Analysis

  • max time kernel
    182s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    20-03-2022 02:29

General

  • Target

    8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe

  • Size

    783KB

  • MD5

    d677b73dcb14c399d5c986a6558356df

  • SHA1

    7b52f0235c834943078af0292636b335cd86e103

  • SHA256

    8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e

  • SHA512

    e00f0116fa1297dcf20b55c85c521af3cd8b66daa629ba475fd01173ceb1df66cf6c1ae1f2807b8c098d560afa073f23a84260b980c93df3ed173d4d81271126

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

193.161.193.99:29069

Mutex

VNM_MUTEX_04STdugX9pbf1yeEFR

Attributes
  • encryption_key

    gOa6B7rJfhbU1IIsLE4i

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows LoginUI

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe
    "C:\Users\Admin\AppData\Local\Temp\8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kvOYCSsAhoZCXE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCB57.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:5080
    • C:\Users\Admin\AppData\Local\Temp\8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe
      "{path}"
      2⤵
      • Checks computer location settings
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4128
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Windows LoginUI" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2068
      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kvOYCSsAhoZCXE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB1EE.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:2084
        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
          "{path}"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4632
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Windows LoginUI" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:1656
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3092
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3692
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
          4⤵
            PID:1720
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jY9nveQc2T2j.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:800
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            4⤵
              PID:1452
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 10 localhost
              4⤵
              • Runs ping.exe
              PID:1060
            • C:\Users\Admin\AppData\Local\Temp\8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe
              "C:\Users\Admin\AppData\Local\Temp\8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe"
              4⤵
                PID:3972
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
          1⤵
          • Modifies data under HKEY_USERS
          PID:4680

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe.log

          MD5

          10eab9c2684febb5327b6976f2047587

          SHA1

          a12ed54146a7f5c4c580416aecb899549712449e

          SHA256

          f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

          SHA512

          7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe.log

          MD5

          10eab9c2684febb5327b6976f2047587

          SHA1

          a12ed54146a7f5c4c580416aecb899549712449e

          SHA256

          f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

          SHA512

          7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Client.exe.log

          MD5

          31f95c36ee4b5ac1ffcbdc89b3bcabc0

          SHA1

          d38fddab78283c1cc05cc55652222cd7e5a484aa

          SHA256

          88486792973340aafc9db775eadfaa849d05a5e2ed25a38e67febcdf70213ce6

          SHA512

          9acb665346143d8622613d047502a65615ea369db94281b20cb5bea6dac18f397f8c0144e8d4a201d94cd36b229ad9a31ce4a4a11e1fdcd19e6496a035032072

        • C:\Users\Admin\AppData\Local\Temp\jY9nveQc2T2j.bat

          MD5

          a649b3bc51ecd4b07fa11f83fc5c8dbe

          SHA1

          e0b43614ba1a48ba23620413a8e70c96a202c42d

          SHA256

          4ba9c9994935e25627f87264d7c4a2023cb707981f509b767b75dcde7ed1128b

          SHA512

          66878605e8f358663d45d55e6c1ec0ecb336ab98cc63958a54c5e94222c348f67389ca21d40aa8d64506e2c2b87ea445ad4a7850d81384f36118c4212ea3e94d

        • C:\Users\Admin\AppData\Local\Temp\tmpB1EE.tmp

          MD5

          285e602c29a2458625acd7fd5dcfbd25

          SHA1

          b419439fd40a21ac08025df1673c6208a9fc1117

          SHA256

          b59abd65c0351c5d2bcda8c9aefead3ada33491c937aff1efef1ee4b12eaf17c

          SHA512

          44d24ddb9e6e7fd6c38cb234490c9b91fee581c5df6d74bc028db044d2eb14ddce53d99a1debc8f0bd8f508f550f525c3d3757d82c133d67bba51929db3c671e

        • C:\Users\Admin\AppData\Local\Temp\tmpCB57.tmp

          MD5

          285e602c29a2458625acd7fd5dcfbd25

          SHA1

          b419439fd40a21ac08025df1673c6208a9fc1117

          SHA256

          b59abd65c0351c5d2bcda8c9aefead3ada33491c937aff1efef1ee4b12eaf17c

          SHA512

          44d24ddb9e6e7fd6c38cb234490c9b91fee581c5df6d74bc028db044d2eb14ddce53d99a1debc8f0bd8f508f550f525c3d3757d82c133d67bba51929db3c671e

        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

          MD5

          d677b73dcb14c399d5c986a6558356df

          SHA1

          7b52f0235c834943078af0292636b335cd86e103

          SHA256

          8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e

          SHA512

          e00f0116fa1297dcf20b55c85c521af3cd8b66daa629ba475fd01173ceb1df66cf6c1ae1f2807b8c098d560afa073f23a84260b980c93df3ed173d4d81271126

        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

          MD5

          d677b73dcb14c399d5c986a6558356df

          SHA1

          7b52f0235c834943078af0292636b335cd86e103

          SHA256

          8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e

          SHA512

          e00f0116fa1297dcf20b55c85c521af3cd8b66daa629ba475fd01173ceb1df66cf6c1ae1f2807b8c098d560afa073f23a84260b980c93df3ed173d4d81271126

        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

          MD5

          d677b73dcb14c399d5c986a6558356df

          SHA1

          7b52f0235c834943078af0292636b335cd86e103

          SHA256

          8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e

          SHA512

          e00f0116fa1297dcf20b55c85c521af3cd8b66daa629ba475fd01173ceb1df66cf6c1ae1f2807b8c098d560afa073f23a84260b980c93df3ed173d4d81271126

        • memory/2800-151-0x00000000049B0000-0x0000000004A42000-memory.dmp

          Filesize

          584KB

        • memory/2800-150-0x00000000745F0000-0x0000000074DA0000-memory.dmp

          Filesize

          7.7MB

        • memory/3092-158-0x0000000006340000-0x000000000635E000-memory.dmp

          Filesize

          120KB

        • memory/3092-164-0x0000000006B00000-0x0000000006B1A000-memory.dmp

          Filesize

          104KB

        • memory/3092-170-0x0000000007AF0000-0x0000000007AF8000-memory.dmp

          Filesize

          32KB

        • memory/3092-169-0x0000000007B10000-0x0000000007B2A000-memory.dmp

          Filesize

          104KB

        • memory/3092-168-0x0000000007AA0000-0x0000000007AAE000-memory.dmp

          Filesize

          56KB

        • memory/3092-167-0x00000000079B0000-0x0000000007A46000-memory.dmp

          Filesize

          600KB

        • memory/3092-166-0x00000000077C0000-0x00000000077CA000-memory.dmp

          Filesize

          40KB

        • memory/3092-165-0x000000007FDF0000-0x000000007FDF1000-memory.dmp

          Filesize

          4KB

        • memory/3092-149-0x0000000002AA0000-0x0000000002AD6000-memory.dmp

          Filesize

          216KB

        • memory/3092-163-0x0000000007E10000-0x000000000848A000-memory.dmp

          Filesize

          6.5MB

        • memory/3092-162-0x00000000069C0000-0x00000000069DE000-memory.dmp

          Filesize

          120KB

        • memory/3092-152-0x00000000745F0000-0x0000000074DA0000-memory.dmp

          Filesize

          7.7MB

        • memory/3092-153-0x00000000050B0000-0x00000000050B1000-memory.dmp

          Filesize

          4KB

        • memory/3092-154-0x00000000050B2000-0x00000000050B3000-memory.dmp

          Filesize

          4KB

        • memory/3092-155-0x00000000056F0000-0x0000000005D18000-memory.dmp

          Filesize

          6.2MB

        • memory/3092-156-0x0000000005410000-0x0000000005432000-memory.dmp

          Filesize

          136KB

        • memory/3092-157-0x00000000054B0000-0x0000000005516000-memory.dmp

          Filesize

          408KB

        • memory/3092-161-0x000000006F5E0000-0x000000006F62C000-memory.dmp

          Filesize

          304KB

        • memory/3092-159-0x00000000050B5000-0x00000000050B7000-memory.dmp

          Filesize

          8KB

        • memory/3092-160-0x0000000006A90000-0x0000000006AC2000-memory.dmp

          Filesize

          200KB

        • memory/3972-180-0x00000000745F0000-0x0000000074DA0000-memory.dmp

          Filesize

          7.7MB

        • memory/3972-181-0x0000000005280000-0x0000000005824000-memory.dmp

          Filesize

          5.6MB

        • memory/4128-146-0x0000000006DF0000-0x0000000006E2C000-memory.dmp

          Filesize

          240KB

        • memory/4128-144-0x0000000005B40000-0x0000000005BA6000-memory.dmp

          Filesize

          408KB

        • memory/4128-142-0x00000000745F0000-0x0000000074DA0000-memory.dmp

          Filesize

          7.7MB

        • memory/4128-141-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/4128-143-0x0000000005570000-0x0000000005571000-memory.dmp

          Filesize

          4KB

        • memory/4128-145-0x0000000006880000-0x0000000006892000-memory.dmp

          Filesize

          72KB

        • memory/4132-130-0x0000000000F60000-0x000000000102A000-memory.dmp

          Filesize

          808KB

        • memory/4132-131-0x0000000005900000-0x0000000005992000-memory.dmp

          Filesize

          584KB

        • memory/4132-134-0x00000000058A0000-0x00000000058AA000-memory.dmp

          Filesize

          40KB

        • memory/4132-135-0x00000000059A0000-0x0000000005F44000-memory.dmp

          Filesize

          5.6MB

        • memory/4132-133-0x00000000745F0000-0x0000000074DA0000-memory.dmp

          Filesize

          7.7MB

        • memory/4132-139-0x0000000008FD0000-0x000000000906C000-memory.dmp

          Filesize

          624KB

        • memory/4132-132-0x0000000005F50000-0x00000000064F4000-memory.dmp

          Filesize

          5.6MB

        • memory/4632-178-0x0000000005200000-0x00000000057A4000-memory.dmp

          Filesize

          5.6MB

        • memory/4632-177-0x00000000745F0000-0x0000000074DA0000-memory.dmp

          Filesize

          7.7MB

        • memory/4680-185-0x000001BB1F080000-0x000001BB1F081000-memory.dmp

          Filesize

          4KB

        • memory/4680-138-0x000001BB1F060000-0x000001BB1F064000-memory.dmp

          Filesize

          16KB

        • memory/4680-137-0x000001BB1CC80000-0x000001BB1CC90000-memory.dmp

          Filesize

          64KB

        • memory/4680-182-0x000001BB1F330000-0x000001BB1F334000-memory.dmp

          Filesize

          16KB

        • memory/4680-183-0x000001BB1F310000-0x000001BB1F311000-memory.dmp

          Filesize

          4KB

        • memory/4680-184-0x000001BB1F090000-0x000001BB1F094000-memory.dmp

          Filesize

          16KB

        • memory/4680-187-0x000001BB1CD80000-0x000001BB1CD81000-memory.dmp

          Filesize

          4KB

        • memory/4680-186-0x000001BB1F080000-0x000001BB1F084000-memory.dmp

          Filesize

          16KB

        • memory/4680-136-0x000001BB1CA60000-0x000001BB1CA70000-memory.dmp

          Filesize

          64KB