Analysis
-
max time kernel
44s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 14:59
Static task
static1
Behavioral task
behavioral1
Sample
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe
Resource
win7-20220414-en
General
-
Target
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe
-
Size
699KB
-
MD5
5807ae1cd17e7f9bc109b3df90b243ba
-
SHA1
08595bc28d5f185fce26da9e8362d05ad6eed16d
-
SHA256
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c
-
SHA512
ad790053c056b0bf519c2bae2585c17f063ecc30961936f78092b9684df693d1eb83b15422841172ebb9398a689b4d3f115efb44bbd156739278cca4147482a9
Malware Config
Extracted
quasar
2.1.0.0
Office04
2.tcp.ngrok.io:12699
VNM_MUTEX_ljpH86m9yQvMdFiQrM
-
encryption_key
u0b02uZLknYm9c6g9jJR
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Security
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 6 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/668-72-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/668-73-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/668-74-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/668-75-0x0000000000486BEE-mapping.dmp disable_win_def behavioral1/memory/668-77-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/668-79-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def -
Quasar Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/668-72-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/668-73-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/668-74-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/668-75-0x0000000000486BEE-mapping.dmp family_quasar behavioral1/memory/668-77-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/668-79-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exebc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exedescription pid Process procid_target PID 1572 set thread context of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 944 set thread context of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exepid Process 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exebc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exedescription pid Process Token: SeDebugPrivilege 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe Token: SeDebugPrivilege 668 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe Token: SeDebugPrivilege 668 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exepid Process 668 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exebc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exebc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exedescription pid Process procid_target PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 1572 wrote to memory of 944 1572 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 28 PID 944 wrote to memory of 1988 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 29 PID 944 wrote to memory of 1988 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 29 PID 944 wrote to memory of 1988 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 29 PID 944 wrote to memory of 1988 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 29 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 944 wrote to memory of 668 944 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 30 PID 668 wrote to memory of 824 668 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 32 PID 668 wrote to memory of 824 668 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 32 PID 668 wrote to memory of 824 668 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 32 PID 668 wrote to memory of 824 668 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"3⤵PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:824
-
-
-