Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-04-2022 08:48
Static task
static1
Behavioral task
behavioral1
Sample
b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe
Resource
win7-20220414-en
General
-
Target
b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe
-
Size
927KB
-
MD5
d9f78b702ec7fd8a246103fe2eae5704
-
SHA1
90617fe3b2a7c71e6531eaa6b602c3ef86b3237d
-
SHA256
b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4
-
SHA512
1be56e8d51aa911acf2159ab9c04ae98b3bd7ee5e28a295d20f23b6918bf005d2e45314ae01dccce404e93f7146dd7b2d5b1b4119674560eab52e3a23f2f8aad
Malware Config
Extracted
quasar
1.4.0
Office04
127.0.0.1:4782
936e6e55-d8a2-4cdc-a725-acb9291b9b7e
-
encryption_key
627F681A7B8A3EA1E3B1DB478CE6E95260D73355
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
Quasar Payload 1 IoCs
resource yara_rule behavioral2/memory/4468-140-0x0000000000400000-0x0000000000484000-memory.dmp family_quasar -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 2296 Client.exe 4968 Client.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Client.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Client.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Client.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Client.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\SubDir\Client.exe b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe File opened for modification C:\Windows\SysWOW64\SubDir\Client.exe b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe File created C:\Windows\SysWOW64\SubDir\Client.exe Client.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2608 set thread context of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 2296 set thread context of 4968 2296 Client.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3388 schtasks.exe 2036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4968 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4468 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe Token: SeDebugPrivilege 4968 Client.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2608 wrote to memory of 3388 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 81 PID 2608 wrote to memory of 3388 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 81 PID 2608 wrote to memory of 3388 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 81 PID 2608 wrote to memory of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 2608 wrote to memory of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 2608 wrote to memory of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 2608 wrote to memory of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 2608 wrote to memory of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 2608 wrote to memory of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 2608 wrote to memory of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 2608 wrote to memory of 4468 2608 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 83 PID 4468 wrote to memory of 2296 4468 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 84 PID 4468 wrote to memory of 2296 4468 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 84 PID 4468 wrote to memory of 2296 4468 b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe 84 PID 2296 wrote to memory of 2036 2296 Client.exe 87 PID 2296 wrote to memory of 2036 2296 Client.exe 87 PID 2296 wrote to memory of 2036 2296 Client.exe 87 PID 2296 wrote to memory of 4968 2296 Client.exe 89 PID 2296 wrote to memory of 4968 2296 Client.exe 89 PID 2296 wrote to memory of 4968 2296 Client.exe 89 PID 2296 wrote to memory of 4968 2296 Client.exe 89 PID 2296 wrote to memory of 4968 2296 Client.exe 89 PID 2296 wrote to memory of 4968 2296 Client.exe 89 PID 2296 wrote to memory of 4968 2296 Client.exe 89 PID 2296 wrote to memory of 4968 2296 Client.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe"C:\Users\Admin\AppData\Local\Temp\b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aIXlnuuTVgzHfQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp184B.tmp"2⤵
- Creates scheduled task(s)
PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe"{path}"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aIXlnuuTVgzHfQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC9F7.tmp"4⤵
- Creates scheduled task(s)
PID:2036
-
-
C:\Windows\SysWOW64\SubDir\Client.exe"{path}"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ddde88120da5a6e61cf1c0d1fc3f5c99
SHA1aef94de11f90c3e6a99478c03d24aa355a6d0e52
SHA256353067996dbacb8d3ae38dcc754d06b92e34b8511ebe2fda8c2358bbf6b79924
SHA51264994ad92b4751bf3d580ec683e9387d9f05fe44bcb80c343470e992ac793f94f4811ab7c4f2e7240d40d5fe49df8191b781ef994a7c30df1f80940c7b06e8bd
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4.exe.log
Filesize1KB
MD5ddde88120da5a6e61cf1c0d1fc3f5c99
SHA1aef94de11f90c3e6a99478c03d24aa355a6d0e52
SHA256353067996dbacb8d3ae38dcc754d06b92e34b8511ebe2fda8c2358bbf6b79924
SHA51264994ad92b4751bf3d580ec683e9387d9f05fe44bcb80c343470e992ac793f94f4811ab7c4f2e7240d40d5fe49df8191b781ef994a7c30df1f80940c7b06e8bd
-
Filesize
1KB
MD5876b9894e54444425dcb2da4578677ca
SHA1ba1fd23088fd7de15f31f01ff4b001974a5981c7
SHA256bf8113adbce988a1022345dc2d63fa0f4c49d769bbd55c5f3a342813882fa3f7
SHA5123b3c65c8c5162e83fa96a3229da75de4a1d25d15da432fe5f910788762a2c0a2a5e6d67c5042b716736d0632962d6c632db86864f6ec02a2cdfe0fdfdeef357a
-
Filesize
1KB
MD5876b9894e54444425dcb2da4578677ca
SHA1ba1fd23088fd7de15f31f01ff4b001974a5981c7
SHA256bf8113adbce988a1022345dc2d63fa0f4c49d769bbd55c5f3a342813882fa3f7
SHA5123b3c65c8c5162e83fa96a3229da75de4a1d25d15da432fe5f910788762a2c0a2a5e6d67c5042b716736d0632962d6c632db86864f6ec02a2cdfe0fdfdeef357a
-
Filesize
927KB
MD5d9f78b702ec7fd8a246103fe2eae5704
SHA190617fe3b2a7c71e6531eaa6b602c3ef86b3237d
SHA256b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4
SHA5121be56e8d51aa911acf2159ab9c04ae98b3bd7ee5e28a295d20f23b6918bf005d2e45314ae01dccce404e93f7146dd7b2d5b1b4119674560eab52e3a23f2f8aad
-
Filesize
927KB
MD5d9f78b702ec7fd8a246103fe2eae5704
SHA190617fe3b2a7c71e6531eaa6b602c3ef86b3237d
SHA256b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4
SHA5121be56e8d51aa911acf2159ab9c04ae98b3bd7ee5e28a295d20f23b6918bf005d2e45314ae01dccce404e93f7146dd7b2d5b1b4119674560eab52e3a23f2f8aad
-
Filesize
927KB
MD5d9f78b702ec7fd8a246103fe2eae5704
SHA190617fe3b2a7c71e6531eaa6b602c3ef86b3237d
SHA256b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4
SHA5121be56e8d51aa911acf2159ab9c04ae98b3bd7ee5e28a295d20f23b6918bf005d2e45314ae01dccce404e93f7146dd7b2d5b1b4119674560eab52e3a23f2f8aad