ba1f06decb2db056566edfdad5df02e0318d12a753b4b4a5c215fc2a1b689f53

    • C:\Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe

      MD5

      415c63941a8cbc83b41e70c4c36f0665

      SHA1

      e4f85d14ed997c3c31d91f7db1b22b6db36cd872

      SHA256

      0d50793b4fcce549e675c7e2816ccdbb5cb50750f84d0c8dfea3ee7c4ae94c7c

      SHA512

      9491148799085ed739f08cc17c765383594f197e413bd12ceaa6a26357ce97d0ba1f06decb2db056566edfdad5df02e0318d12a753b4b4a5c215fc2a1b689f53

    • C:\Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe

      MD5

      415c63941a8cbc83b41e70c4c36f0665

      SHA1

      e4f85d14ed997c3c31d91f7db1b22b6db36cd872

      SHA256

      0d50793b4fcce549e675c7e2816ccdbb5cb50750f84d0c8dfea3ee7c4ae94c7c

      SHA512

      9491148799085ed739f08cc17c765383594f197e413bd12ceaa6a26357ce97d0ba1f06decb2db056566edfdad5df02e0318d12a753b4b4a5c215fc2a1b689f53

    • C:\Users\Admin\AppData\Roaming\SubDir\$77-Unreal.exe

      MD5

      415c63941a8cbc83b41e70c4c36f0665

      SHA1

      e4f85d14ed997c3c31d91f7db1b22b6db36cd872

      SHA256

      0d50793b4fcce549e675c7e2816ccdbb5cb50750f84d0c8dfea3ee7c4ae94c7c

      SHA512

      9491148799085ed739f08cc17c765383594f197e413bd12ceaa6a26357ce97d0ba1f06decb2db056566edfdad5df02e0318d12a753b4b4a5c215fc2a1b689f53

    • C:\Users\Admin\AppData\Roaming\SubDir\$77-Unreal.exe

      MD5

      415c63941a8cbc83b41e70c4c36f0665

      SHA1

      e4f85d14ed997c3c31d91f7db1b22b6db36cd872

      SHA256

      0d50793b4fcce549e675c7e2816ccdbb5cb50750f84d0c8dfea3ee7c4ae94c7c

      SHA512

      9491148799085ed739f08cc17c765383594f197e413bd12ceaa6a26357ce97d0ba1f06decb2db056566edfdad5df02e0318d12a753b4b4a5c215fc2a1b689f53

    • \Users\Admin\AppData\Roaming\Myra\Quantum.exe

      MD5

      e11e8a710061ff92533dcb7835b2e6cf

      SHA1

      8dc4eed8fa745d5bd0af86fa2336a56b6324f0e2

      SHA256

      95df6acbfb25563f084dbcfee14df91d2d80a3382cfd8468f0e50f0460e5b07a

      SHA512

      6ea8c66025b361940fcd0eb2efd5dcf55f77eca9f8e883795578906c6c02982fbbc79bca7113fccd3a0090113d570f2e74d1470761191ae620a7bb3df155067b

    • \Users\Admin\AppData\Roaming\Quantum1\$77-Quantum.exe

      MD5

      415c63941a8cbc83b41e70c4c36f0665

      SHA1

      e4f85d14ed997c3c31d91f7db1b22b6db36cd872

      SHA256

      0d50793b4fcce549e675c7e2816ccdbb5cb50750f84d0c8dfea3ee7c4ae94c7c

      SHA512

      9491148799085ed739f08cc17c765383594f197e413bd12ceaa6a26357ce97d0ba1f06decb2db056566edfdad5df02e0318d12a753b4b4a5c215fc2a1b689f53

    • \Users\Admin\AppData\Roaming\SubDir\$77-Unreal.exe

      MD5

      415c63941a8cbc83b41e70c4c36f0665

      SHA1

      e4f85d14ed997c3c31d91f7db1b22b6db36cd872

      SHA256

      0d50793b4fcce549e675c7e2816ccdbb5cb50750f84d0c8dfea3ee7c4ae94c7c

      SHA512

      9491148799085ed739f08cc17c765383594f197e413bd12ceaa6a26357ce97d0ba1f06decb2db056566edfdad5df02e0318d12a753b4b4a5c215fc2a1b689f53

    • memory/468-63-0x00000000009A0000-0x0000000000A2C000-memory.dmp

      Filesize

      560KB

    • memory/468-65-0x0000000072630000-0x0000000072D1E000-memory.dmp

      Filesize

      6.9MB

    • memory/468-67-0x0000000004A20000-0x0000000004A21000-memory.dmp

      Filesize

      4KB

    • memory/520-62-0x0000000000150000-0x0000000000160000-memory.dmp

      Filesize

      64KB

    • memory/520-66-0x000000001B210000-0x000000001B212000-memory.dmp

      Filesize

      8KB

    • memory/520-64-0x000007FEF54E0000-0x000007FEF5ECC000-memory.dmp

      Filesize

      9.9MB

    • memory/960-77-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/960-76-0x000000006ED60000-0x000000006F30B000-memory.dmp

      Filesize

      5.7MB

    • memory/960-78-0x0000000000561000-0x0000000000562000-memory.dmp

      Filesize

      4KB

    • memory/960-79-0x0000000000562000-0x0000000000564000-memory.dmp

      Filesize

      8KB

    • memory/1060-74-0x0000000072630000-0x0000000072D1E000-memory.dmp

      Filesize

      6.9MB

    • memory/1060-75-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

      Filesize

      4KB

    • memory/1060-71-0x0000000000FA0000-0x000000000102C000-memory.dmp

      Filesize

      560KB

    • memory/1672-82-0x0000000000C20000-0x0000000000CAC000-memory.dmp

      Filesize

      560KB

    • memory/1672-83-0x0000000072630000-0x0000000072D1E000-memory.dmp

      Filesize

      6.9MB

    • memory/1672-84-0x00000000044C0000-0x00000000044C1000-memory.dmp

      Filesize

      4KB

    • memory/1824-54-0x00000000752C1000-0x00000000752C3000-memory.dmp

      Filesize

      8KB

    • memory/1824-61-0x0000000074780000-0x0000000074D2B000-memory.dmp

      Filesize

      5.7MB